Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged copyright

Rss Feed Group items tagged

Paul Merrell

Own Your Own Devices You Will, Under Rep. Farenthold's YODA Bill | Bloomberg BNA - 0 views

  • A bill introduced Sept. 18 would make clear that consumers actually owned the electronic devices, and any accompanying software on that device, that they purchased, according to sponsor Rep. Blake Farenthold's (R-Texas). The You Own Devices Act (H.R. 5586) would amend the Copyright Act “to provide that the first sale doctrine applies to any computer program that enables a machine or other product to operate.” The bill, which is unlikely to receive attention during Congress's lame-duck legislative session, was well-received by consumer's rights groups.
  • Section 109(a) of the Copyright Act, 17 U.S.C. §109(a), serves as the foundation for the first sale doctrine. H.R. 5586 would amend Section 109(a) by adding a provision covering “transfer of computer programs.” That provision would state:if a computer program enables any part of a machine or other product to operate, the owner of the machine or other product is entitled to transfer an authorized copy of the computer pro gram, or the right to obtain such copy, when the owner sells, leases, or otherwise transfers the machine or other product to another person. The right to transfer provided under this subsection may not be waived by any agreement.
  • ‘Things' Versus SoftwareFarenthold had expressed concern during a Sept. 17 hearing on Section 1201 of the Digital Millennium Copyright Act over what he perceived was a muddling between patents and copyrights when it comes to consumer products. “Traditionally patent law has protected things and copyright law has protected artistic-type works,” he said. “But now more and more things have software in them and you are licensing that software when you purchase a thing.” Farenthold asked the witnesses if there was a way to draw a distinction in copyright “between software that is an integral part of a thing as opposed to an add-on app that you would put on your telephone.”
  • ...1 more annotation...
  • H.R. 5586 seeks to draw that distinction. “YODA would simply state that if you want to sell, lease, or give away your device, the software that enables it to work is transferred along with it, and that any right you have to security and bug fixing of that software is transferred as well,” Farenthold said in a statement issued Sept. 19.
Paul Merrell

WorldLII - WorldLII: About WorldLII - 0 views

  • You are here: WorldLII >> About WorldLII   What is WorldLII? The World Legal Information Institute (WorldLII) is a free, independent and non-profit global legal research facility developed collaboratively by the following Legal Information Institutes and other organisations. Australasian Legal Information Institute (AustLII) British and Irish Legal Information Institute (BAILII) Canadian Legal Information Institute (CanLII) Hong Kong Legal Information Institute (HKLII) Legal Information Institute (Cornell) (LII (Cornell)) Pacific Islands Legal Information Institute (PacLII) Wits University School of Law (Wits Law School) For further details, see the WorldLII brochure. The LIIs, meeting in Montreal in October 2002, adopted the Montreal Declaration on public access to law. WorldLII comprises three main facilities: Databases, Catalog and Websearch.
  • WorldLII Databases WorldLII provides a single search facility for databases located on the following Legal Information Institutes: AustLII; BAILII; CanLII; HKLII; LII (Cornell); and PacLII. WorldLII also includes as part of this searchable collection its own databases not found on other LIIs. These include databases of decisions of international Courts and Tribunals, databases from a number of Asian countries, and databases from South Africa (provided by Wits Law School). Over 270 databases from 48 jurisdictions in 20 countries are included in the initial release of WorldLII. Databases of case-law, legislation, treaties, law reform reports, law journals, and other materials are included. WorldLII welcomes enquiries concerning the possible inclusion of other databases on WorldLII or on one of its collaborating LIIs. WorldLII Catalog and Websearch The WorldLII Catalog provides links to over 15,000 law-related web sites in every country in the world. WorldLII's Websearch makes searchable the full text of as many of these sites as WorldLII's web-spider can reach. WorldLII welcomes enquiries from law librarians and other legal experts who are interested to become Contributing Editors to the WorldLII Catalog.
  • Operation of WorldLII The provision of the WorldLII service is coordinated by the Australasian Legal Information Institute (AustLII), which maintains WorldLII's user interface, the WorldLII Catalog and Websearch, and the databases located only on WorldLII. Technical enhancements to WorldLII are being developed jointly by the cooperating Legal Information Institutes. Contacting WorldLII General contact: feedback@worldlii.org AustLII/WorldLII Co-Directors: Professor Andrew Mowbray, UTS <andrew@austlii.edu.au> Professor Graham Greenleaf, UNSW <graham@austlii.edu.au> Philip Chung, AustLII Executive Director <philip@austlii.edu.au> Mail: WorldLII, c/- AustLII, UTS Faculty of Law, PO Box 123 Broadway NSW 2007 Australia Telephone: +61 2 9514 4921 Fax: +61 2 9514 4908 We hope that you enjoy using WorldLII and find it to be a useful service. Feedback (particularly words of encouragement or constructive criticism) are welcome and may be sent to feedback@worldlii.org. WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback URL: http://www.worldlii.org/worldlii/
  •  
    The various Legal information Institutes that collaborate on WorldLII have the most advanced, integrated, and largest public legal research databases available on the Internet, searchable through a common interface. Still nothing like a complete university law library because so many legal source materials are copyrighted, this is the combined effort of many law schools. A companion browser extension is available for Chrome and Firefox called Jureeka. That extension causes your pages rendered in the browser to contain hyperlinks to all legal authorities cited on the page that are recognized by the extension, with the links going to case law, regulations, and statues that are in the public domain. https://chrome.google.com/webstore/detail/jureeka/ediidjmindkcaflpfjgabfaibhngadbb?utm_source=chrome-app-launcher-info-dialog Thus far, Jureeka is integrated with all legal materials published by the Legal Information Institute long located at Cornell Law School, as well as the Justia archives of U.S. case law. Rumor has it that the extension will be extended to cover materials published by other Legal Information Institutes at various law schools around the globe.
Paul Merrell

Demand an End to Secret Copyright Trade Deals | EFF Action Center - 1 views

  • Senator Ron Wyden may hold the future of the Internet in his hands. Let's call on him to fix the secretive process that has led to trade deals carrying extreme copyright and digital privacy provisions.
  • As Senate Finance Committee Chair, Senator Wyden is under pressure to fast track trade agreements like the Trans-Pacific Partnership (TPP) agreement. But he has another option: to finally bring these deals out into the open. We call on him now to continue to stand up to big private interests and help ensure that our digital rights are protected.
Paul Merrell

Welcome to Life: the singularity, ruined by lawyers - YouTube - 0 views

  • Welcome to Life: the singularity, ruined by lawyers
  • Or: what you see when you die.
  •  
    Satire on our copyrighted afterlife.
Gary Edwards

911 - The New Pearl Harbor by Massimo Mazzucco - 0 views

  • "September 11 - The New Pearl Harbor" is a 5 hour documentary that summarizes 12 years of public debate on 9/11. While aimed primarily at a general, uninformed audience, the film also contains some new findings that may be of interest to advanced researchers. This film is intended as an educational, non-profit operation, and must remain so in order to fulfill all the requirements for the usage of copyrighted material. As such, the entire film is made available online for free from day one. Any purchase of the actual DVD will be considered as a form of donation to the author, in recognition of the time spent to put together this material. Free duplication and distribution of all DVDs is encouraged. At the bottom of the page you will find more information related to this film, including the links to order the DVD, and the TRAILER.
  •  
    The best 911 documentary i've ever seen. Period. ""September 11 - The New Pearl Harbor" is a 5 hour documentary that summarizes 12 years of public debate on 9/11. While aimed primarily at a general, uninformed audience, the film also contains some new findings that may be of interest to advanced researchers. This film is intended as an educational, non-profit operation, and must remain so in order to fulfill all the requirements for the usage of copyrighted material. As such, the entire film is made available online for free from day one. Any purchase of the actual DVD will be considered as a form of donation to the author, in recognition of the time spent to put together this material. Free duplication and distribution of all DVDs is encouraged. At the bottom of the page you will find more information related to this film, including the links to order the DVD, and the TRAILER."
  •  
    Best I've seen so far too. But it dives deep into a critical subset of the evidence that the official version of events is preposterous.There is far more evidence out there. E.g., the documentary doesn't deal with the evidence of Israeli involvement.
Gary Edwards

James Madison and the States Natural Right of Nullification ; Publius-Huldah's Blog - 0 views

  • What are the Two Conditions Precedent for Nullification?
  • The act of the federal government must be unconstitutional –  usually a usurpation of a power not delegated to the federal government in the Constitution; and
  • The act must be something The States or The People can “nullify”- i.e., refuse to obey:  the act must order them to do something or not do something.
  • ...38 more annotations...
  • If the federal government should overpass the just bounds of its authority and make a tyrannical use of its powers, the people, whose creature it is, must appeal to the standard [the Constitution] they have formed, and take such measures to redress the injury done to the Constitution as the exigency may suggest and prudence justify.”
  • When the act of the federal government is unconstitutional and orders The States or The People to do – or not do – something, nullification is the proper form of interposition.
  • When the act of the federal government is unconstitutional, but doesn’t order The States or The People to do – or not do – something (the alien & sedition acts), nullification is not possible. The States may interpose by objecting, as in The Virginia & Kentucky Resolutions of 1798.
  • When the act of the federal government is constitutional, but unjust (the Tariff Act of 1828), the States may not nullify it; but may interpose by objecting and trying to get the Tariff Act changed.
  • Our Founding Principles in a Nutshell
  • Rights come from God;
  • People create governments;
  • The purpose of government is to secure the rights God gave us; and
  • When a government We created seeks to take away our God given rights, We have the Right – We have the Duty – to alter, abolish, or throw off such government.
  • The former will be exercised principally on external objects, as war, peace, negotiation, and foreign commerce; with which last the power of taxation will, for the most part, be connected.
  • The powers reserved to the several States will extend to all the objects which … concern the lives, liberties, and properties of the people, and the internal order, improvement, and prosperity of the State.”
  • These enumerated powers concern: Military defense, international commerce & relations; Control of immigration and naturalization of new citizens; Creation of a uniform commercial system: Weights & measures, patents & copyrights, money based on gold & silver, bankruptcy laws, mail delivery & some road building; and With some of the Amendments, protect certain civil rights and voting rights (for blacks, women, citizens who don’t pay taxes, and citizens 18 years and older).
  • It is only with respect to the enumerated powers that the federal government has lawful authority over the Country at large. All other powers are “reserved to the several States” and The People.
  • It is to secure our rights to life and liberty by:
  • Military defense (Art. I, Sec. 8, cl. 11-16); Laws against piracy and other felonies committed on the high seas (Art. I, Sec. 8, cl. 10); Protecting us from invasion (Art IV, Sec. 4); Prosecuting traitors (Art III, Sec. 3); and Restrictive immigration policies (Art. I, Sec. 9, cl. 1).
  • It is to secure our property rights by:
  • Regulating trade & commerce so we can produce, sell & prosper (Art. I, Sec. 8, cl.3). The original intent of the interstate commerce clause is to prohibit States from levying tolls & taxes on articles of commerce as they are transported thru the States for buying & selling. Establishing uniform weights & measures and a money system based on gold & silver (Art I, Sec. 8, cl. 5) – inflation via paper currency & fractional reserve lending is theft! Punishing counterfeiters (Art I, Sec. 8, cl. 6); Making bankruptcy laws to permit the orderly dissolution or reorganization of debtors’ estates with fair treatment of creditors (Art I, Sec 8, cl. 4); and Issuing patents & copyrights to protect ownership of intellectual labors (Art I, Sec 8, cl 8)
  • It is to secure our right to liberty by:
  • Laws against slavery (13th Amendment); Providing fair trials in federal courts (4th, 5th, 6th, 7th, and 8th Amendments); and          Obeying the Constitution!
  • The fourth Founding Principle in our Declaration is this: When government takes away our God given rights, We have the Right & the Duty to alter, abolish, or throw off such government. Nullification is thus a natural right of self-defense:
  • 1. As we have just seen, Jefferson, Madison, and Hamilton saw nullification of unconstitutional acts of the federal government as a “natural right” – not a “constitutional right”. And since Rights come from God, there is no such thing as a “constitutional right”!
  • 2. The Right of Nullification, transcending as it does, the Constitution; and being nowhere prohibited by the Constitution to the States, is a reserved power.
  • The 10th Amendment says: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”
  • Madison’s Report on the Virginia Resolutions (1799-1800)
  • Now! Note Well:  Madison actually says, in the same Report Barnett cites, that it is “a plain principle, founded in common sense” that The States are the final authority on whether the federal government has violated our Constitution! Under his discussion of the 3rd Resolution, Madison says:
  • “It appears to your committee to be a plain principle, founded in common sense, illustrated by common practice, and essential to the nature of compacts; that where resort can be had to no tribunal superior to the authority of the parties, the parties themselves must be the rightful judges in the last resort, whether the bargain made, has been pursued or violated. The Constitution of the United States was formed by the sanction of the States, given by each in its sovereign capacity. It adds to the stability and dignity, as well as to the authority of the Constitution, that it rests on this legitimate and solid foundation. The States then being the parties to the constitutional compact, and in their sovereign capacity, it follows of necessity, that there can be no tribunal above their authority, to decide in the last resort, whether the compact made by them be violated; and consequently that as the parties to it, they must themselves decide in the last resort, such questions as may be of sufficient magnitude to require their interposition.” [emphasis mine]
  • Madison explains that if, when the federal government usurps power, the States cannot act so as to stop the usurpation, and thereby preserve the Constitution as well as the safety of The States; there would be no relief from usurped power. 
  • This would subvert the Rights of the People as well as betray the fundamental principle of our Founding:
  • …If the deliberate exercise, of dangerous power, palpably withheld by the Constitution, could not justify the parties to it, in interposing even so far as to arrest the progress of the evil, and thereby to preserve the Constitution itself as well as to provide for the safety of the parties to it; there would be an end to all relief from usurped power, and a direct subversion of the rights specified or recognized under all the State constitutions, as well as a plain denial of the fundamental principle on which our independence itself was declared.” [emphasis mine]
  • Madison answers the objection “that the judicial authority is to be regarded as the sole expositor of the Constitution, in the last resort”.
  • Madison explains that when the federal government acts outside the Constitution by usurping powers, and when the Constitution affords no remedy to that usurpation; then the Sovereign States who are the Parties to the Constitution must likewise step outside the Constitution and appeal to that original natural right of self-defense.
  • Madison goes on to say that all three Branches of the federal government obtain their delegated powers from the Constitution; and they may not annul the authority of their Creator.
  • but, where powers are assumed which have not been delegated, a nullification of the act is the rightful remedy: that every State has a natural right in cases not within the compact, (casus non foederis,) to nullify of their own authority all assumptions of power by others within their limits: that without this right, they would be under the dominion, absolute and unlimited, of whosoever might exercise this right of judgment for them…” [boldface mine]
  • Application Today
  • When WE THE PEOPLE ratified our Constitution, and thereby created the federal government, WE did not delegate to our “creature” power to control our medical care, restrict guns and ammunition, dictate what is done in the public schools, dictate how we use our lands, and all the thousands of things they do WE never gave them authority in our Constitution to do.
  • Accordingly, each State has a natural right to nullify these unconstitutional dictates within its borders.  These dictates are outside the compact The Sovereign States made with each other –WE never gave our “creature” power over these objects.
  • To sum this up:
  • Nullification is a natural right of self-defense. Rights don’t come from the Constitution. Like all Rights, the right of self-defense comes from God (The Declaration of Independence, 2nd para). Nullification is a reserved power within the meaning of the 10th Amendment. The Constitution doesn’t prohibit States from nullifying, and We reserved the power to do it. God requires us to disobey civil authorities when they violate God’s Law. That’s why the 2nd para of the Declaration of Independence says we have the duty to overthrow tyrannical government. See: The Biblical Foundation of our Constitution. Nullification is required by Oath of Office:  Article VI, cl. 3 requires all State officers and judges to “support” the federal Constitution. Therefore, when the federal government violates the Constitution, the States must smack them down.
  •  
    Incredible and passionate argument concerning the States natural God given right to nullify and render unenforceable un-Constitutional actions of the Federal Government.  As "creators" of the Federal Government, the States are obligated to nullify un-Constitutional actions and interpose Constitutional alternatives.  Huldah sites Jefferson, Madison and Hamilton as the primary Constitutional authorities for her rock solid argument.   If ever you want to learn about the Constitution, Publius Huldah is clearly the place to go.  
Gary Edwards

NONE DARE CALL IT CONSPIRACY  by Gary Allen - 1 views

  •  
    "NONE DARE CALL IT CONSPIRACY" - Web Version Copyright © 1971 by Gary Allen with Larry Abraham  ISBN: 0899666612 Sourced INTRODUCTION 1. DON'T CONFUSE ME WITH FACTS 2. SOCIALISM - ROYAL ROAD TO POWER FOR THE SUPER-RICH 3. THE MONEY MANIPULATORS 4. BANKROLLING THE BOLSHEVIK REVOLUTION 5. ESTABLISHING THE ESTABLISHMENT 6. THE ROCKEFELLERS AND THE REDS 7. PRESSURE FROM ABOVE AND PRESSURE FROM BELOW 8. YOU ARE THE ANSWER     FOURTEEN SIGNPOSTS TO SLAVERY     WHAT WILL YOU DO?     MEMBERS OF THE COUNCIL ON FOREIGN RELATIONS NOMINATED AND APPOINTED BY PRESIDENT NIXON TO GOVERNMENT POSTS     OPERATION COUNTERATTACK WHAT THOSE "IN THE KNOW" SAY I wish that every citizen of every country in the free world and every slave behind the Iron Curtain might read this book. Ezra Taft Benson - Former Secretary of Agriculture NDCC is an admirable job of amassing information to prove that communism is socialism and socialism (a plot to enslave the world) is not a movement of the downtrodden but a scheme supported and directed by the wealthiest of people. If enough Americans read and act upon NDCC, they really can save the Republic from the conspirators - whose plans for the destruction of our country are galloping fast toward completion. Dan Smoot - Former Assistant to J. Edgar Hoover Now that NDCC is available, I no longer need to answer "no" to the question which is often put to me, namely: "Mr. Dodd, is there a book which I can read so I can know what you know?" No higher praise is possible for this book. Norman Dodd - Chief Investigator Reece Committee to Investigate Foundations This book concerns the way in which our nation and other nations are actually governed. As Benjamin Disaeli said, this is not the way in which most people think nations are governed. The whole subject of the Insiders who so largely control our political and economic lives is a fascinating mystery. For the reader who is intelligent but uninitiated in the literature of super
Gary Edwards

Obama To Americans: You Don't Deserve To Be Free - Forbes - 1 views

  • President Obama’s Kansas speech is a remarkable document. In calling for more government controls, more taxation, more collectivism, he has two paragraphs that give the show away. Take a look at them. there is a certain crowd in Washington who, for the last few decades, have said, let’s respond to this economic challenge with the same old tune. “The market will take care of everything,” they tell us. If we just cut more regulations and cut more taxes–especially for the wealthy–our economy will grow stronger. Sure, they say, there will be winners and losers. But if the winners do really well, then jobs and prosperity will eventually trickle down to everybody else. And, they argue, even if prosperity doesn’t trickle down, well, that’s the price of liberty. Now, it’s a simple theory. And we have to admit, it’s one that speaks to our rugged individualism and our healthy skepticism of too much government. That’s in America’s DNA. And that theory fits well on a bumper sticker. (Laughter.) But here’s the problem: It doesn’t work. It has never worked. (Applause.) It didn’t work when it was tried in the decade before the Great Depression. It’s not what led to the incredible postwar booms of the ’50s and ’60s. And it didn’t work when we tried it during the last decade. (Applause.) I mean, understand, it’s not as if we haven’t tried this theory.
  • Though not in Washington, I’m in that “certain crowd” that has been saying for decades that the market will take care of everything. It’s not really a crowd, it’s a tiny group of radicals–radicals for capitalism, in Ayn Rand’s well-turned phrase. The only thing that the market doesn’t take care of is anti-market acts: acts that initiate physical force. That’s why we need government: to wield retaliatory force to defend individual rights. Radicals for capitalism would, as the Declaration of Independence says, use government only “to secure these rights”–the rights to life, liberty, property, and the pursuit of happiness. (Yes, I added “property” in there–property rights are inseparable from the other three.) That’s the political philosophy on which Obama is trying to hang the blame for the recent financial crisis and every other social ill. But ask yourself, are we few radical capitalists in charge? Have radical capitalists been in charge at any time in the last, oh, say 100 years?
  • I pick 100 years deliberately, because it was exactly 100 years ago that a gigantic anti-capitalist measure was put into effect: the Federal Reserve System. For 100 years, government, not the free market, has controlled money and banking. How’s that worked out? How’s the value of the dollar held up since 1913? Is it worth one-fiftieth of its value then or only one-one-hundredth? You be the judge. How did the dollar hold up over the 100 years before this government take-over of money and banking? It actually gained slightly in value.
  • ...5 more annotations...
  • Laissez-faire hasn’t existed since the Sherman Antitrust Act of 1890. That was the first of a plethora of government crimes against the free market.
  • The typical Republican would never, ever say “the market will take care of everything.” He’d say, “the market will take care of most things, and for the other things, we need the regulatory-welfare state.” They are for individualism–except when they are against it. They are against free markets and individualism not only when they agree with the Left that we must have antitrust laws and the Federal Reserve, but also when they demand immigration controls, government schools, regulatory agencies, Medicare, laws prohibiting abortion, Social Security, “public works” projects, the “social safety net,” laws against insider trading, banking regulation, and the whole system of fiat money.
  • Even you, dear reader, are probably wondering how on earth anyone could challenge things like Social Security, government schools, and the FDA. But that’s not the point. The point is: these statist, anti-capitalist programs exist and have existed for about a century. The point is: Obama is pretending that the Progressive PGR -2.02% Era, the New Deal, and the Great Society were repealed, so that he can blame the financial crisis on capitalism. He’s pretending that George Bush was George Washington.
  • What Obama is indeed responsible for is the injustice of robbing some to (allegedly) benefit others. To the extent that cronyism, not the free market, sets income, that is an injustice to be laid at the statists’ door.
  • There is no such problem as “unemployment” under capitalism. Prices fall to clear the market. Twice the work force could be employed if average wages dropped in half. But that’s nominal wages; with a constant money supply, prices would also fall in half–or slightly more than that. This isn’t just theory. America’s workforce has grown steadily decade after decade, yet the standard of living has risen at the same time. I grant you that the rise has slowed as statist intervention has grown. Think of the phenomenal progress between, say 1900 and 1920 as compared to the minor progress from 1993 to 2013. Most of the progress in the last 20 years has come in the freest area of the economy: electronics and computing.
  •  
    Harry Binswanger defends laissez-faire capitalism, using Ayn Rand Objectivism.
  •  
    The major problem with Ayn Rand Objectivism is that it's an "ism." The Utopian ideal it is based on has never existed in reality and likely never will; its principles have never been tested. Moreover, I will argue that Binswanger is incorrect in arguing that the anti-capitalist phenomenon in America began with creation of the Federal Reserve; it dates much farther back. The economic basis for the Revolutionary War was largely the Crown-granted monopolies granted to the first great British "companies" (corporations), which had the effect of forcing North American colonists to pay monopoly rents for common goods and kept American ship owners from importing those goods from elsewhere to sell at a lower price. The Founding Fathers were strongly against privately-owned corporations and government-granted monopolies, with only two exceptions, copyrights for literary works and patents for inventions. The Constitution's prohibition against government-granted monopolies is implicit in its allowance for only two narrowly-defined types. The Founding Fathers' writings explicitly discussed the difference between "natural" monopolies and those created by government or anti-competitive conduct. During the early years of the nation corporations were permitted by the States, but only for public purposes, usually for public works such as bridges or roads for which there was a need to amass capital. These early American corporations were usually chartered only for the time required to complete the public work and to recover the invesment and a small profit, e.g., from tolls for using a bridge or road. Many of the early state constitutions explicitly limited the lifetime of corporations. However, such early opposition to corporations gradually eroded; corporate purposes were expanded, corporations were granted perpetual life, and the corporate form of doing business became much more widespread. Here, it is important to recognize that corporations are market artificialities c
Paul Merrell

LINX Public Affairs » Advocate General says Data Retention Directive unlawful - 0 views

  • The EU Data Retention Directive is incompatible with the Charter of Fundamental Rights of the European Union, according to the Advocate General of the European Court. While the purpose of the Directive, to ensure that communications data can be made available to law enforcement, is accepted as legitimate, the Advocate General says the legislator failed to provide adequate protections against misuse, as required by the Charter.
  • States supporting data retention are not out of the woods yet. The Advocate General’s opinion that the full extent of measures concerning retention of communications data, and access to the material so retained must be legislated at the European level is reached through his understanding of Article 52(1) of the Charter, that any limitation on the rights guaranteed by the Charter, such as right to privacy, must be “provided for by law”. This is the same Advocate General that proposed the same reasoning in another important case on Internet law, and in that case the European Court did not follow his advice. In the seminal case of Internet filtering, SABAM v Scarlet Extended, the Advocate General argued that it should be decided on the basis that court-ordered filtering by ISPs of copyright-infringing peer-to-peer traffic was “not provided for by law” until there is specific legislation to support it. The European Court chose not to follow the Advocate General’s narrow reasoning, and decided the case instead on the substantively more fundamental question of whether making ISPs filter traffic infringes human rights, ruling in favour of ISPs and users and against the copyright holders and States. It remains possible that in this case on data retention the Court will also choose to focus more specifically on the underlying questions raised by the Austrian Supreme Court.
  •  
    Optimistic news on the ISP data-retention law front. If the data retention directive is found unlawful in the E.U., the ability of law enforcement and the spy agencies to access retained data is limited to what is retained voluntarily by ISPs. 
Gary Edwards

The Senate Has Passed the TPP Fast Track Bill-We Now Take Our Fight to the House | Elec... - 0 views

  • Lawmakers have headed back to their home district for the Memorial Day recess, so there's a chance you, as a constituent, can meet with them. Absent that, you can visit their district staff who can receive and forward on your concerns to your representative even after lawmakers go back to the Capitol. They will be receptive to the concerns of smart, tech-savvy constituents who care enough to arrange a meeting. We know there's a big difference between calling and writing to your congressperson, and actually talking to them face-to-face. But this is a vital moment, and there's a fighting chance that your decision to meet with your representative's office could make all the difference.
  • If you're interested, read this guide on how to set up a meeting with your lawmakers. We also prepared a hand out with talking points for you to take with you when you go. We also encourage you to tell them about our letter with 250 tech companies and user rights groups urging Congress to oppose the TPP Fast Track for containing provisions that threaten digital innovation and users. Powerful corporate interests like the Motion Picture Association of America, Recording Industry Association of America, and the Business Software Alliance are intent on having anti-user trade deals pass without proper oversight. That's because the policies they're pushing for couldn't otherwise pass in a participatory, transparent process. It's up to us to stop this massive, secret corporate hand out, and we're going to need all the help we can get. If you end up meeting with your representative or their staff, please email info@eff.org to let us know how it went!
  •  
    "The Senate passed a bill Friday night to put the Trans-Pacific Partnership (TPP) on the Fast Track to approval. Its passage followed a series of stops and starts-an indication that this legislation was nearly too rife with controversy to pass. But after a series of deals and calls from corporate executives, senators ultimately swallowed their criticism and accepted the measure. If this bill ends up passing both chambers of Congress, that means the White House can rush the TPP through to congressional ratification, with lawmakers unable to fully debate or even amend agreements that have been negotiated entirely in secret. On the plus side, all of these delays in the Senate has led other TPP partners to delay any further negotiations on the trade agreement until Fast Track is approved by Congress. So the fight now starts in the House, where proponents of secret trade deals still lack the votes to pass the bill. But the White House and other TPP proponents are fiercely determined to garner enough support among representatives to pass the bill, in order to give themselves almost unilateral power to enact extreme digital regulations in secret. We cannot let that happen. In the House, we still have a chance to block the passage of Fast Track. That's why we are asking people in the U.S. to meet with their representatives and staff to nudge them to make the right decision. Back in DC, they may have heard arguments for and against the TPP. Your representative might think this so-called trade agreement is just about free trade, but they might not know how the copyright provisions and other leaked proposals in the TPP threaten the Internet, as well as users, developers, and start-ups across the country."
Joseph Skues

Yes, Islam condones wife beatings - 0 views

  •  
    "Recently, Marvin Levant (Dec. 28), Steve Harris (Dec. 30), Syed Soharwardy (Jan. 2), and Riazuddin Ahmed (Jan. 5) debated Islam through the forum of the Herald's letters to the editor. The issue of wife beating and gender inequality in Islam has become convoluted and highly controversial as many Muslims try to sugar-coat the ugly truths and others try to shed some light on the issue. Soharwardy's statement that "Beating one's wife is not only wrong, it is criminal and completely un-Islamic" is incorrect. The Qur'an says that "men are in charge of women because Allah has made one of them (men) to excel the other (women), thus man's superiority over women . . . good women are the obedient ones . . . admonish the rebellious women and banish them, and scourge them (whip them severely to inflict pain) (4:34) . . . smote them (hit or strike with the hand or with a weapon causing pain, beat them . . . (4:62)". Islam does not recognize gender equality. For example, polygamy is accepted in Islam, but polyandry is not. A woman's testimony is considered half as worthy as a man's in court; a son inherits twice as much as a daughter does. Muslim men may marry Muslim, Jewish or Christian women, but Muslim women can marry only Muslim men. In short, sharia law leads to the inhuman treatment of Muslim women by their husbands and others, especially in South Asia and the Middle East. Higher education is emphasized more for sons than for daughters; in cultural honour killings, almost always women are the target for murder. Under sharia, divorced Muslim women get custody of their sons under eight years of age and daughters until puberty, and then the fathers take the children away. Sharia enabled one of the worst fundamentalists, the vile and ruthless military dictator, Muhammad Zia-ul-Haq, to put more than 15,000 rape victims in jail because they could not comply with the absurd Islamic condition requiring them to have numerous male witnesses of their victimization. They were char
Gary Edwards

The Daily Bell - The Economist Hoists Its Battle Balloon? - 1 views

  •  
    "The first world war... Look back with angst ... Thanks to its military, economic and soft power, America is still indispensable, particularly in dealing with threats like climate change and terror, which cross borders. But unless America behaves as a leader and the guarantor of the world order, it will be inviting regional powers to test their strength by bullying neighbouring countries. The chances are that none of the world's present dangers will lead to anything that compares to the horrors of 1914. Madness, whether motivated by race, religion or tribe, usually gives ground to rational self-interest. But when it triumphs, it leads to carnage, so to assume that reason will prevail is to be culpably complacent. That is the lesson of a century ago. - Economist Magazine Dominant Social Theme: Beware the coming wars ... Free-Market Analysis: You can't make this stuff up. The top men in the globalist community have been hard at work building wars and potential wars, and now it's time to let 'er rip. This is one dominant social theme we saw coming miles away. We've been writing about its imminence for years, and predicting war and more war as internationalists try to blunt the effect of the Internet Reformation. After the Gutenberg press blew up the Middle Ages and the Roman Catholic Church besides, the globalists of the era used economic chaos, war and the invention of copyright to fight back. We predicted they would use the same tools this time around and have no reason to revise our predictions thus far. The only thing we've consistently pointed out that has not yet been addressed is the inability of the top men to launch a full-out world war because that would involve nuclear weapons. And lacking a full-out war, we have questioned how successful the strategy can be. Obviously, the top elites see something we don't. Or perhaps they are willing to risk an all-out war anyway - as they retreat into reported fully-stocked, underground "cities." Here's more fro
Paul Merrell

Notes from the Fight Against Surveillance and Censorship: 2014 in Review | Electronic F... - 0 views

  • 2014 in Review Series Net Neutrality Takes a Wild Ride 8 Stellar Surveillance Scoops Web Encryption Gets Stronger and More Widespread Big Patent Reform Wins in Court, Defeat (For Now) in Congress International Copyright Law More Time in the Spotlight for NSLs The State of Free Expression Online What We Learned About NSA Spying in 2014—And What We're Fighting to Expose in 2015 "Fair Use Is Working!" Email Encryption Grew Tremendously, but Still Needs Work Spies Vs. Spied, Worldwide The Fight in Congress to End the NSA's Mass Spying Open Access Movement Broadens, Moves Forward Stingrays Go Mainstream Three Vulnerabilities That Rocked the Online Security World Mobile Privacy and Security Takes Two Steps Forward, One Step Back It Was a Pivotal Year in TPP Activism but the Biggest Fight Is Still to Come The Government Spent a Lot of Time in Court Defending NSA Spying Last Year Let's Encrypt (the Entire Web)
  •  
    The Electronic Freedom Foundation just dropped an incredible bunch of articles on the world in the form of their "2014 Year In Review" series. These are major contributions that place an awful lot of information in context. I thought I had been keeping a close eye on the same subject matter, but I'm only part way through the articles and am learning time after time that I had missed really important news having to do with digital freedom. I can't recommend these articles enough. So far, they are all must-read.  
Paul Merrell

WikiLeaks - Secret Trans-Pacific Partnership Agreement (TPP) - Investment Chapter - 0 views

  •  
    The previously leaked chapter on copyrights makes clear that the TPP would be a disaster for a knowledge society. This chapter makes clear that only corprorations may compel arbitration; there is no corresponding right for human beings to do so. The disregard for national judicial systems is also noteworthy.
Paul Merrell

Victory for Users: Librarian of Congress Renews and Expands Protections for Fair Uses |... - 0 views

  • The new rules for exemptions to copyright's DRM-circumvention laws were issued today, and the Librarian of Congress has granted much of what EFF asked for over the course of months of extensive briefs and hearings. The exemptions we requested—ripping DVDs and Blurays for making fair use remixes and analysis; preserving video games and running multiplayer servers after publishers have abandoned them; jailbreaking cell phones, tablets, and other portable computing devices to run third party software; and security research and modification and repairs on cars—have each been accepted, subject to some important caveats.
  • The exemptions are needed thanks to a fundamentally flawed law that forbids users from breaking DRM, even if the purpose is a clearly lawful fair use. As software has become ubiquitous, so has DRM.  Users often have to circumvent that DRM to make full use of their devices, from DVDs to games to smartphones and cars. The law allows users to request exemptions for such lawful uses—but it doesn’t make it easy. Exemptions are granted through an elaborate rulemaking process that takes place every three years and places a heavy burden on EFF and the many other requesters who take part. Every exemption must be argued anew, even if it was previously granted, and even if there is no opposition. The exemptions that emerge are limited in scope. What is worse, they only apply to end users—the people who are actually doing the ripping, tinkering, jailbreaking, or research—and not to the people who make the tools that facilitate those lawful activities. The section of the law that creates these restrictions—the Digital Millennium Copyright Act's Section 1201—is fundamentally flawed, has resulted in myriad unintended consequences, and is long past due for reform or removal altogether from the statute books. Still, as long as its rulemaking process exists, we're pleased to have secured the following exemptions.
  • The new rules are long and complicated, and we'll be posting more details about each as we get a chance to analyze them. In the meantime, we hope each of these exemptions enable more exciting fair uses that educate, entertain, improve the underlying technology, and keep us safer. A better long-terms solution, though, is to eliminate the need for this onerous rulemaking process. We encourage lawmakers to support efforts like the Unlocking Technology Act, which would limit the scope of Section 1201 to copyright infringements—not fair uses. And as the White House looks for the next Librarian of Congress, who is ultimately responsible for issuing the exemptions, we hope to get a candidate who acts—as a librarian should—in the interest of the public's access to information.
Paul Merrell

The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions | Just S... - 0 views

  • Pending before federal magistrate judge James Orenstein is the government’s request for an order obligating Apple, Inc. to unlock an iPhone and thereby assist prosecutors in decrypting data the government has seized and is authorized to search pursuant to a warrant. In an order questioning the government’s purported legal basis for this request, the All Writs Act of 1789 (AWA), Judge Orenstein asked Apple for a brief informing the court whether the request would be technically feasible and/or burdensome. After Apple filed, the court asked it to file a brief discussing whether the government had legal grounds under the AWA to compel Apple’s assistance. Apple filed that brief and the government filed a reply brief last week in the lead-up to a hearing this morning.
  • We’ve long been concerned about whether end users own software under the law. Software owners have rights of adaptation and first sale enshrined in copyright law. But software publishers have claimed that end users are merely licensees, and our rights under copyright law can be waived by mass-market end user license agreements, or EULAs. Over the years, Granick has argued that users should retain their rights even if mass-market licenses purport to take them away. The government’s brief takes advantage of Apple’s EULA for iOS to argue that Apple, the software publisher, is responsible for iPhones around the world. Apple’s EULA states that when you buy an iPhone, you’re not buying the iOS software it runs, you’re just licensing it from Apple. The government argues that having designed a passcode feature into a copy of software which it owns and licenses rather than sells, Apple can be compelled under the All Writs Act to bypass the passcode on a defendant’s iPhone pursuant to a search warrant and thereby access the software owned by Apple. Apple’s supplemental brief argues that in defining its users’ contractual rights vis-à-vis Apple with regard to Apple’s intellectual property, Apple in no way waived its own due process rights vis-à-vis the government with regard to users’ devices. Apple’s brief compares this argument to forcing a car manufacturer to “provide law enforcement with access to the vehicle or to alter its functionality at the government’s request” merely because the car contains licensed software. 
  • This is an interesting twist on the decades-long EULA versus users’ rights fight. As far as we know, this is the first time that the government has piggybacked on EULAs to try to compel software companies to provide assistance to law enforcement. Under the government’s interpretation of the All Writs Act, anyone who makes software could be dragooned into assisting the government in investigating users of the software. If the court adopts this view, it would give investigators immense power. The quotidian aspects of our lives increasingly involve software (from our cars to our TVs to our health to our home appliances), and most of that software is arguably licensed, not bought. Conscripting software makers to collect information on us would afford the government access to the most intimate information about us, on the strength of some words in some license agreements that people never read. (And no wonder: The iPhone’s EULA came to over 300 pages when the government filed it as an exhibit to its brief.)
  • ...1 more annotation...
  • The government’s brief does not acknowledge the sweeping implications of its arguments. It tries to portray its requested unlocking order as narrow and modest, because it “would not require Apple to make any changes to its software or hardware, … [or] to introduce any new ability to access data on its phones. It would simply require Apple to use its existing capability to bypass the passcode on a passcode-locked iOS 7 phone[.]” But that undersells the implications of the legal argument the government is making: that anything a company already can do, it could be compelled to do under the All Writs Act in order to assist law enforcement. Were that the law, the blow to users’ trust in their encrypted devices, services, and products would be little different than if Apple and other companies were legally required to design backdoors into their encryption mechanisms (an idea the government just can’t seem to drop, its assurances in this brief notwithstanding). Entities around the world won’t buy security software if its makers cannot be trusted not to hand over their users’ secrets to the US government. That’s what makes the encryption in iOS 8 and later versions, which Apple has told the court it “would not have the technical ability” to bypass, so powerful — and so despised by the government: Because no matter how broadly the All Writs Act extends, no court can compel Apple to do the impossible.
Paul Merrell

US Courts Approve 30,000 Secret Surveillance Orders Each Year - Slashdot - 0 views

  • "U.S. Magistrate Judge Stephen Smith estimates in a new paper (PDF) that 30,000 secret surveillance orders are approved each year in U.S. courts. 'Though such orders have judicial oversight, few emerge from any sort of adversarial proceeding and many are never unsealed at all.' Smith writes, 'To put this figure in context, magistrate judges in one year generated a volume of secret electronic surveillance cases more than thirty times the annual number of FISA cases; in fact, this volume of ECPA cases is greater than the combined yearly total of all antitrust, employment discrimination, environmental, copyright, patent, trademark, and securities cases filed in federal court.' He also adds a warning: 'Lack of transparency in judicial proceedings has long been recognized as a threat to the rule of law and roundly condemned in ringing phrases by many Supreme Court opinions.'"
Paul Merrell

National Defense Authorization Act of 2014 Authorizes Cyber Warfare Against American Ci... - 0 views

  • In the midst of the holiday season Congress decided to pass the National Defense Authorization Act of 2014 or NDAA.  The bill was later signed into law by President Obama with little if any fanfare.
  •  The NDAA contains a number of highly questionable sections that run contrary to the principles articulated in the United States Constitution.  Specifically, language contained in the bill appears to authorize cyber warfare operations against the American people.
  • All of this is even more concerning when one considers that the NDAA also has a lot of new cyber warfare initiatives.  Section 931 through Section 942 contains a bunch of crazy stuff dealing with the world of cyber warfare..Section 932 authorizes the creation of a position known as The Principal Cyber Advisor which will be responsible for supervising offensive and defensive cyber warfare activities.  Obviously this position would not be created unless the federal government is intending upon involving itself in both offensive and defensive cyber warfare well into the future.  Section 933 instructs the Secretary of Defense to conduct a broad mission analysis of the government’s cyber warfare capabilities.  The required analysis will focus primarily on how they will manage, increase and enhance their personnel assigned to cyber warfare operations.  It even disallows the reduction of cyber warfare personnel assigned to the Air National Guard.
  • ...2 more annotations...
  • Section 936 requests the Secretary of Defense to strengthen outreach and threat awareness programs for small businesses.  This is allegedly to assist businesses that are awarded contracts by the Department of Defense to understand cyber threats, develop plans to protect intellectual property and networks of such businesses.  Realistically, this section appears to give the Department of Defense the authority to mandate all sorts of cyber security requirements on small businesses that they do transactions with.  The language of the section makes it sound as if they will be doing these small businesses a favor when the opposite appears to be the case.Section 940 authorizes the President to establish a process and policy to control the proliferation of cyber weapons through law enforcement activities, financial means, diplomatic engagement and pretty much any other means that the President considers appropriate.  This would also include potential private industry participation in the initiative.  The objective of the process is to suppress the trade of so-called cyber tools that could be used for criminal, terrorist or military activities.  The term cyber weapon is not explicitly defined in the section so this could be considered almost anything be it software or hardware that they declare could potentially be used for a nefarious purpose.  Even something like bit torrent and torrent related applications could be considered cyber weapons since copyrighted material is consistently transferred back and forth using these tools.  As a result, the use of these tools could potentially fall under the classification of criminal activity.  Once again we have the President being given expansive powers from Congress with its extremely broad use of language in the bill. 
  • Section 941 directs the president to establish an interagency policy to deter adversaries in cyberspace.  The word adversaries is yet again not specifically defined in the section so this could also mean almost anything.  With many American citizens not trusting the United States government this could mean a policy to deter or stifle anyone from political opponents to protesters who voice their disgust on the Internet.Overall, between the records collection initiative and the immense cyber warfare planning that is outlined in the NDAA it is becoming painfully clear that the United States government is turning the Internet into a battlefield.
Paul Merrell

Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks an... - 0 views

  • Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution. The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous. One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
  • Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
  • In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.” “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.” Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name. The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
  • ...2 more annotations...
  • The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges. In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
  • It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
  •  
    "... the Obama administration urged foreign allies to file criminal charges against Assange over the group's publication of the Afghanistan war logs." Sweden promptly launches an alleged rape investigation and Assange is forced by the UK courts to take refuge in the London embassy of Ecuador. Because of urging by the Obama administration aimed at chilling the the First Amendment rights of journalists. That should be grounds for impeachment.  
Paul Merrell

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
1 - 20 of 24 Next ›
Showing 20 items per page