Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged body-cameras

Rss Feed Group items tagged

Paul Merrell

Microsoft Helping to Store Police Video From Taser Body Cameras | nsnbc international - 0 views

  • Microsoft has joined forces with Taser to combine the Azure cloud platform with law enforcement management tools.
  • Taser’s Axon body camera data management software on Evidence.com will run on Azure and Windows 10 devices to integrate evidence collection, analysis, and archival features as set forth by the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy. As per the partnership, Taser will utilize Azure’s machine learning and computing technologies to store police data on Microsoft’s government cloud. In addition, redaction capabilities of Taser will be improved which will assist police departments that are subject to bulk data requests. Currently, Taser is operating on Amazon Web Services; however this deal may entice police departments to upgrade their technology, which in turn would drive up sales of Windows 10. This partnership comes after Taser was given a lucrative deal with the Los Angeles Police Department (LAPD) last year, who ordered 7,000 body cameras equipped with 800 Axom body cameras for their officers in response to the recent deaths of several African Americans at the hands of police.
  • In order to ensure Taser maintains a monopoly on police body cameras, the corporation acquired contracts with police departments all across the nation for the purchase of body cameras through dubious ties to certain chiefs of police. The corporation announced in 2014 that “orders for body cameras [has] soared to $24.6 million from October to December” which represents a 5-fold increase in profits from 2013. Currently, Taser is in 13 cities with negotiations for new contracts being discussed in 28 more. Taser, according to records and interviews, allegedly has “financial ties to police chiefs whose departments have bought the recording devices.” In fact, Taser has been shown to provide airfare and luxury hotels for chiefs of police when traveling for speaking engagements in Australia and the United Arab Emirates (UAE); and hired them as consultants – among other perks and deals. Since 2013, Taser has been contractually bound with “consulting agreements with two such chiefs’ weeks after they retired” as well as is allegedly “in talks with a third who also backed the purchase of its products.”
Paul Merrell

With more police wearing cameras, the fight over footage has begun in Florida - Columbi... - 0 views

  • As more police departments equip their officers with body-worn cameras, the question of who gets access to that footage—and at what cost—is fast becoming a new frontier in open-records policy. Here in Florida, with one of the strongest public-records laws in the country, that frontier may soon be shaped by a couple of factors. One is a lawsuit filed by a Sarasota attorney against the local police department over fees for release of video footage. The second is a bill in the state legislature that would create new exemptions in the public records law when it comes to body cameras. The details of the suit and the bill are unique to the Sunshine State. But in the wake of Michael Brown, Eric Garner, and the Justice Department’s scathing report on biased policing in Ferguson, MO, as hopes for greater police accountability and improved community relations are pinned in part on wider use of the cameras, both warrant close attention.
Paul Merrell

FBI demands new powers to hack into computers and carry out surveillance | US news | Th... - 0 views

  • The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight. The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.
  • “This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing. The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district. But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
  • Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.
  • ...2 more annotations...
  • Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.” Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.” Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.
  • Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that. In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
  •  
    This rule change has been in the works during the last year.  "The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" - that is, their location has been hidden using tools such as Tor."  Are we dizzy yet? The State Department is pushing the use of TOR by dissidents in nations whose governments State and the CIA intends to overthrow. Meanwhile, Feed Bag, Inc. wants use of TOR to be sufficient grounds for installing malware on anyone using it to make their systems and all their systems can see or hear be an open book. Let's see. There's the First Amendment right to anonymous speech just to begin with. McIntyre v. Ohio Elections Comm'n, 514 US 334 (1995). ("Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation-and their ideas from suppression-at the hand of an intolerant society. The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.") (Internal citation omitted.) And of course there's the Natural Law liberty to whisper, to utter words in a way that none but the intended recipient can hear. So throw on the violation of the Fifth Amendment's Liberty clause. Then there's the plain language of the Fourth Amendment warrant clause, "particularly describing the *place* to be searched." Not to mention the major reason for the Fourth Amendment, to abolish the "general warrant" that had enabled the Crown to search wherever the warrant's executor's little heart desired.  And th
Paul Merrell

Blair and Bush went to war in Iraq despite South Africa's WMD assurances, book states |... - 0 views

  • Tony Blair went to war in Iraq despite a report by South African experts with unique knowledge of the country that showed it did not possess weapons of mass destruction, according to a book published on Sunday.
  • God, Spies and Lies, by South African journalist John Matisonn, describes how then president Thabo Mbeki tried in vain to convince both Blair and President George W Bush that toppling Saddam Hussein in 2003 would be a terrible mistake. Mbeki’s predecessor, Nelson Mandela, also tried to convince the American leader, but was left fuming that “President Bush doesn’t know how to think”. The claim was this week supported by Mbeki’s office, which confirmed that he pleaded with both leaders to heed the WMD experts and even offered to become their intermediary with Saddam in a bid to maintain peace. South Africa had a special insight into Iraq’s potential for WMD because the apartheid government’s own biological, chemical and nuclear weapons programme in the 1980s led the countries to collaborate. The programme was abandoned after the end of white minority rule in 1994 but the expert team, known as Project Coast, was put back together by Mbeki to investigate the US and UK assertion that Saddam had WMD – the central premise for mounting an invasion.
  • Mbeki, who enjoyed positive relations with both Blair and Saddam, asked for the team to be granted access. “Saddam agreed, and gave the South African team the freedom to roam unfettered throughout Iraq,” writes Matisonn, who says he drew on sources in Whitehall and the South African cabinet. “They had access to UN intelligence on possible WMD sites. The US, UK and UN were kept informed of the mission and its progress.” The experts put their prior knowledge of the facilities to good use, Matisonn writes. “They already knew the terrain, because they had travelled there as welcome guests of Saddam when both countries were building WMD.” On their return, they reported that there were no WMDs in Iraq. “They knew where the sites in Iraq had been, and what they needed to look like. But there were now none in Iraq.”
  • ...1 more annotation...
  • In January 2003, Mbeki, who succeeded Mandela as president, sent a team to Washington to explain the findings, but with little success. Mbeki himself then met Blair for three hours at Chequers on 1 February, the book relates. He warned that the wholesale removal of Saddam’s Ba’ath party could lead to a national resistance to the occupying coalition forces. But with huge military deployments already under way, Blair’s mind was clearly made up. When Frank Chikane, director-general in the president’s office, realised that the South Africans would be ignored, it was “one of the greatest shocks of my life”, he later wrote in a memoir. Matisonn adds: “Mandela, now retired, had tried as well. On Iraq, if not other issues, Mandela and Mbeki were on the same page. Mandela phoned the White House and asked for Bush. Bush fobbed him off to [Condoleezza] Rice. Undeterred, Mandela called former President Bush Sr, and Bush Sr called his son the president to advise him to take Mandela’s call. Mandela had no impact. He was so incensed he gave an uncomfortable comment to the cameras: ‘President Bush doesn’t know how to think,’ he said with visible anger.”
  •  
    'President Bush doesn't know how to think,' 
Paul Merrell

Fresno Police Roll Out Dystopian 'Threat Ranking' System - 0 views

  • “On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.” Though the intricate surveillance apparatus described above seems straight from a dystopic novel, it is actually the Washington Post’s recent description of the the visual data collection system employed by a local California police department. The police department in Fresno, California, has taken extreme measures to combat high rates of crime in the city. As the Post reports, Fresno’s Real Time Crime Center, buried deep in the police station’s headquarters, has developed as a response to what many police call increasing threats. The system, according to police officials, can “provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases” — a feature they say is increasingly important in the wake of events like the November terror attack in Paris and the San Bernardino shooting last month.
  • “Our officers are expected to know the unknown and see the unseen,” Fresno Chief of Police Jerry Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.” Programs similar to the Real Time Crime Center have launched in New York, Houston, and Seattle over the course of the last decade. Nationwide, the use of Stingrays, data fusion centers, and aerial drone surveillance have broadened the access local police have to private information. In another example, the FBI is continually developing a comprehensive biometric database that local police access every day. “This is something that’s been building since September 11,” says Jennifer Lynch, a senior attorney at the Electronic Frontier Foundation. Like the problem of police militarization, Lynch traces the trend back to the Pentagon: “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”
  • While many of these programs may fail to shock Americans, one new software program takes police scrutiny of private citizens to a new level. Beware, a software tool produced by tech firm Intrado, not only surveils the data of the citizens of Fresno, the first city to test it — it calculates threat levels based on what it discovers. The software scours arrest records, property records, Deep Web searches, commercial databases, and social media postings. By this method, it was able to designate a man with a firearm and gang convictions involved in a real-time domestic violence dispute as the highest of three threat levels: a bright red ranking. Fresno police say the intelligence from Beware aided them, as the man eventually surrendered and officers found he was armed with a gun. Beware scours billions of data points to develop rankings for citizens, and though few recoil at the thought of catching criminals and miscreants, the program provides particular cause for concern because of both its invasiveness and its fallibility.
  • ...3 more annotations...
  • These shortcomings have sparked concern among Fresno’s city council members, who discussed the issue at a meeting in November. At that meeting, one council member cited an incident where a girl who posted on social media about a card game called “Rage” was consequently given an elevated threat ranking — all because “rage” could be a triggering keyword for Beware. At that same meeting, libertarian-leaning Republican councilman Clinton J. Olivier asked Chief Dyer to use the technology to calculate his threat level. In real-time, Olivier was given a green, or non-threatening ranking, but his home received a yellow, or medium, threat ranking. It was likely due to the record of his home’s prior occupant. “Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier told Dyer. “That may not be fair to me.” He added later, “[Beware] has failed right here with a council member as the example.” “It’s a very unrefined, gross technique,” Fresno civil rights attorney, Rob Nabarro, has said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen,” he noted, echoing Olivier’s worries.
  • Further, though Fresno police use Beware, they are left in the dark about how it determines rankings. Intrado designates the method a “trade secret,” and as such, will not share it with the officers who use it. This element of the software’s implementation has concerned civil rights advocates like Nabarro. He believes the secrecy surrounding the technology may result in unfair, unchecked threat rankings. Nabarro cautioned that between the software’s secrecy and room for error, Beware could accidentally rank a citizen as dangerous based on, for example, posts on social media criticizing police. This potential carries with it the ability for citizens to be punished not for actual crimes, but for exercising basic constitutional rights. Further, it compromises the rights of individuals who have been previously convicted of crimes, potentially using past behavior to assume guilt in unrelated future incidents. Chief Dyer insists concerns are exaggerated and that a particular score does not guarantee a particular police response. Police maintain the tools are necessary to fight crime. Nevertheless, following the heated November meeting, Dyer suggested he would work to turn off the color-coded threat ranking due to citizens’ concerns. “It’s a balancing act,” he admitted.
  • It remains to be seen if Fresno police and residents will move forward with the technology or shut it down over privacy concerns. City officials in Oakland, California, for example, recently scaled back plans to establish a Real Time Crime Center after outraged citizens protested. At the very least, as Northern California ACLU attorney Matt Cagle said, “[W]henever these surveillance technologies are on the table, there needs to be a meaningful debate. There needs to be safeguards and oversight.”
  •  
    Claiming trade secrecy for the software's selection criteria for threat ranking actually constitutes policy policy, the trade secrecy claim would probably not survive judical review. It's at least arguably an unconstitutional delegation of a government function (ranking citizens as threats) to a private company. Police departments in Florida were sued to produce records of how a related surveillance device, the Stingray IMSI device that intercepts cell phone calls by mimicking a cell-phone tower, and only averted court-ordered disclosure of its trade secret workings by the FBI swooping in just before decision to remove all the software documentation from local police possession, custody, and control.    There is a long chain of case law holding that information that is legitimately trade secret and proprietary loses that protection if adopted by local or federal government as law. With a software program that classifies citizens as threats for governmental purposes if they meet the program's selection criteria, the software is performing a strictly governmental function that is in reality law. 
Paul Merrell

Protocols of the Hackers of Zion? « LobeLog - 0 views

  • When Israeli Prime Minister Benjamin Netanyahu met with Google chairman Eric Schmidt on Tuesday afternoon, he boasted about Israel’s “robust hi-tech and cyber industries.” According to The Jerusalem Post, “Netanyahu also noted that ‘Israel was making great efforts to diversify the markets with which it is trading in the technological field.'” Just how diversified and developed Israeli hi-tech innovation has become was revealed the very next morning, when the Russian cyber-security firm Kaspersky Labs, which claims more than 400 million users internationally, announced that sophisticated spyware with the hallmarks of Israeli origin (although no country was explicitly identified) had targeted three European hotels that had been venues for negotiations over Iran’s nuclear program.
  • Wednesday’s Wall Street Journal, one of the first news sources to break the story, reported that Kaspersky itself had been hacked by malware whose code was remarkably similar to that of a virus attributed to Israel. Code-named “Duqu” because it used the letters DQ in the names of the files it created, the malware had first been detected in 2011. On Thursday, Symantec, another cyber-security firm, announced it too had discovered Duqu 2 on its global network, striking undisclosed telecommunication sites in Europe, North Africa, Hong Kong, and  Southeast Asia. It said that Duqu 2 is much more difficult to detect that its predecessor because it lives exclusively in the memory of the computers it infects, rather than writing files to a drive or disk. The original Duqu shared coding with — and was written on the same platform as — Stuxnet, the computer worm  that partially disabled enrichment centrifuges in Iranian nuclear power plants, according to a 2012 report in The New York Times. Intelligence and military experts said that Stuxnet was first tested at Dimona, a nuclear-reactor complex in the Negev desert that houses Israel’s own clandestine nuclear weapons program. While Stuxnet is widely believed to have been a joint Israeli-U.S. operation, Israel seems to have developed and implemented Duqu on its own.
  • Coding of the spyware that targeted two Swiss hotels and one in Vienna—both sites where talks were held between the P5+1 and Iran—so closely resembled that of Duqu that Kaspersky has dubbed it “Duqu 2.” A Kaspersky report contends that the new and improved Duqu would have been almost impossible to create without access to the original Duqu code. Duqu 2’s one hundred “modules” enabled the cyber attackers to commandeer infected computers, compress video feeds  (including those from hotel surveillance cameras), monitor and disrupt telephone service and Wi-Fi, and steal electronic files. The hackers’ penetration of computers used by the front desk would have allowed them to determine the room numbers of negotiators and delegation members. Duqu 2 also gave the hackers the ability to operate two-way microphones in the hotels’ elevators and control their alarm systems.
Paul Merrell

How US Propaganda Plays in Syrian War - Consortiumnews - 0 views

  • U.S. foreign policymakers have experimented at planting propaganda in social media and then citing it as evidence to support their goals, a process now playing out in the Syrian “regime change,” as Rick Sterling explains.
  • The major achievement of The Syria Campaign has been the branding and promotion of the “White Helmets,” also known as “Syria Civil Defense,” which began with a British military contractor, James LeMesurier, giving some rescue training to Syrians in Turkey with funding provided by the U.S. and U.K. The group stole this name from the REAL Syria Civil Defense as documented in this recent report from Aleppo. The “White Helmets” are marketed in the West as civilian volunteers doing rescue work. On Sept. 22, it was announced that the Right Livelihood Award , the so-called “Alternative Nobel Prize,” is being given to the U.S./U.K.-created White Helmets “for their outstanding bravery, compassion and humanitarian engagement in rescuing civilians from the destruction of the Syrian civil war.”  But the White Helmets are largely a propaganda tool promoting Western intervention against Syria. Unlike a legitimate rescue organization such as the Red Cross or Red Crescent, the “White Helmets” only work in areas controlled by the armed opposition. As shown in this video, the White Helmets pick up the bodies of individuals executed by the terrorists; they claim to be unarmed but are not; and they falsely claim to be neutral.
  • Many of the videos from Al Qaeda/terrorist-dominated areas of Syria have the “White Helmets” logo because the White Helmets work in alliance with these extremist groups as primarily a media marketing tool to raise public support for continuing the support to the armed opposition as well as the demonization of the Syrian government.  The Rights Livelihood press release said the White Helmets “remain outspoken in calling for an end to hostilities in the country.” But that is false, too. The White Helmets actively call for U.S./NATO military intervention through a “No Fly Zone,” which would begin with attacks upon and destruction of government anti-aircraft positions and aircraft. A Major Act of War Taking over the skies above another country is an act of war that would require a major U.S. military operation, according to senior American generals.
  • ...6 more annotations...
  • The New York Times reported that in 2012 General Martin E. Dempsey, chairman of the Joint Chiefs of Staff, told the White House that imposing a no-fly zone in Syria would require up to 70,000 American servicemen to destroy Syria’s antiaircraft system and then impose round-the-clock control over Syrian airspace. General Carter Ham, former commander of the U.S. Africa Command who oversaw the aerial attacks on Libya in 2011, said on CBS News that “I worry sometimes that, when people say ‘impose a no-fly zone,’ there is this almost antiseptic view that this is an easily accomplished military task. It’s extraordinarily difficult. … “It first entails — we should make no bones about it. It first entails killing a lot of people and destroying the Syrian air defenses and those people who are manning those systems. And then it entails destroying the Syrian air force, preferably on the ground, in the air if necessary. This is a violent combat action that results in lots of casualties and increased risk to our own personnel.”
  • In other words, an appeal for a “no-fly zone” is not a call for a non-violent solution. It is seeking a bloody act of war by the United States against Syria, a nation that poses no threat to America. It also would almost surely be carried out in violation of international law since a United Nations Security Council resolution would face vetoes from Russia and probably China. Also, the White Helmets have never criticized or called for the end of funding to extremist organizations including Nusra Front, Al Qaeda’s Syrian affiliate. On the contrary, White Helmets are generally embedded with this organization which is defined as “terrorist” by even the U.S., which is likely why the head of the White Helmets, Raed Saleh, was denied entry to the U.S. The foreign and marketing company origins of the White Helmets were exposed over 1½ years ago – and since then, writer Vanessa Beeley has revealed the organization in more depth in articles such as “Who Are the White Helmets?” and “War by Way of Deception.”  Despite these exposés, understanding of the White Helmets is limited, with many liberal and progressive people uncritically accepting the propaganda and misinformation about Syria. Much of the progressive media has effectively blocked or censored critical examinations amid a flood of propaganda about “barrel bombs” dropped by the “brutal dictator” and his “regime.” 
  • In the last week, Netflix started showing a 40-minute documentary movie about the “White Helmets” that amounts to a promotional video. A substantial portion of it takes place in Turkey where we see trainees in hotel rooms making impassioned phone calls to inquire about their families in Syria.  The “family values” theme is evident throughout, a good marketing angle. The political message of the video is also clear: after a bombing attack, “It’s the Russians …. they say they are fighting ISIS but they are targeting civilians.” The movie includes video previously promoted by the White Helmets such as the “Miracle Baby” rescue, an incident that may or may not have been staged. The video includes self-promoting proclamations such as “You are real heroes.” While no doubt there are some real rescues in the midst of war, many of the videos purporting to show the heroes at work have an unrealistic and contrived look to them as revealed here.
  • “Alternative media” in the West has echoed mainstream media regarding the Syria conflict. The result is that many progressive individuals and groups are confused or worse. For example, the activist group CodePink recently issued a media release promoting the Netflix White Helmets propaganda video. 
  • The White Helmets video is produced by Grain Media and Violet Films/Ultra-Violet Consulting, which advertises itself as a marketing corporation specializing in social media management, grant writing, crowd building and campaign implementation. The only question is who paid them to produce this video.  There is growing resistance to this manipulation and deception. In response to a petition to give the Nobel Peace Prize to the White Helmets, there is a counter petition at Change.org. Following the Right Livelihood Awards’ announcement, there will soon be a petition demanding retraction of the award to the White Helmets. The story of the White Helmets is principally a “feel good” hoax to manipulate public perception about the conflict in Syria and continue the drive for “regime change.” That’s why big money was paid to “Purpose” to “incubate” The Syria Campaign to brand and promote the White Helmets using Facebook, Twitter, etc. That’s why more big money was paid to create a self-promotional documentary. 
  • The judges at Rights Livelihood were probably influenced by the documentary since critical examination of facts around Syria is so rare. It’s a sad commentary on the media. As veteran war correspondent Stephen Kinzer recently wrote, “Coverage of the Syrian war will be remembered as one of the most shameful episodes in the history of the American press.”
Paul Merrell

Activist Post: 5 Reasons The Latest Report On Syria War Crimes Might Not Be True - 0 views

  • In a recently released and conveniently timed report, complete with references to Nazi Germany and concentration camps, efforts to ramp up support for a “tough line” against Syria at the upcoming Geneva II conference and even possible military intervention, are once again moving into high gear. The report, compiled by three British war crime prosecutors and three “forensic experts” claims that it has demonstrable proof that the Assad government is guilty of torturing and killing over ten thousand people. The report (accessed here) claims to show evidence of physical torture, murder, and starvation. Of course, the Syrian government denies the veracity of the claims of the report and Western media outlets repeat the claims as incontrovertible proof.
  • However, while the final determination of whether or not these claims are accurate is yet to be made, there exist ample reasons to question the assertions made in the report. 1. The Gulf State Feudal Monarchy Qatar is the sponsor of the report. Qatar is, of course, one of the major sponsors of the Syrian invasion (aka the Syrian “rebels”) and has played a massively important role in financing, training, arming, and directing the death squads currently being mopped up by the Assad government. 2. The source of the report. One would be justified in questioning the nature of the report since the sole source of the material comes by virtue of an allegedly “defected Syrian military police officer” who was apparently fine with photographing thousands of dead victims for over a year until now. Regardless of the possibility for such a “moral” conversion, taking information from a “defected” member of government forces once again returns us to the realm of the “activists say” school of journalism – a notorious method used by Western media outlets to promote the side of the death squads and only the side of the death squads as fact in popular reports.
  • 3. Past claims of Assad’s “Crimes Against Humanity.” It is important to remember past experiences with Western claims against Assad for alleged “crimes against humanity,” all of which turned out to have been committed by the death squads, not the Syrian government. From the Houla massacre to the Ghouta chemical weapons attacks, the Syrian government has been exonerated by all credible evidence. The death squads, however, have been proven guilty by virtue of their own video tapes and Youtube accounts, guilty of some of the most horrific acts imaginable. While many innocent people have no doubt been killed in the crossfire between the military and the death squads, the Western media has done everything in its power to place the blood of each and every death inside Syria in the hands of the government. Let us also not forget the other famous Codename, “Curveball,” that played a major role in the initiation of a previous and still ongoing conflict that was later admitted to be a fabrication. Being fooled by the same type of propaganda twice in ten years is indeed a humiliation too great for a country to bear.
  • ...2 more annotations...
  • 4.) Possibility that the death squads could have killed the victims shown in the report. The victims shown in the report have clearly been abused and starved. However, before jumping to conclusions about just how these unfortunate individuals met their fate, perhaps it would be a good idea to look back at the context of the victims. As mentioned earlier, the death squads operating in Syria are no strangers to crimes against humanity, murder, and torture. In fact, they have been both the initiators of such depravity and overwhelmingly the largest proprietors of it. Furthermore, the fact that the victims were starved does not necessarily mean that they were starved by the government. Indeed, it is important to remember that, due to the siege of a number of cities by both the military and the death squads as well as due to death squad cruelty and attempted cordoning off of specific areas, food shortage has been a serious concern in some areas for some time. There is also plentiful evidence of death squad groups killing innocent people and shipping their bodies to the places where cameras are set up, waiting for the recording of the propaganda piece. The Ghouta chemical attack is just one instance in which innocent civilians were captured and killed by the death squads and used as stage props for propaganda purposes.
  • Indeed, it is also important to remember that the death squads themselves are quite adept at keeping prisoners in atrocious conditions. Only a few months back, it was reported that the Syrian military was able to free a number of captive Syrian women from the hands of the death squads who had kept them in captivity in underground tunnels for months on end for the purposes of using them as sex slaves. 5.) The report was conveniently released just two days before the Geneva II Peace Conference meeting on Syria. After the retraction of an invitation to Iran to attend the peace conference, the Qatari-funded report was released just two days before the peace conference was scheduled to take place. With such evidence being studied and analyzed and a report being compiled, to believe that it was only a coincidence that the information was released two days before the conference is absurd. If this evidence was real and of such grave importance why are world leaders only learning of it now? If world leaders knew, why are we only learning of it now? Considering all of the information provided in this article, taken in conjunction with the “convenient” timing of the release of the reports (convenient, at least, for the enemies of Syria), such reports should be taken with a large grain of salt. The Western media has not only been wrong, but has lied on so many occasions in the past, that it cannot be expected to tell the truth now.
Paul Merrell

How NSA Can Secretly Aid Criminal Cases | Consortiumnews - 0 views

  • Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern. By Ray McGovern Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.” Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.
  • For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so. So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke. Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various ”authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”
  • Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.
  • ...8 more annotations...
  • Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October – told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.” These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.
  • Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution? Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment. Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”
  • We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.
  • We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too. The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism. Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.” The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.
  • The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations. Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.
  • Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.
  • “So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us: “It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”
  • Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
1 - 9 of 9
Showing 20 items per page