Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged WordPress

Rss Feed Group items tagged

Gary Edwards

Why the GOP won't challenge vote fraud | Fellowship of the Minds - 0 views

  •  
    The Consent Decree of 1982 is an agreement between the Republican and Democrat parties that prohibits the Republican party from enforcing, providing oversight, or challenging allegations of voter fraud.  The Judge who signed the Consent Decree is retired, but comes out of retirement every election year to renew the decree..... Excerpt: The RNC and DNC made their Consent Decree 30 years ago, in 1982. The agreement in effect gives a carte blanche to the Democrat Party to commit vote fraud in every voting district across America that has, in the language of the Consent Decree, "a substantial proportion of racial or ethnic populations." The term "substantial proportion" is not defined. "Guy Benson of Townhall.com points out that in last Tuesday's election, Obama only won by 406,348 votes in 4 states: Florida: 73,858 Ohio: 103,481 Virginia: 115,910 Colorado: 113,099 Those four states, with a collective margin of 406,348 votes for Obama, add up to 69 electoral votes. Had Romney won 407,000 or so additional votes in the right proportion in those states, he would have 275 electoral votes. All four states showed Romney ahead in the days leading up to the election. But on November 6, Romney lost all four states by a substantial margin, all of which have precincts that inexplicably went 99% for Obama, had voter registrations that exceeded their population, and had experienced  problems with voting machines. This election was stolen by the Democrats via vote fraud. Despite all the evidence of fraud, the Republican Party has been strangely silent about it. Now you know why." Aftermath: It doesn't matter if this "perfect candidate" has dubious Constitutional eligibility to be president. They would see to it that his original birth certificate (if there is one) would never see the light of day. The same with his other documents - his passports, school and college records, draft registration, and medical records (so we'll never know why Obama has that v
Gary Edwards

James Madison and the States Natural Right of Nullification ; Publius-Huldah's Blog - 0 views

  • What are the Two Conditions Precedent for Nullification?
  • The act of the federal government must be unconstitutional –  usually a usurpation of a power not delegated to the federal government in the Constitution; and
  • The act must be something The States or The People can “nullify”- i.e., refuse to obey:  the act must order them to do something or not do something.
  • ...38 more annotations...
  • If the federal government should overpass the just bounds of its authority and make a tyrannical use of its powers, the people, whose creature it is, must appeal to the standard [the Constitution] they have formed, and take such measures to redress the injury done to the Constitution as the exigency may suggest and prudence justify.”
  • When the act of the federal government is unconstitutional and orders The States or The People to do – or not do – something, nullification is the proper form of interposition.
  • When the act of the federal government is unconstitutional, but doesn’t order The States or The People to do – or not do – something (the alien & sedition acts), nullification is not possible. The States may interpose by objecting, as in The Virginia & Kentucky Resolutions of 1798.
  • When the act of the federal government is constitutional, but unjust (the Tariff Act of 1828), the States may not nullify it; but may interpose by objecting and trying to get the Tariff Act changed.
  • Our Founding Principles in a Nutshell
  • Rights come from God;
  • People create governments;
  • The purpose of government is to secure the rights God gave us; and
  • When a government We created seeks to take away our God given rights, We have the Right – We have the Duty – to alter, abolish, or throw off such government.
  • The former will be exercised principally on external objects, as war, peace, negotiation, and foreign commerce; with which last the power of taxation will, for the most part, be connected.
  • It is to secure our rights to life and liberty by:
  • These enumerated powers concern: Military defense, international commerce & relations; Control of immigration and naturalization of new citizens; Creation of a uniform commercial system: Weights & measures, patents & copyrights, money based on gold & silver, bankruptcy laws, mail delivery & some road building; and With some of the Amendments, protect certain civil rights and voting rights (for blacks, women, citizens who don’t pay taxes, and citizens 18 years and older).
  • It is only with respect to the enumerated powers that the federal government has lawful authority over the Country at large. All other powers are “reserved to the several States” and The People.
  • The powers reserved to the several States will extend to all the objects which … concern the lives, liberties, and properties of the people, and the internal order, improvement, and prosperity of the State.”
  • Military defense (Art. I, Sec. 8, cl. 11-16); Laws against piracy and other felonies committed on the high seas (Art. I, Sec. 8, cl. 10); Protecting us from invasion (Art IV, Sec. 4); Prosecuting traitors (Art III, Sec. 3); and Restrictive immigration policies (Art. I, Sec. 9, cl. 1).
  • It is to secure our property rights by:
  • Regulating trade & commerce so we can produce, sell & prosper (Art. I, Sec. 8, cl.3). The original intent of the interstate commerce clause is to prohibit States from levying tolls & taxes on articles of commerce as they are transported thru the States for buying & selling. Establishing uniform weights & measures and a money system based on gold & silver (Art I, Sec. 8, cl. 5) – inflation via paper currency & fractional reserve lending is theft! Punishing counterfeiters (Art I, Sec. 8, cl. 6); Making bankruptcy laws to permit the orderly dissolution or reorganization of debtors’ estates with fair treatment of creditors (Art I, Sec 8, cl. 4); and Issuing patents & copyrights to protect ownership of intellectual labors (Art I, Sec 8, cl 8)
  • Madison answers the objection “that the judicial authority is to be regarded as the sole expositor of the Constitution, in the last resort”.
  • Laws against slavery (13th Amendment); Providing fair trials in federal courts (4th, 5th, 6th, 7th, and 8th Amendments); and          Obeying the Constitution!
  • The fourth Founding Principle in our Declaration is this: When government takes away our God given rights, We have the Right & the Duty to alter, abolish, or throw off such government. Nullification is thus a natural right of self-defense:
  • 1. As we have just seen, Jefferson, Madison, and Hamilton saw nullification of unconstitutional acts of the federal government as a “natural right” – not a “constitutional right”. And since Rights come from God, there is no such thing as a “constitutional right”!
  • 2. The Right of Nullification, transcending as it does, the Constitution; and being nowhere prohibited by the Constitution to the States, is a reserved power.
  • The 10th Amendment says: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”
  • Madison’s Report on the Virginia Resolutions (1799-1800)
  • Now! Note Well:  Madison actually says, in the same Report Barnett cites, that it is “a plain principle, founded in common sense” that The States are the final authority on whether the federal government has violated our Constitution! Under his discussion of the 3rd Resolution, Madison says:
  • “It appears to your committee to be a plain principle, founded in common sense, illustrated by common practice, and essential to the nature of compacts; that where resort can be had to no tribunal superior to the authority of the parties, the parties themselves must be the rightful judges in the last resort, whether the bargain made, has been pursued or violated. The Constitution of the United States was formed by the sanction of the States, given by each in its sovereign capacity. It adds to the stability and dignity, as well as to the authority of the Constitution, that it rests on this legitimate and solid foundation. The States then being the parties to the constitutional compact, and in their sovereign capacity, it follows of necessity, that there can be no tribunal above their authority, to decide in the last resort, whether the compact made by them be violated; and consequently that as the parties to it, they must themselves decide in the last resort, such questions as may be of sufficient magnitude to require their interposition.” [emphasis mine]
  • Madison explains that if, when the federal government usurps power, the States cannot act so as to stop the usurpation, and thereby preserve the Constitution as well as the safety of The States; there would be no relief from usurped power. 
  • This would subvert the Rights of the People as well as betray the fundamental principle of our Founding:
  • …If the deliberate exercise, of dangerous power, palpably withheld by the Constitution, could not justify the parties to it, in interposing even so far as to arrest the progress of the evil, and thereby to preserve the Constitution itself as well as to provide for the safety of the parties to it; there would be an end to all relief from usurped power, and a direct subversion of the rights specified or recognized under all the State constitutions, as well as a plain denial of the fundamental principle on which our independence itself was declared.” [emphasis mine]
  • It is to secure our right to liberty by:
  • Madison explains that when the federal government acts outside the Constitution by usurping powers, and when the Constitution affords no remedy to that usurpation; then the Sovereign States who are the Parties to the Constitution must likewise step outside the Constitution and appeal to that original natural right of self-defense.
  • Madison goes on to say that all three Branches of the federal government obtain their delegated powers from the Constitution; and they may not annul the authority of their Creator.
  • but, where powers are assumed which have not been delegated, a nullification of the act is the rightful remedy: that every State has a natural right in cases not within the compact, (casus non foederis,) to nullify of their own authority all assumptions of power by others within their limits: that without this right, they would be under the dominion, absolute and unlimited, of whosoever might exercise this right of judgment for them…” [boldface mine]
  • Application Today
  • When WE THE PEOPLE ratified our Constitution, and thereby created the federal government, WE did not delegate to our “creature” power to control our medical care, restrict guns and ammunition, dictate what is done in the public schools, dictate how we use our lands, and all the thousands of things they do WE never gave them authority in our Constitution to do.
  • Accordingly, each State has a natural right to nullify these unconstitutional dictates within its borders.  These dictates are outside the compact The Sovereign States made with each other –WE never gave our “creature” power over these objects.
  • To sum this up:
  • Nullification is a natural right of self-defense. Rights don’t come from the Constitution. Like all Rights, the right of self-defense comes from God (The Declaration of Independence, 2nd para). Nullification is a reserved power within the meaning of the 10th Amendment. The Constitution doesn’t prohibit States from nullifying, and We reserved the power to do it. God requires us to disobey civil authorities when they violate God’s Law. That’s why the 2nd para of the Declaration of Independence says we have the duty to overthrow tyrannical government. See: The Biblical Foundation of our Constitution. Nullification is required by Oath of Office:  Article VI, cl. 3 requires all State officers and judges to “support” the federal Constitution. Therefore, when the federal government violates the Constitution, the States must smack them down.
  •  
    Incredible and passionate argument concerning the States natural God given right to nullify and render unenforceable un-Constitutional actions of the Federal Government.  As "creators" of the Federal Government, the States are obligated to nullify un-Constitutional actions and interpose Constitutional alternatives.  Huldah sites Jefferson, Madison and Hamilton as the primary Constitutional authorities for her rock solid argument.   If ever you want to learn about the Constitution, Publius Huldah is clearly the place to go.  
Paul Merrell

HTTPS Deployment Growing by Leaps and Bounds: 2016 in Review | Electronic Frontier Foun... - 0 views

  • This was a great year for adoption of HTTPS encryption for secure connections to websites. HTTPS is an essential technology for security and privacy on the Web, and we've long been asking sites to turn it on to protect their users from spying (and from censorship and tampering with site content). This year, lots of factors came together to make it happen, including ongoing news about surveillance, advances in Web server capacity, nudges from industry, government, and Web browsers, and the Let's Encrypt certificate authority. By some measures, more than half of page loads in Firefox and in Chrome are now secured with HTTPS—the first time this has ever happened in the Web's history. That's right: for the first time ever, most pages viewed on the Web were encrypted! (As another year-in-review post will discuss, browsers are also experimenting with and rolling out stronger encryption technologies to better protect those connections.)
  • Sites large and small took turned on HTTPS in 2016, often using certificates from the Let's Encrypt certificate authority (sometimes with EFF's Certbot software, or a range of other options). In just a single year of broad public availability, Let's Encrypt has now helped enable secure connections for over 21 million websites, most of which never had certificates before.
  • A sizeable part of the growth in HTTPS came from very large hosting providers that decided to make HTTPS a default for sites that they host, including OVH, Wordpress.com, Shopify, Tumblr, Squarespace, and many others. Sites they host, and visitors to those sites, can get a boost in security without having to do anything. (And we're getting ongoing benefits from providers like CloudFlare who made the switch in previous years.) A single hosting provider's decision can result in enabling encryption for hundreds of thousands or millions of customers; we hope others will take the plunge too! U.S. government sites also made significant progress adopting HTTPS this year, responding to the administration's guidance in support of HTTPS—a clear and practical explanation of why secure connections should be the default. A caveat: data from Google shows that use of HTTPS varies significantly from country to country, remaining especially uncommon in Japan. We've also heard that it's still uncommon across much of East and Southeast Asia. Next year, we'll have to find ways to bridge those gaps.
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
Paul Merrell

The 28 Pages and the War on Terror: Is Congress in a State of Willful Ignorance? | 28 P... - 0 views

  • Today more than ever, Americans are struggling to unravel the Gordian knot of overt and covert alliances that comprise the Middle East’s geostrategic landscape. As they do, politicians and pundits constantly remind them that reaching the correct conclusions about the region is imperative if we are to thwart the menace of terrorism and prevent the next 9/11.
  • On January 8th of this year, by way of a “Dear Colleague” letter, Jones and Massachusetts Congressman Stephen Lynch urged every one of their fellow House representatives to read the 28 pages for themselves. Among those who heeded their call was Rep. Massie. At a March 11 press conference in which he joined Jones and Lynch in imploring peers to examine the redacted finding, Massie offered a striking description of his reaction to the revelations within the 28 pages, saying: “It was a really disturbing event for me to read those. I had to stop every two or three pages and rearrange my perception of history. And it’s that fundamental…it certainly changes your view of the Middle East.”
  • For everyday Americans, ignorance about what lies within the 28 pages is imposed; for apparently far too many in Congress, that ignorance is willful. You see—unlike the citizens they represent—when it comes to reading or not reading the 28 pages, legislators enjoy the luxury of a choice: After securing permission through their respective intelligence committee, representatives and senators can venture into a guarded, soundproof room at the Capitol and read the classified findings on foreign government assistance to the 9/11 hijackers in their entirety. Astonishingly—given what’s at stake for the country and for the lives of servicemembers and civilians alike—there are indications only a slim minority have bothered to do so. Rep. Walter Jones North Carolina’s Walter Jones is one congressman who did take the initiative to learn what lies in the 28 pages. Later, he said, “I was absolutely shocked by what I read. What was so surprising was that those whom we thought we could trust really disappointed me.” He added, “The information is critical to our foreign policy moving forward and should thus be available to the American people.”
  • ...4 more annotations...
  • As if a thicket of misinformation, hit-and-miss journalism and competing propaganda didn’t make the challenge daunting enough, the American people face an even more formidable barrier in their attempts to reach informed and rational conclusions about U.S. policy in the Middle East: the classification of a 28-page finding on foreign government support of the 9/11 hijackers—classification that continues over the objections of the chairman and vice-chairman of the 9/11 Commission and the former senator who co-chaired the inquiry that produced the 28 pages. Preventing a hypothetical “next 9/11″ starts with a clear understanding of what enabled the actual one—yet, even as the U.S. military prepares for the next chapter in the seemingly perpetual War on Terror, Americans continue to be denied critical knowledge about how the September 11 attacks were planned and funded. Reflecting on that disconnect, Kentucky Congressman Thomas Massie recently told Slate, “Until we know what enabled or caused 9/11, we shouldn’t be talking about starting a third war to prevent another 9/11.”
  • in what could well emerge as a national security scandal that engulfs much of Congress, there are indications that, when it comes to acquiring essential knowledge to shape policies that safeguard the country, a majority of legislators have thus far made a conscious decision to remain ignorant: As of this writing, 13 of the House’s 432 representatives have joined as cosponsors of a Jones-authored resolution urging the president to declassify the 28 pages. A source on the Hill who is familiar with the declassification effort is personally unaware of any representative who has read the 28 pages over the last several months who didn’t emerge from the experience as a supporter of declassification. When you overlay one of those observations on the other, the result points to a woefully low level of interest among the nation’s legislators in learning what “shocking,” “surprising” and “history-rearranging” facts are contained in the classified passage.
  • Those indications paint a bleak—albeit, tentative—portrait of Congressional diligence in overseeing national security policy. What’s needed now is a precise, name-by-name accounting of which representatives and senators have read the 28 pages and which have not. To that end, 28Pages.org urges constituents, journalists and transparency advocacy organizations to help bring accountability to this essential issue of national security job performance by contacting legislators and asking them two simple, yes-or-no questions: Have you read the 28 pages? If not, have you asked permission from your intelligence committee to do so? Shortly, 28Pages.org will announce its own contribution to this national exercise in Congressional accountability. However, a thorough accounting will only be achieved with the participation of citizens, journalists and transparency advocates. And with every House and 36 Senate seats up for election on Nov. 4, the faster the country collectively assembles a name-by-name roster of 28-pages readership on the Hill, the better position voters will be in to evaluate incumbents using this potent indicator of their attentiveness to matters of national security.
  • We provide a wealth of resources to help citizens do their part, and journalists are encouraged to contact us for insights on this issue.
Paul Merrell

Canadians have united to reject fear and stop Bill C-51. Will the government listen? | ... - 0 views

  • It's rare in Canadian politics to see intense public interest in government legislative proposals -- let alone to see Canadians take to the streets in the tens of thousands to protest a piece of legislation by name. Yet that's exactly what has happened in the case of Bill C-51, which critics, including The Globe and Mail's editorial team, say will undermine basic democratic values and lead to the creation of a "secret police force" in Canada. In the space of a few short months since Bill C-51 was announced, hundreds of thousands of people have taken action to stop it: signing petitions, writing letters to local newspapers, phoning and writing to their member of Parliament, and hitting the streets in nationwide demonstrations in over 70 communities across Canada. It's not hard to see why so many people are concerned. Canada's top privacy and security experts warn that this legislation will undermine democratic rights Canadians have enjoyed for generations. For example, according to professors Craig Forcese and Kent Roach, who have conducted a detailed legal analysis of the legislation, Bill C-51 will:
  • Undermine Canadians' privacy by allowing widespread information disclosures among government agencies, and by giving the Canadian Security and Intelligence Service (CSIS) access to personal information held by up to 17 government departments. Even Stephen Harper has admitted that these kinds of dragnet surveillance measures are ineffective. Chill free speech online by criminalizing what is loosely defined as the promotion of "terrorism offences in general" and even showing "reckless disregard" for whether a particular post may encourage a violent act. As Forcese and Roach point out in their testimony to the Senate Standing Committee on National Security and Defence, "The new speech crime in our view violates freedom of expression because it reaches well beyond the sort of speech that threatens actual violence." Dramatically expand the powers of CSIS, without any commensurate increase in oversight or review measures. The legislation even allows CSIS to obtain a warrant permitting them to break the law and contravene the Charter rights of Canadians. Under C-51, such warrants would be granted in a secret hearing, with no representation from the target of such measures, and with no right of appeal.
  • So it's no surprise that Canadians are worried. What is unprecedented however, is the sheer number of Canadians taking part in the campaign to stop the bill. My organization, OpenMedia, has been campaigning on privacy issues for years -- but in all our time, we've never seen a public outpouring quite like this. Our joint efforts are clearly having an impact: public opinion has swung dramatically against Bill C-51 since it was announced. Support has plummeted, with a recent Forum Research poll finding that 56 per cent of Canadians now oppose Bill C-51, with just 33 per cent in favour. The business community, civic society groups, and principled conservatives have all spoken out. Sadly, there's no sign that the government is listening. At the time of writing, the government seems determined to use its majority to ram the legislation through the Commons in the coming weeks. What's even more worrying is that this reckless, dangerous, and ineffective legislation will further undermine Canadians' privacy rights -- rights that have already been seriously damaged by the government's Bill C-13, passed late last year, and by the government's failure to address the mass surveillance activities of its Canadian Security Establishment (CSE) intelligence agency.
Paul Merrell

Profit Prisons - Inmates Charged for Jail Stay, Left Buried in Debt When they Get Out -... - 0 views

  • Did you know that people who end up in prison for a variety of different reasons have a very good chance of being charged a fee for every day that they stay behind bars as if they were voluntarily staying at a hotel? According to a new ACLU report, this is exactly what is happening all across the United States, in select prisons where these policies have been enacted. The BBC reported that roughly 10 million people in the United States owe a combined total of over $10 billion in “pay-to-stay” prison debt. Obviously, these fees can make a bad situation even worse for people who are serving time for petty crimes, especially considering that most of the people who do end up behind bars come from lives of poverty to begin with. Now, when many of these inmates are released from prison they are unable to get back on their feet due to this crippling debt. Some people who have been arrested for petty offenses, many drug-related, are released from jail with tens of thousands of dollars worth of debt that make it near impossible for them to rebuild their lives.
  • This week, the ACLU has released one of the first comprehensive reports on the “pay-to-stay” policies that have been implemented at prisons around the country. Mike Brickner of the ACLU told the BBC that these policies are destructive to people who come from lives of poverty, and to make matters worse they don’t even work. “We’re hearing from people who are claiming this is going on their credit scores and preventing them from doing all sorts of things. They simply don’t work. People are coming out of jail with hundreds or thousands of dollars’ worth of debt, and if you are a returning citizen, having that is just another albatross around your neck. It’s a program that maybe feels good to people who have a tough on crime mentality, but, in fact, it’s sort of a fruitless exercise,” Brickner said. Even supporters of the program have admitted that it doesn’t bring in enough money to justify its existence. Dale Osborne, a jail administrator from the state of Ohio where 40 out of 75 jails have pay-to-stay policies, has defended the program, but admits that it is a failure and that he would not really miss it. “It offsets the expenses that the taxpayers are required to have. The more revenue I can generate within a facility, the less the taxpayers have to pay,” he said, adding that “If we lost the ability to have a pay-for-stay program here I’m not going to have any huge heartache over the loss of it.” While it may not be a huge advantage to the prisons, this program is a massive disadvantage for former prisoners who are attempting to re-enter society.
Gary Edwards

Romney Did Not Lose - 0 views

  •  
    excerpt: I'm still formulating how I need to proceed in light of this new understanding, but what I know, and what I need to factor into my future calculations is the fact that we - the people who love our country and favor fiscal sanity and subscribe to the ideals of the Founders - are not outnumbered. We remain in the majority. I can't remember ever having been here. I grew up in the '60s, but served in the military rather than in Haight-Ashbury. I raised my family to be responsible and self-sufficient, just as my parents did. I guess you could say I was more or less aligned with the "establishment" of the day, even though I have for years disagreed with the trend toward more socialism and fascism. Today, the Establishment has crossed a line. They have arrayed themselves against the majority of the American people. I won't be joining them. I won't be agreeing with them. I won't be accepting their "truth." I will, instead, stand for my truth. And I suspect I am not alone. The usurpers (for I can't reasonably refer to them otherwise) are now the "establishment" even though they are really in the minority. So… that makes us… what? Well, what do you call someone who stands against the Establishment? Feels kinda odd to be in those shoes, doesn't it? Welcome to the Resistance. ......................... ...................................... Historical data on 56 previous elections indicate at least 15 to 20 million votes flipped and missing. Data available for everyone right in front of our eyes. Out of 56 presidential elections there were only 7 elections that voter turn out was down from previous elections. The combined total for all 7 elections is 13,428,613 or 0.73% out of all 56 elections generating 1,835,207,811 votes. These 7 elections had events such as war of 1812, civil war, ww2, stock market crash attached to declines in voter turn out. The average growth in all presidential elections is 2,892,573 per election. The
Paul Merrell

How Government and the Media Equate Political Dissent with "Conspiracy Theories" and "H... - 0 views

  • In this age of propaganda and disinformation when mainstream media outlets act as presstitutes for the corporatized federal government, there has been an overt movement in recent years to label dissenters, patriots, government critics and even returning US soldiers from the warfronts as potential homegrown terrorists. For decades the government and co-opted mainstream media’s onetime favorite tactic heavy-handedly used to customarily dismiss their critics was to simply label those exposing government deception as “conspiracy theorists.” However, with distrust mounting amongst Americans toward both their leaders (86% distrust government) and the media (over 60% little or no trust toward media), this strategy is no longer working because so many conspiracies have been proven to be real. With a fascist state worried that its authority is fast slipping away amongst its populace, today the stakes have never been higher. Slander, character assassination and guilt by association are increasingly utilized nowadays as favorite tools to systematically destroy, discredit and demonize those citizens courageous enough to speak the truth exposing government lies, deception, theft and destruction.
  • Raising the stakes from the relative benign label “conspiracy theorist” to “homegrown terrorist” reflects a parallel process the US government has historically employed in manufacturing convenient enemies as needed – Russia and China’s expanding Communism from the 1950’s cold war through the 1980’s, to al Qaeda’s expanding terrorism in the twenty-first century and now back to Russia and China’s expanding imperialism all over again. The vicious cycle locked by design in a forever do-loop as the same subversive strategy remains unchanged throughout the years, only the names and dates change as the government self-servingly sees fit. As long as there are enemy targets to conveniently blame designed to induce fear and elicit support from a dumbed down, brainwashed and powerless American public, war and the military security complex will continue to flourish on a perpetual permanency basis, of course at the expense of humanity both domestically and globally.
Paul Merrell

Asia Times Online :: It was Putin's missile! - 0 views

  • And here's the spin war verdict: the current Malaysia Airlines tragedy - the second in four months - is "terrorism" perpetrated by "pro-Russian separatists", armed by Russia, and Vladimir Putin is the main culprit. End of story. Anyone who believes otherwise, shut up. Why? Because the CIA said so. Because Hillary "We came, we saw, he died" Clinton said so. Because batshit crazy Samantha "R2P" Power said so - thundering at the UN, everything duly printed by the neo-con infested Washington Post. [1] Because Anglo-American corporate media - from CNN to Fox (who tried to buy Time Warner, which owns CNN) - said so. Because the President of the United States (POTUS) said so. And mostly because Kiev had vociferously said so in the first place.
  • Right off the bat they were all lined up - the invariably hysterical reams of "experts" of the "US intelligence community" literally foaming at their palatial mouths at "evil" Russia and "evil" Putin; intel "experts" who could not identify a convoy of gleaming white Toyotas crossing the Iraqi desert to take Mosul. And yet they have already sentenced they don't need to look any further, instantly solving the MH17 riddle.
  • It doesn't matter that President Putin has stressed the MH17 tragedy must be investigated objectively. And "objectively" certainly does not mean that fictional "international community" notion construed by Washington - the usual congregation of pliable vassals/patsies. And what about Carlos?
  • ...7 more annotations...
  • A simple search at reveals that MH17 was in fact diverted 200 kilometers north from the usual flight path taken by Malaysia Airlines in the previous days - and plunged right in the middle of a war zone. Why? What sort of communication MH17 received from Kiev air control tower? Kiev has been mute about it. Yet the answer would be simple, had Kiev released the Air Traffic Control recording of the tower talking to flight MH17; Malaysia did it after flight MH370 disappeared forever. It won't happen; SBU security confiscated it. So much for getting an undoctored explanation on why MH17 was off its path, and what the pilots saw and said before the explosion. The Russian Defense Ministry, for its part, has confirmed that a Kiev-controlled Buk anti-aircraft missile battery was operational near the MH17's crash. Kiev has deployed several batteries of Buk surface-to-air missile systems with at least 27 launchers; these are all perfectly capable of bringing down jets flying at 33,000 ft.
  • Radiation from a battery's Kupol radar, deployed as part of a Buk-M1 battery near Styla (a village some 30km south of Donetsk) was detected by the Russian military. According to the ministry, the radar could be providing tracking information to another battery which was at a firing distance from MH17's flight path. The tracking radar range on the Buk system is a maximum of 50 miles. MH17 was flying at 500 mph. So assuming the "rebels" had an operational Buk and did it, they would have had not more than five minutes to scan all the skies above, all possible altitudes, and then lock on. By then they would have known that a cargo plane could not possibly be flying that high. For evidence supporting the possibility of a false flag, check here.
  • "Everything has been recorded on radar. For those that don't believe it, it was taken down by Kiev; we know that here (in traffic control) and the military air traffic control know it too (7.14)" "The Ministry of the Interior did know that there were fighter aircraft in the area, but the Ministry of Defense didn't. (7.15)" "The military confirm that it was Ukraine, but it is not known where the order came from. (7.31)" Carlos's assessment (a partial compilation of his tweets is collected here http://slavyangrad.wordpress.com/2014/07/18/spanish-air-controller-kiev-borispol-airport-ukraine-military-shot-down-boeing-mh17/ ): the missile was fired by the Ukraine military under orders of the Ministry of Interior - NOT the Ministry of Defense. Security matters at the Ministry of the Interior happen to be under Andriy Parubiy, who was closely working alongside US neo-cons and Banderastan neo-nazis on Maidan.
  • And then there's the curiouser and curiouser story of Carlos, the Spanish air traffic controller working at Kiev's tower, who was following MH17 in real time. For some Carlos is legit - not a cipher; for others, he's never even worked in Ukraine. Anyway he tweeted like mad. His account - not accidentally - has been shut down, and he has disappeared; his friends are now desperately looking for him. I managed to read all his tweets in Spanish when the account was still online - and now copies and an English translation are available. These are some of his crucial tweets: "The B777 was escorted by 2 Ukrainian fighter jets minutes before disappearing from radar (5.48 pm)" "If the Kiev authorities want to admit the truth 2 fighter jets were flying very close a few minutes before the incident but did not shoot down the airliner (5.54)" "As soon as the Malaysia Airlines B777 disappeared the Kiev military authority informed us of the shooting down. How did they know? (6.00)"
  • Assuming Carlos is legit, the assessment makes sense. The Ukrainian military are divided between Chocolate king President Petro Poroshenko - who would like a d?tente with Russia essentially to advance his shady business interests - and Saint Yulia Timoshenko, who's on the record advocating genocide of ethnic Russians in Eastern Ukraine. US neo-cons and US "military advisers" on the ground are proverbially hedging their bets, supporting both the Poroshenko and Timoshenko factions. So who profits? The key question remains, of course, cui bono? Only the terminally brain dead believe shooting a passenger jet benefits the federalists in Eastern Ukraine, not to mention the Kremlin. As for Kiev, they'd have the means, the motive and the window of opportunity to pull it off - especially after Kiev's militias have been effectively routed, and were in retreat, in the Donbass; and this after Kiev remained dead set on attacking and bombing the population of Eastern Ukraine even from above. No wonder the federalists had to defend themselves.
  • And then there's the suspicious timing. The MH17 tragedy happened two days after the BRICS announced an antidote to the IMF and the World Bank, bypassing the US dollar. And just as Israel "cautiously" advances its new invasion/slow motion ethnic cleansing of Gaza. Malaysia, by the way, is the seat of the Kuala Lumpur War Crimes Commission, which has found Israel guilty of crimes against humanity. Washington, of course, does profit. What the Empire of Chaos gets in this case is a ceasefire (so the disorganized, battered Kiev militias may be resupplied); the branding of Eastern Ukrainians as de facto "terrorists" (as Kiev, Dick Cheney-style, always wanted); and unlimited mud thrown over Russia and Putin in particular until Kingdom Come. Not bad for a few minutes' work. As for NATO, that's Christmas in July. From now on, it all depends on Russian intelligence. They have been surveying/tracking everything that happens in Ukraine 24/7. In the next 72 hours, after poring over a lot of tracking data, using telemetry, radar and satellite tracking, they will know which type of missile was launched, where from, and even produce communications from the battery that launched it. And they will have access to forensic evidence.
  • Unlike Washington - who already knows everything, with no evidence whatsoever (remember 9/11?) - Moscow will take its time to know the basic journalistic facts of what, where, and who, and engage on proving the truth and/or disproving Washington's spin. The historical record shows Washington simply won't release data if it points to a missile coming from its Kiev vassals. The data may even point to a bomb planted on MH17, or mechanical failure - although that's unlikely. If this was a terrible mistake by the Novorossiya rebels, Moscow will have to reluctantly admit it. If Kiev did it, the revelation will be instantaneous. Anyway we already know the hysterical Western response, no matter what; Russia is to blame. Putin is more than correct when he stressed this tragedy would not have happened if Poroshenko had agreed to extend a cease-fire, as Merkel, Hollande and Putin tried to convince him in late June. At a minimum, Kiev is already guilty because they are responsible for safe passage of flights in the airspace they - theoretically - control. But all that is already forgotten in the fog of war, tragedy and hype. As for Washington's hysterical claims of credibility, I leave you with just one number: Iran Air 655.
  •  
    Pepe Escobar again.  Cui bono, indeed. It's the first question that should be asked when investigating any mystery.  
Paul Merrell

FOIA Reform Bill on Senate Judiciary Agenda, State Secrets, and Much More: FRINFORMSUM ... - 0 views

  • Finally, this week’s #tbt document pick – and recently picked up by Reddit’s TIL feed – is a March 1967 CIA report entitled “Views on Trained Cats [Redacted] for [Redacted] Use,” more popularly known as the CIA’s “acoustic kitty” project. In what the CIA described as a “remarkable scientific achievement,” though later conceding it was not a “practical eavesdropping device,” the CIA stuffed a live cat with electronic spying equipment and attempted to train it to become a Cold War spy. After the cat had batteries and wires placed inside of it and an antenna inserted into its tail, several CIA agents took it outside to a park to see if it would, well, work. The cat was promptly hit by a taxi instead. The project cost 15$ million.
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

Why the Sony hack is unlikely to be the work of North Korea. | Marc's Security Ramblings - 0 views

  • Everyone seems to be eager to pin the blame for the Sony hack on North Korea. However, I think it’s unlikely. Here’s why:1. The broken English looks deliberately bad and doesn’t exhibit any of the classic comprehension mistakes you actually expect to see in “Konglish”. i.e it reads to me like an English speaker pretending to be bad at writing English. 2. The fact that the code was written on a PC with Korean locale & language actually makes it less likely to be North Korea. Not least because they don’t speak traditional “Korean” in North Korea, they speak their own dialect and traditional Korean is forbidden. This is one of the key things that has made communication with North Korean refugees difficult. I would find the presence of Chinese far more plausible.
  • 6. Whoever is doing this is VERY net and social media savvy. That, and the sophistication of the operation, do not match with the profile of DPRK up until now. Grugq did an excellent analysis of this aspect his findings are here – http://0paste.com/6875#md 7. Finally, blaming North Korea is the easy way out for a number of folks, including the security vendors and Sony management who are under the microscope for this. Let’s face it – most of today’s so-called “cutting edge” security defenses are either so specific, or so brittle, that they really don’t offer much meaningful protection against a sophisticated attacker or group of attackers.
  • 5. The attackers only latched onto “The Interview” after the media did – the film was never mentioned by GOP right at the start of their campaign. It was only after a few people started speculating in the media that this and the communication from DPRK “might be linked” that suddenly it became linked. I think the attackers both saw this as an opportunity for “lulz” and as a way to misdirect everyone into thinking it was a nation state. After all, if everyone believes it’s a nation state, then the criminal investigation will likely die.
  • ...4 more annotations...
  • 3. It’s clear from the hard-coded paths and passwords in the malware that whoever wrote it had extensive knowledge of Sony’s internal architecture and access to key passwords. While it’s plausible that an attacker could have built up this knowledge over time and then used it to make the malware, Occam’s razor suggests the simpler explanation of an insider. It also fits with the pure revenge tact that this started out as. 4. Whoever did this is in it for revenge. The info and access they had could have easily been used to cash out, yet, instead, they are making every effort to burn Sony down. Just think what they could have done with passwords to all of Sony’s financial accounts? With the competitive intelligence in their business documents? From simple theft, to the sale of intellectual property, or even extortion – the attackers had many ways to become rich. Yet, instead, they chose to dump the data, rendering it useless. Likewise, I find it hard to believe that a “Nation State” which lives by propaganda would be so willing to just throw away such an unprecedented level of access to the beating heart of Hollywood itself.
  • 8. It probably also suits a number of political agendas to have something that justifies sabre-rattling at North Korea, which is why I’m not that surprised to see politicians starting to point their fingers at the DPRK also. 9. It’s clear from the leaked data that Sony has a culture which doesn’t take security very seriously. From plaintext password files, to using “password” as the password in business critical certificates, through to just the shear volume of aging unclassified yet highly sensitive data left out in the open. This isn’t a simple slip-up or a “weak link in the chain” – this is a serious organization-wide failure to implement anything like a reasonable security architecture.
  • The reality is, as things stand, Sony has little choice but to burn everything down and start again. Every password, every key, every certificate is tainted now and that’s a terrifying place for an organization to find itself. This hack should be used as the definitive lesson in why security matters and just how bad things can get if you don’t take it seriously. 10. Who do I think is behind this? My money is on a disgruntled (possibly ex) employee of Sony.
  • EDIT: This appears (at least in part) to be substantiated by a conversation the Verge had with one of the alleged hackers – http://www.theverge.com/2014/11/25/7281097/sony-pictures-hackers-say-they-want-equality-worked-with-staff-to-break-in Finally for an EXCELLENT blow by blow analysis of the breach and the events that followed, read the following post by my friends from Risk Based Security – https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack EDIT: Also make sure you read my good friend Krypt3ia’s post on the hack – http://krypt3ia.wordpress.com/2014/12/18/sony-hack-winners-and-losers/
  •  
    Seems that the FBI overlooked a few clues before it told Obama to go ahead and declare war against North Korea. 
Paul Merrell

Letters from 9/11 Family Group to Obama Go Unanswered | 28 Pages.org - 0 views

  • On three separate occasions, 9/11 Families United for Justice Against Terrorism has sent letters to President Obama, asking him to declassify the 28-page finding on foreign government support of the 9/11 hijackers. Each letter takes a slightly different approach to pleading for the release of the redacted section of a joint House/Senate intelligence study, but one thing they share in common is the response from the president and the White House: complete silence. One would think an organized group of 9/11 family members would at least merit the courtesy of a presidential reply—if only to say he had received their letter and would give due consideration to their request. Instead, Obama has opted to ignore them, despite the fact that he has reportedly twice promised 9/11 families he would declassify the 28 pages. The group sent its first letter on June 20, 2013, and never heard back. The group tried again on May 9, 2014—just ahead of the dedication of the 9/11 Museum in New York. Again, silence. Still determined, the organization sent a third letter on June 24 of this year that has likewise gone unanswered.
  • The letters remind the president of his promises to 9/11 families, and point to the large and growing number of credible experts—including former Senator Bob Graham, who co-chaired the inquiry that created the 28 pages, and both the chairman and vice-chairman of the 9/11 Commission—who say there’s no valid national security reason for the continued secrecy. Indeed, even past and present Secretaries of State in the Obama White House Hillary Clinton and John Kerry are on record urging the declassification of the 28 pages; they did so as senators in a letter to George W. Bush. You can read the group’s most recent letter here. It was delivered to the White House by North Carolina Congressman Walter Jones, who introduced and continues to champion H.Res.428, which urges the president to declassify the 28 pages.
Paul Merrell

Most Agencies Falling Short on Mandate for Online Records - 0 views

  • Nearly 20 years after Congress passed the Electronic Freedom of Information Act Amendments (E-FOIA), only 40 percent of agencies have followed the law's instruction for systematic posting of records released through FOIA in their electronic reading rooms, according to a new FOIA Audit released today by the National Security Archive at www.nsarchive.org to mark Sunshine Week. The Archive team audited all federal agencies with Chief FOIA Officers as well as agency components that handle more than 500 FOIA requests a year — 165 federal offices in all — and found only 67 with online libraries populated with significant numbers of released FOIA documents and regularly updated.
  • Congress called on agencies to embrace disclosure and the digital era nearly two decades ago, with the passage of the 1996 "E-FOIA" amendments. The law mandated that agencies post key sets of records online, provide citizens with detailed guidance on making FOIA requests, and use new information technology to post online proactively records of significant public interest, including those already processed in response to FOIA requests and "likely to become the subject of subsequent requests." Congress believed then, and openness advocates know now, that this kind of proactive disclosure, publishing online the results of FOIA requests as well as agency records that might be requested in the future, is the only tenable solution to FOIA backlogs and delays. Thus the National Security Archive chose to focus on the e-reading rooms of agencies in its latest audit. Even though the majority of federal agencies have not yet embraced proactive disclosure of their FOIA releases, the Archive E-FOIA Audit did find that some real "E-Stars" exist within the federal government, serving as examples to lagging agencies that technology can be harnessed to create state-of-the art FOIA platforms. Unfortunately, our audit also found "E-Delinquents" whose abysmal web performance recalls the teletype era.
  • E-Delinquents include the Office of Science and Technology Policy at the White House, which, despite being mandated to advise the President on technology policy, does not embrace 21st century practices by posting any frequently requested records online. Another E-Delinquent, the Drug Enforcement Administration, insults its website's viewers by claiming that it "does not maintain records appropriate for FOIA Library at this time."
  • ...9 more annotations...
  • "The presumption of openness requires the presumption of posting," said Archive director Tom Blanton. "For the new generation, if it's not online, it does not exist." The National Security Archive has conducted fourteen FOIA Audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  • The federal government has made some progress moving into the digital era. The National Security Archive's last E-FOIA Audit in 2007, " File Not Found," reported that only one in five federal agencies had put online all of the specific requirements mentioned in the E-FOIA amendments, such as guidance on making requests, contact information, and processing regulations. The new E-FOIA Audit finds the number of agencies that have checked those boxes is now much higher — 100 out of 165 — though many (66 in 165) have posted just the bare minimum, especially when posting FOIA responses. An additional 33 agencies even now do not post these types of records at all, clearly thwarting the law's intent.
  • The FOIAonline Members (Department of Commerce, Environmental Protection Agency, Federal Labor Relations Authority, Merit Systems Protection Board, National Archives and Records Administration, Pension Benefit Guaranty Corporation, Department of the Navy, General Services Administration, Small Business Administration, U.S. Citizenship and Immigration Services, and Federal Communications Commission) won their "E-Star" by making past requests and releases searchable via FOIAonline. FOIAonline also allows users to submit their FOIA requests digitally.
  • THE E-DELINQUENTS: WORST OVERALL AGENCIES In alphabetical order
  • Key Findings
  • Excuses Agencies Give for Poor E-Performance
  • Justice Department guidance undermines the statute. Currently, the FOIA stipulates that documents "likely to become the subject of subsequent requests" must be posted by agencies somewhere in their electronic reading rooms. The Department of Justice's Office of Information Policy defines these records as "frequently requested records… or those which have been released three or more times to FOIA requesters." Of course, it is time-consuming for agencies to develop a system that keeps track of how often a record has been released, which is in part why agencies rarely do so and are often in breach of the law. Troublingly, both the current House and Senate FOIA bills include language that codifies the instructions from the Department of Justice. The National Security Archive believes the addition of this "three or more times" language actually harms the intent of the Freedom of Information Act as it will give agencies an easy excuse ("not requested three times yet!") not to proactively post documents that agency FOIA offices have already spent time, money, and energy processing. We have formally suggested alternate language requiring that agencies generally post "all records, regardless of form or format that have been released in response to a FOIA request."
  • Disabilities Compliance. Despite the E-FOIA Act, many government agencies do not embrace the idea of posting their FOIA responses online. The most common reason agencies give is that it is difficult to post documents in a format that complies with the Americans with Disabilities Act, also referred to as being "508 compliant," and the 1998 Amendments to the Rehabilitation Act that require federal agencies "to make their electronic and information technology (EIT) accessible to people with disabilities." E-Star agencies, however, have proven that 508 compliance is no barrier when the agency has a will to post. All documents posted on FOIAonline are 508 compliant, as are the documents posted by the Department of Defense and the Department of State. In fact, every document created electronically by the US government after 1998 should already be 508 compliant. Even old paper records that are scanned to be processed through FOIA can be made 508 compliant with just a few clicks in Adobe Acrobat, according to this Department of Homeland Security guide (essentially OCRing the text, and including information about where non-textual fields appear). Even if agencies are insistent it is too difficult to OCR older documents that were scanned from paper, they cannot use that excuse with digital records.
  • Privacy. Another commonly articulated concern about posting FOIA releases online is that doing so could inadvertently disclose private information from "first person" FOIA requests. This is a valid concern, and this subset of FOIA requests should not be posted online. (The Justice Department identified "first party" requester rights in 1989. Essentially agencies cannot use the b(6) privacy exemption to redact information if a person requests it for him or herself. An example of a "first person" FOIA would be a person's request for his own immigration file.) Cost and Waste of Resources. There is also a belief that there is little public interest in the majority of FOIA requests processed, and hence it is a waste of resources to post them. This thinking runs counter to the governing principle of the Freedom of Information Act: that government information belongs to US citizens, not US agencies. As such, the reason that a person requests information is immaterial as the agency processes the request; the "interest factor" of a document should also be immaterial when an agency is required to post it online. Some think that posting FOIA releases online is not cost effective. In fact, the opposite is true. It's not cost effective to spend tens (or hundreds) of person hours to search for, review, and redact FOIA requests only to mail it to the requester and have them slip it into their desk drawer and forget about it. That is a waste of resources. The released document should be posted online for any interested party to utilize. This will only become easier as FOIA processing systems evolve to automatically post the documents they track. The State Department earned its "E-Star" status demonstrating this very principle, and spent no new funds and did not hire contractors to build its Electronic Reading Room, instead it built a self-sustaining platform that will save the agency time and money going forward.
Paul Merrell

MEDIA FAIL: Is the West's Coverage of Ukraine a Failure of Nuclear Proportions? - WhoWh... - 0 views

  • Last July, The New York Times declared, “The Ukrainian conflict has gone on far too long, and it has become far too dangerous. There is one man who can stop it — President Vladimir Putin of Russia.” In the intervening months, the media’s assessment of Putin has only grown harsher, with his actions in Ukraine being seen as a possible prelude to a full-scale Russian invasion, along the lines of his 2008 takeover of two provinces in the nation of Georgia. But this analysis is dangerously unbalanced.
  • While Putin has made many missteps in the Ukrainian crisis–and many in Georgia in 2008–the West is far from blameless. If, as the Times asserts, it’s all Putin’s fault, then the U.S. and its allies have few options beyond waiting for him to have a sudden change of heart. But if the West can acknowledge its own mistakes and start to rectify them, that might point the way to resolving the current conflict before it escalates further, even possibly to nuclear threats. In considering options, let’s first look at the perception that Ukraine is a repeat of Putin’s land-grab in Georgia. That in turn has been compared to Hitler’s dismemberment of Czechoslovakia 70 years earlier. This analogy, with its hot-button allusion to the West’s appeasement of Nazi Germany at Munich in 1938, was promoted by, among others, former Secretary of State Hillary Clinton. But in fact, it was one-sided coverage in the mainstream Western media that created the false impression that Putin alone was responsible for the 2008 Russian-Georgian War. Disregarded in this coverage was a finding by European Union investigators that Georgia, backed by the West, had in fact fired the first shots. The EU ultimately found blame on both sides.
  • In Ukraine, Putin has justified his cross-border interventions as required to protect ethnic Russians from threats by hostile neighbors. His stated concerns may be self-serving, but not necessarily as misplaced as Western governments and media make out. Key precipitating events are left out of the narrative. For example, Western media barely covered a May 2, 2014, fire in the Black Sea port city of Odessa, where dozens of pro-Russian separatists were burned alive after they barricaded themselves in a government building to escape a violent Ukrainian mob. Ukrainian nationalists surrounded the building, sang the Ukrainian national anthem, and chanted the equivalent of “Burn, Russians, burn!” while the building went up in flames. An even more egregious failure of American mainstream media coverage in Ukraine came during the February 2014 anti-government demonstrations in Ukraine’s capital of Kiev. When sniper fire killed nearly 100 Ukrainians, Western media repeatedly stated as fact that the shots came from the forces of then-Ukrainian President Viktor Yanukovych, who had tilted toward Russia. Outrage over the deaths fueled calls for Yanukovych’s head, and on February 21 he fled the capital, eventually ending up in southern Russia, where he remains in exile.
  • ...4 more annotations...
  • But virtually ignored by the American mainstream media was a bombshell allegation by Estonian Foreign Minister Urmas Paet. On Feb. 26, 2014, Paet—no friend of Russia’s—said in an intercepted and later authenticated phone call: “There is now stronger and stronger understanding that behind [the] snipers, it was not Yanukovych, but it was somebody from the new coalition.” What Paet called “the new coalition” is essentially the West-leaning Ukrainian government that succeeded Yanukovych. (Please see the full transcript of the conversation here, the most relevant 48 seconds here, and audio of the entire conversation here.) Getting It Right In such conflicts, the truth is one of the first casualties.
  • For an American media outlet willing to tackle this issue, one has to turn to The National Interest, a specialized journal on international relations. Although its parent, The Center for the National Interest, was originally called The Nixon Center—hardly a left-wing group—it recently published “Ukraine Exposed: Kiev’s Authoritarianism” by James Carden, who served as an advisor to the U.S.-Russia Bilateral Presidential Commission at the State Department from 2011 to 2012. Questioning U.S. policy in Ukraine, Carden wrote: From the very start of the Ukraine crisis, Washington’s neoconservative lobby has sought to downplay the less appealing aspects of the government that came to power in Kiev in February. … But examples of the new authoritarianism gripping Kiev have become tougher to miss in recent months … Carden goes on to highlight a case in point. In October, Poroshenko signed a decree establishing October 14 as an official “Day of Ukrainian Defenders” to commemorate the founding of the Ukrainian Insurrectionist Army, known as the UPA, during World War II. Carden then notes:
  • As the historian Halik Kochanski has noted, the UPA worked hand in hand with Poland’s Nazi occupiers, killing, to take but one example, nearly 10,000 Poles over the night of July 11-12, 1943. “A feature of the UPA action,” according to Kochanski, “was its sheer barbarity. They were not content merely to shoot their victims but often tortured them first or desecrated their bodies afterwards.” … Don’t let anyone tell you Russia has a monopoly on “disinformation.” Thus, in its zeal to legitimize Poroshenko’s anti-Russian government in Kiev, the mainstream American media managed to ignore his commemoration of former Ukrainian atrocities. Under the Nuclear Cloud
  • The Risks of Ignorance
Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Paul Merrell

Press Gaggle by Press Secretary Josh Earnest en route Cleveland, OH, 3/18/15 | The Whit... - 0 views

  • Q    -- talking about the Palestinian state issue over the last couple of days, citing the election.  But now that the election is over and Prime Minister Netanyahu has been reelected, can you talk a little bit about what that means for the U.S. goals in the peace process and the hope for a two-state solution?
  • Q    -- that you guys may no longer favor a two-state solution, or that you may reevaluate sort of your ability to cooperate with Netanyahu?
  • it has long been the policy of the United States and it continues to be the view of the President that a two-state solution is the best way to address those tensions and address that instability.
  • ...1 more annotation...
  • Q    Netanyahu said that there would not be a Palestinian state for as long as he’s Prime Minister.  So the U.S. position is that you favor a two-state solution.  But he’s saying that he doesn’t want that as long as he’s in office.  So does that mean the Mideast peace process is essentially dormant for the rest of the Obama administration?  MR. EARNEST:  It means for today -- it means that for today that based on Prime Minister Netanyahu’s comments, the United States will reevaluate our position and the path forward in the situation.
  •  
    "And it has long been the policy of the United States and it *continues* to be the view of the President that a two-state solution is the best way to address those tensions and address that instability. ... "[T]he United States will reevaluate our position and the path forward in the situation." Those are the two most substantive sentences in quite a bit of White House Press Secretary blathering about Netanyahu's statement that there will not be a Palestinian State, chucking overboard even Israel's lip service to the 2-state solution. And at that, it doesn't say much to Joe Sixpack. But in diplomat-speak, it signals that even the future of the 2-state solution is up for discussion at the White House.  That signal should be causing heart palpitations in Israeli government and undoubtedly is within Mossad and the Israeli Defense Force. IDF went public over a year ago with its concerns that a severe national security problem was resulting in rapidly worsening isolation of Israel because of the Palestine Question and Palestine Civil Society's call for the Boycott, Divestment, and Sanctions of settlement-produchttps://nsarchive.wordpress.com/2015/03/13/posting-foia-releases-online-saves-agencies-time-and-money/ed goods with a goal of a single-state solution.  Not a word by the White House Press Secretary about what the U.S. will do about Netanyahu's statement that there will be no Palestinian State. That underscores that the Obama Administration was taken by suprise when Netanyahu said it. But it is not a matter that Obama may delay long in announcing a far more substantive position. 
Paul Merrell

Cashless Society War Intensifies During Global Epocalypse Washington's Blog - 0 views

  • In the fall of 2015, the world descended into an economic apocalypse that will transform the globe into a single cashless society. This bold prediction is based on trends in nations all over the earth as shown in the article below. As we enter 2016, we are only beginning to see this Epocalypse form through the fog of war. The war I’m talking about is the world war waged furiously by central banks against the Great Recession as the governments they supposedly serve fiddled while their capital burned. The governments and banks of this world advanced rapidly toward forming cashless societies throughout 2015. The citizens of some countries are already embracing the move. In other countries, like the US, citizens fear the loss of autonomy that would come from giving governments and their designated central banks absolute monetary control.
  • The Epocalypse that I’ve been describing in this series will overcome that resistance during 2016 and 2017 as it wrecks economic havoc to such a degree that cash hold-outs will be ready for whatever holds the greatest promise of saving them from their collapsed monetary systems, fallen banks, deflated stocks and suffocating debt. One has only to think about how quickly and readily American citizens forfeited their constitutional civil liberties after 9/11 when George Bush and congress decreed that search warrants were not necessary if the government branded you a “terrorist.” If this sounds like some wild conspiracy theory, consider the following: no less Sterling standard of global economics than The Economist predicted thirty years ago that by 2018 a global currency would rise like the phoenix out of the ashes of the world’s fiat currencies:
  • Charging people to keep their money in the bank is hard to do so long as cash is available, as people may just withdraw all of their money from those banks in the form of the national cash and squirrel the cash away. In order to penetrate the twilight zone of economics, central banks need to abolish cash to terminate this escape route. Then they can force savers to spend, thereby increasing the flow of money through the economy, by raising the cost of holding money in a bank account as high as it takes to get people to spend their money. No sense letting perfectly good money waste away in an expensive bank account. Transitioning into a cashless society is the ultimate central planner’s dream as it gives central banks total control over money, and money is their proprietary product.
  • ...1 more annotation...
  • The drive to breach the national boundaries of money and establish a global cashless society has become a World War on cash with IMF backing to go digital and global.
Paul Merrell

WHO ARE SYRIA'S WHITE HELMETS (terrorist linked)? - 0 views

  • The White Helmets have been demonstrated to be a primarily US and NATO funded organisation embedded in Al Nusra and ISIS held areas exclusively. This is an alleged “non-governmental” organisation, the definition of an NGO, that thus far has received funding from at least three major NATO governments, including $23 million from the US Government and $29 million (£19.7 million) from the UK Government, $4.5 million (€4 million) from the Dutch Government. In addition, it receives material assistance and training funded and run by a variety of other EU Nations. A request has been put into the EU Secretary General to provide all correspondence relating to the funding and training of the White Helmets. By law this information must be made transparent and available to the public. There has been a concerted campaign by a range of investigative journalists to expose the true roots of these Syria Civil Defence operatives, known as the White Helmets.  The most damning statement, however, did not come from us, but from their funders and backers in the US State Department who attempted to explain the US deportation of the prominent White Helmet leader, Raed Saleh, from Dulles airport on the 18th April 2016.
  • To condense our research on the Syria White Helmets, we have collated all relevant articles and interviews below.  We condemn wholeheartedly any senseless murder but we recommend that there is serious public and political re-evauluation of the morality of funding a US NATO organisation established to further “regime change” objectives in Syria. Mass murder is being committed across Syria and the region by US and NATO proxy terrorist militants. Funding the White Helmets will serve to prolong the suffering and bloodshed of the Syrian people.
  • Vanessa Beeley 21st Century Wire Who are the White Helmets? This is a question that everyone should be asking themselves. A hideous murder of a rising star in UK politics, Jo Cox MP, has just sent shock waves across the world. Within hours of her death, a special fund was established in her name to raise money for 3 causes. One of those causes is the Syrian White Helmets. Are we seeing a cynical and obscene exploitation of Jo Cox’s murder to revive the flagging credibility of a US State Department & UK Foreign Office asset on the ground in Syria, created and sustained as first responders for the US and NATO Al Nusra/Al Qaeda forces?
  • ...12 more annotations...
  • FOLLOW THE MONEY: The White Helmets are just one component of the new NGO Complex.
  • “It was unclear whether Mr. Saleh’s name might have shown up on a database, fed by a variety of intelligence and security agencies and intended to guard against the prospect of terrorism suspects slipping into the country.” ~ New York Times Mark Toner, State Department spokesperson: “And any individual – again, I’m broadening my language here for specific reasons, but any individual in any group suspected of ties or relations with extremist groups or that we had believed to be a security threat to the United States, we would act accordingly. But that does not, by extension, mean we condemn or would cut off ties to the group for which that individual works for.” http://https://www.youtube.com/watch?v=792ODrhwKkk So we come back to the initial question.  Why is the tragic death of a passionate and ambitious politician being exploited? Why are all political parties in the UK endorsing the Jo Cox fund to provide financial assistance for an organisation the UK Government is already funding and training? Why are the public once more being used as political pawns to further our government’s imperialist objectives inside Syria and their covert, illegal, proxy intervention of a sovereign nation via both terrorist forces and phony humanitarian first responders?
  • The White Helmets are perhaps being demonstrated to be the most crucial component of the US and NATO shadow state building inside Syria.  Led by the US and UK this group is essential to the propaganda stream that facilitates the continued media and political campaign against the elected Syrian government and permits the US and NATO to justify their regime of crippling economic and humanitarian sanctions against the Syrian people. If this latest mechanised ‘NGO’ blueprint is successful then we could see it being re-deployed as key to future neo-colonialist projects. The White Helmets are a direct intra-venus line into the terrorist enclaves within Syria, acting as a conduit for information, equipment and medical support to maintain the US NATO forces. Is this the future of warfare, is this the “swarming” outlined in a 2000 report produced by the RAND Corporation and entitled: Swarming and the Future of Conflict. “The emergence of a military doctrine based on swarming pods and clusters requires that defense policymakers develop new approaches to connectivity and control and achieve a new balance between the two. Far more than traditional approachesto battle, swarming clearly depends upon robust information flows. Securing these flows, therefore, can be seen as a necessary condition for successful swarming.”
  • An important “previously unpublished interview with Jo Cox” was released today by Adam Barnett.  In this interview Jo Cox makes a clear statement regarding the way the UK Government should be maximising the use of their assets, the White Helmets, inside Syria: “Second thing: many organisations, whether it’s the White Helmets or others, have got really creative ideas about how to operate under the siege and civil war conditions. They’ve got really interesting ideas about channelling money, getting aid in, thinking creatively about how they operate, which DfID [Department for International Development] should be listening to. [emphasis added] And then the third thing is about giving airtime to civil society groups, making sure that they get more time on panels– and making sure this is representative of the diversity of civil society views as well, whether that’s women’s groups, or the White Helmets, or NGOs, or just doctors or people who are literally trying to get on with making society function in response to the humanitarian crisis.” Is this why we are seeing what is, in effect, crowd funding for  proxy war? Do we really want to look back and be “judged by history” for enabling conflict and state terrorism, violating international law and invading sovereign nations.  Are we prepared to accept the consequences of such actions, consequences that should be taken by our governments alone but are now being diffused outwards to the general public.  Is this an attempt by our government to disassociate themselves from their criminal actions?
  • Vanessa Beeley speaks to Mike Robinson of UK Column about recent executions of Syrian Arab Army soldiers celebrated by White Helmet operatives.” Watch:
  • “Speaking to Mnar Muhawesh on ‘Behind the Headline,’ investigative journalist Vanessa Beeley pulls back the curtain on the anti-Assad ‘freedom fighters’ and ‘moderate rebels,’ revealing a carefully calibrated propaganda campaign to drive US intervention in the war-torn country.” Watch:
  • Video made by Hands Off Syria in Sydney Australia based upon the research of Vanessa Beeley on the White Helmets. Watch: http://https://www.youtube.com/watch?v=5k6hSS6xBTw Mint Press: US Propaganda War in Syria: Report Ties White Helmets to US Intervention “White Helmets primary function is propaganda” reported an independent journalist, who tied the group to George Soros and the controversial advocacy group Avaaz.” Change.org Petition: Do NOT give 2016 Nobel Peace Prize to Syria White Helmets This petition has currently garnered 1370 signatures. The White Helmets have received over $ 40 million in funding from the US Government [USAID] and the UK Foreign Office despite their claims of being “fiercely independent and accepts no money from governments, corporations or anyone directly involved in the Syrian conflict.” Sputnik: Soros Sponsored NGO in Syria Aims at Ousting Assad not Saving Civilians “One of the largest humanitarian organizations operating in war-torn Syria – the White Helmets – has been accused of being an anti-government propaganda arm that encourages direct foreign intervention.” 21st Century Wire: Syria’s White Helmets, War by Way of Deception Part 1 This piece examines the role of the Syria Civil Defence aka,’The White Helmets’ currently operating in Syria and take a closer look at their financial sources and mainstream media partners in order to better determine if they are indeed “neutral” as media moguls proclaim these “humanitarians” to be.
  • 21st Century Wire: Part II. Syria’s White Helmets, “Moderate” Executioners The NGO hydra has no more powerful or influential serpentine head in Syria than the Syria Civil Defence aka The White Helmets who, according to their leader and creator, James Le Mesurier, hold greater sway than even ISIS or Al Nusra confabs over the Syrian communities. This article explores the White Helmet involvement in terrorist executions of civilians particularly in Aleppo. 21st Century Wire: Humanitarian Propaganda War Against Syria – Led by Avaaz and the White Helmets “The White Helmets in their haste to point the finger of blame at Moscow, managed to tweet about Russia’s air strikes several hours before the Russian Parliament actually authorized the use of the Air Force in Syria.” ~ Sott.net UK Column: Syria White Helmets “Mike Robinson speaks to Vanessa Beeley about the so-called NGO, the White Helmets. Are they really the humanitarian first responder organisation they claim to be?” Watch: http://https://www.youtube.com/watch?v=mLa9ztvAGWw Eva Bartlett: Human Rights Front Groups Warring on Syria This page will continue to expand as more so-called “Human Rights” groups are outed for propagating anti-Syria war rhetoric and false allegations against the Syrian government and Syrian Arab Army.  As it is, the list of players is quite extensive.  Below, I’ll list the known HR front people and groups (many, if not most, with links to the US State Department and criminals like George Soros). Ron Paul Institute: Syria the Propaganda Ring We have demonstrated that the White Helmets are an integral part of the propaganda vanguard that ensures obscurantism of fact and propagation of Human Rights fiction that elicits the well-intentioned and self righteous response from a very cleverly duped public. A priority for these NGOs is to keep pushing the No Fly Zone scenario which has already been seen to have disastrous implications for innocent civilians in Libya, for example. Dissident Voice: Seven Steps of Highly Effective Manipulators “But White Helmets primary function is propaganda. White Helmets demonizes the Assad government and encourages direct foreign intervention.”
  • Prof Tim Anderson: Syrian Women Denounce the White Helmets “A range of Syrian women have denounced the US-UK funded group the ‘White Helmets’, led by a former British soldier and recently revealed to be financed by USAID. They come from all the country’s communities (e.g. Sunni, Alawi, Druze, Christian) but, like most Syrians, prefer to identify simply as Syrian.” Khamenei.ir: Interview with Prof. Tim Anderson NATO’s Dirty War on Syria “The ‘White Helmets’ are a Wall Street creation, funded and led by the US and the UK, to give ‘humanitarian’ cover to the al Qaeda groups they support.” AlternativeView7:  Syria: White Helmets Exposed “We live in a world governed by propaganda where the majority of media mouthpieces are gagged by those who own them and only permitted to release information that serves the narrative of the ruling elite or Imperialist powers.”
  • Please note that the child that is rescued is very clean considering she has allegedly been buried under the rubble of “regime” bombing raids..we do not in any way wish to detract from the heroic work of the true first responders on the ground in Syria, the real Syria Civil Defence and the Red Crescent who are never mentioned in the western media but we do wish to draw your attention to the propaganda methods being employed to amplify US and NATO narratives that are insisting upon “regime change.”
  • We will add to the above articles and interviews as they become available.  Vanessa Beeley has just completed a speaking tour of the UK and Iran during which she highlighted the role of the NGO complex in general and the White Helmets in particular as a new breed of predatory humanitarianism being unleashed against target nations. Videos of her talks will be published as soon as they become available from the AV7 conference and Frome Stop War.
  • Author Vanessa Beeley is a special contributor to 21WIRE, and since 2011, she has spent most of her time in the Middle East reporting on events there – as a independent researcher, writer, photographer and peace activist. She is also a US Peace Council delegate and a volunteer with the Global Campaign to Return to Palestine. See more of her work at her blog The Wall Will Fall.
1 - 20 of 88 Next › Last »
Showing 20 items per page