Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged crimes

Rss Feed Group items tagged

Paul Merrell

Court Rules Bush Administration Can Be Sued for Its "War on Terror" Conduct - 0 views

  • For almost a decade and a half, the people behind the Bush administration's shameful treatment of terrorism suspects have avoided punishment for their crimes, but that may be about to change. The courts have had their say and have ruled that former Bush administration officials can, in fact, be sued for how they conducted the "war on terror." The Second Circuit Court of Appeals made that pretty much official on Friday when it refused to hear a challenge to its earlier ruling in the case of Turkmen v. Ashcroft. That case involves hundreds of Arab, Muslim or South Asian men who were detained and then abused by our government in the weeks following 9/11.
  • Some of them were beaten by security guards and kept in solitary confinement, which the United Nations considers a form of torture. After they were released, these men sued the people they say authorized their detentions - people like former Attorney General John Ashcroft and former FBI director Robert Mueller. A district court initially blocked their claims, but in June, the Second Circuit Court allowed them, saying that Ashcroft, Mueller and company could be sued. The government then made one more last ditch push to protect the Bush administration, but that effort failed last Friday when the Second Circuit rejected it. Everyone else who authorized and participated in the illegal roundup of hundreds of innocent men after 9/11, from high-up government officials on down, is now fair game for a lawsuit.
  •  
    The case centers of detainees conditions of confinement and denial of Equal Protection for a number of people detained for several months immediately after 9-11. 
Paul Merrell

M of A - Hunt On For Tayyeep Bin Ardogan Over Fighter Shoot-Down And Bosphorus Blockade - 0 views

  • Today the Russian President Putin gave his yearly address to the Russian Federal Assembly. In the context of terrorism and the shooting down of the Russian fighter in Syria he addressed some very harsh words to the Turkish President Erdogan: [T]he Turkish people are kind, hardworking and talented. We have many good and reliable friends in Turkey. Allow me to emphasise that they should know that we do not equate them with the certain part of the current ruling establishment that is directly responsible for the deaths of our servicemen in Syria. We will never forget their collusion with terrorists. We have always deemed betrayal the worst and most shameful thing to do, and that will never change. I would like them to remember this – those in Turkey who shot our pilots in the back, those hypocrites who tried to justify their actions and cover up for terrorists. I don’t even understand why they did it. Any issues they might have had, any problems, any disagreements we knew nothing about could have been settled in a different way. Plus, we were ready to cooperate with Turkey on all the most sensitive issues it had; we were willing to go further, where its allies refused to go. Allah only knows, I suppose, why they did it. And probably, Allah has decided to punish the ruling clique in Turkey by taking their mind and reason.
  • But, if they expected a nervous or hysterical reaction from us, if they wanted to see us become a danger to ourselves as much as to the world, they won’t get it. They won’t get any response meant for show or even for immediate political gain. They won’t get it. Our actions will always be guided primarily by responsibility – to ourselves, to our country, to our people. We are not going to rattle the sabre. But, if someone thinks they can commit a heinous war crime, kill our people and get away with it, suffering nothing but a ban on tomato imports, or a few restrictions in construction or other industries, they’re delusional. We’ll remind them of what they did, more than once. They’ll regret it. We know what to do. That was strong stuff from someone who usually stays very cool. These were not even threats but direct declarations that Russia will take revenge and will follow through.
  • But Erdogan escalated. Putin will now not rest until he has kicked that wannabe Sultan off his throne. My bet is that he will be more resourceful in his endeavor than Erdogan.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Judge bars release of 2013 videos of fatal shooting by Chicago cops -- for now - Chicag... - 0 views

  • s Mayor Rahm Emanuel was apologizing Wednesday for the broken system of police accountability exposed by the Laquan McDonald case, city attorneys argued before a federal judge that footage of an officer fatally shooting a 17-year-old carjacking suspect nearly three years ago should be kept from public view.Lawyers for Cedrick Chatman's family allege the videos of his January 2013 killing contradict statements from police that Chatman had turned and pointed a dark object at police as he ran, prompting Officer Kevin Fry to fire in fear of his life. City attorneys argue releasing the footage — which they described as low-quality and incomplete — could inflame the public and jeopardize a fair trial.At a brief hearing Wednesday, U.S. District Judge Robert Gettleman said the records should stay sealed for the time being. But the judge said he would likely lift the protective order next month if he was going to be asked to consider the videos in any pretrial rulings, a move that would automatically make them part of the public record.
  • "If it's likely going to come out through pretrial motions, then there really is no reason to wait," said Gettleman, who set a hearing on the issue for Jan. 14.Gettleman's ruling came three weeks after police dash-cam video of 17-year-old McDonald being shot 16 times by Officer Jason Van Dyke went viral, sparking protests and leading to the resignations of both police Superintendent Garry McCarthy and Scott Ando, who headed the Independent Police Review Authority, which has drawn criticism for its lax enforcement on excessive-force complaints.
  • Earlier this year, Lorenzo Davis, the IPRA supervisor who headed up the Chatman probe, filed a federal lawsuit alleging he was fired by Ando for concluding that officers in several shootings — including Chatman's — were not justified in using lethal force.Davis, who viewed the surveillance video as part of the IPRA inquiry, told the Tribune last month he did not see Chatman aim at or turn toward the officers."Cedrick was just running as the shots were fired," Davis said. "You're taught that deadly force is a last resort and that you should do everything in your power to apprehend the person before you use deadly force. I did not see where deadly force was called for at that time."An investigator on Davis' team alleged that Fry violated the department's deadly force policy, but that claim was ruled "unfounded" in the final IPRA report.
  •  
    If the videos "could inflame the public and jeopardize a fair trial," then they must show a different story than the police have been telling, yes? 
Paul Merrell

U.S. government reveals breadth of requests for Internet records | Reuters - 0 views

  • The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows.The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval.The filing made public Monday was the result of an 11-year-old legal battle waged by Nicholas Merrill, founder of Calyx Internet Access, a hosted service provider, who refused to comply with a national security letter (NSL) he received in 2004. Merrill told Reuters the release was significant “because the public deserves to know how the government is gathering information without warrants on Americans who are not even suspected of a crime.”
  • National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data.A federal court ruled earlier this year that the gag on Merrill’s NSL should be lifted. Merrill's challenge also disclosed that the FBI may use NSLs to gain IP addresses on everyone a suspect has corresponded with and cell-site location information. The FBI said in the court filings it no longer used NSLs for location information. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight or transparency.
  • Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests, or between 1,000 and 1,999. Twitter (TWTR.N) has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year, though the agency says it is unaware of the precise number. At one point that number eclipsed 50,000 letters annually. The FBI did not respond to a request for comment Monday.
Paul Merrell

Tapie Affair: IMF head Christine Lagarde ordered to face trial by French court over tyc... - 0 views

  • A French court has ordered IMF boss Christine Lagarde to face trial over the part she played in the Tapie Affair, regarding a €400m (£291m, $433m) transfer to French business tycoon and entrepreneur Bernard Tapie.In September, France's main prosecutor recommended magistrates at the Cour de Justice de la Republique, which deals with crime allegations against government officials, drop the investigation. The magistrates were probing Lagarde's alleged negligence in regards to the affair when she was finance minister of the country.Why advertise with usIn 2008, when Lagarde served under Nicolas Sarkozy's government, she approved a three member arbitration panel that awarded the payment from the taxpayers' pockets. Lagarde and Sarkozy have both been under fire since then for approving the panel.The payment followed Tapie's accusation that French bank Credit Lyonnais defrauded him when it handled the businessman's sale of his majority stake in German sports retailer Adidas in 1993. Tapie alleged the bank of deliberately undervaluing the company after it sold the stake for a higher sum.
  • Because the now bust Credit Lyonnais was partly state owned, at least some of the money came from French taxpayers. Tapie sold his Adidas shares to become a cabinet minister. He backed and supported Sarkozy in his bid for presidency in 2007.
  • The case has been brought up numerous times throughout the years, but some have accused current president Francois Hollande of playing politics. While others say that Lagarde and Sarkozy approved the payment because the influential Tapie backed their government.Tapie used to be popular among the French, as an entrepreneur and 'rags to riches' success story. Apart from Adidas, he has owned cycling team and Tour de France winner La Vie Claire and French football club Olympique Marseille.
Paul Merrell

A Secret Catalogue of Government Gear for Spying on Your Cellphone - 0 views

  • HE INTERCEPT HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States. The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before.
  • The Intercept obtained the catalogue from a source within the intelligence community concerned about the militarization of domestic law enforcement. (The original is here.) A few of the devices can house a “target list” of as many as 10,000 unique phone identifiers. Most can be used to geolocate people, but the documents indicate that some have more advanced capabilities, like eavesdropping on calls and spying on SMS messages. Two systems, apparently designed for use on captured phones, are touted as having the ability to extract media files, address books, and notes, and one can retrieve deleted text messages. Above all, the catalogue represents a trove of details on surveillance devices developed for military and intelligence purposes but increasingly used by law enforcement agencies to spy on people and convict them of crimes. The mass shooting earlier this month in San Bernardino, California, which President Barack Obama has called “an act of terrorism,” prompted calls for state and local police forces to beef up their counterterrorism capabilities, a process that has historically involved adapting military technologies to civilian use. Meanwhile, civil liberties advocates and others are increasingly alarmed about how cellphone surveillance devices are used domestically and have called for a more open and informed debate about the trade-off between security and privacy — despite a virtual blackout by the federal government on any information about the specific capabilities of the gear.
  • ANY OF THE DEVICES in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&T, and T-Mobile. When someone’s phone connects to the spoofed network, it transmits a unique identification code and, through the characteristics of its radio signals when they reach the receiver, information about the phone’s location. There are also indications that cell-site simulators may be able to monitor calls and text messages. In the catalogue, each device is listed with guidelines about how its use must be approved; the answer is usually via the “Ground Force Commander” or under one of two titles in the U.S. code governing military and intelligence operations, including covert action.
  • ...2 more annotations...
  • “We’ve seen a trend in the years since 9/11 to bring sophisticated surveillance technologies that were originally designed for military use — like Stingrays or drones or biometrics — back home to the United States,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, which has waged a legal battle challenging the use of cellphone surveillance devices domestically. “But using these technologies for domestic law enforcement purposes raises a host of issues that are different from a military context.”
  • But domestically the devices have been used in a way that violates the constitutional rights of citizens, including the Fourth Amendment prohibition on illegal search and seizure, critics like Lynch say. They have regularly been used without warrants, or with warrants that critics call overly broad. Judges and civil liberties groups alike have complained that the devices are used without full disclosure of how they work, even within court proceedings.
Paul Merrell

Shaker Aamer, Last British Guantanamo Detainee Released - 0 views

  • Shaker Aamer, the last British resident in Guantanamo Bay, was released on Friday after being detained without charge for almost 14 years.On September 25th, U.S. and U.K. authorities confirmed that Aamer was to be returned to the U.K. within days. The release comes after Aamer endured well over a decade of torture, detention without charge or trial, and solitary confinement. Aamer’s high profile case has highlighted everything that is wrong with the war on terror — detention without charge or trial, government complicity in torture and lack of accountability for war crimes, gross obstruction of justice, and the humiliating and dehumanising treatment of detainees.A keen community worker and U.K. resident, Aamer is married to a British woman and four British children living in London. He was volunteering for a charity in Afghanistan in 2001 when he was abducted and sold for a bounty to U.S. forces. He was tortured, eventually cracking and agreeing to his captors’ accusations against him. Satisfied with the confession of an abused and broken man, U.S. forces took him to Guantánamo Bay on Valentine’s Day 2002.In a September Daily Mail piece entitled “Torture and the man who could expose Britain’s dirtiest secrets,” journalist Peter Oborne said, “My view is that Mr Aamer may have paid the price for knowing too much. The CIA had very good reason to be terrified of what he might reveal when he emerged from jail.”
  •  
    "And the King will answer them, 'Truly, I say to you, as you did it to one of the least of these my brothers, you did it to me." --- Matthew 25:40. 
Paul Merrell

Homan Square revealed: how Chicago police 'disappeared' 7,000 people | US news | The Gu... - 0 views

  • Police “disappeared” more than 7,000 people at an off-the-books interrogation warehouse in Chicago, nearly twice as many detentions as previously disclosed, the Guardian can now reveal.
  • From August 2004 to June 2015, nearly 6,000 of those held at the facility were black, which represents more than twice the proportion of the city’s population. But only 68 of those held were allowed access to attorneys or a public notice of their whereabouts, internal police records show. The new disclosures, the result of an ongoing Guardian transparency lawsuit and investigation, provide the most detailed, full-scale portrait yet of the truth about Homan Square, a secretive facility that Chicago police have described as little more than a low-level narcotics crime outpost where the mayor has said police “follow all the rules”. The police portrayals contrast sharply with those of Homan Square detainees and their lawyers, who insist that “if this could happen to someone, it could happen to anyone”. A 30-year-old man named Jose, for example, was one of the few detainees with an attorney present when he surrendered to police. He said officers at the warehouse questioned him even after his lawyer specifically told them he would not speak.
  • “The Fillmore and Homan boys,” Jose said, referring to police and the facility’s cross streets, “don’t play by the rules.” According to an analysis of data disclosed to the Guardian in late September, police allowed lawyers access to Homan Square for only 0.94% of the 7,185 arrests logged over nearly 11 years. That percentage aligns with Chicago police’s broader practice of providing minimal access to attorneys during the crucial early interrogation stage, when an arrestee’s constitutional rights against self-incrimination are most vulnerable. But Homan Square is unlike Chicago police precinct houses, according to lawyers who described a “find-your-client game” and experts who reviewed data from the latest tranche of arrestee records obtained by the Guardian.
  • ...9 more annotations...
  • The narcotics, vice and anti-gang units operating out of Homan Square, on Chicago’s west side, take arrestees to the nondescript warehouse from all over the city: police data obtained by the Guardian and mapped against the city grid show that 53% of disclosed arrestees come from more than 2.5 miles away from the warehouse. No contemporaneous public record of someone’s presence at Homan Square is known to exist. Nor are any booking records generated at Homan Square, as confirmed by a sworn deposition of a police researcher in late September, further preventing relatives or attorneys from finding someone taken there.
  • But those documents do not tell the entire story of Homan Square. Chicago police have not disclosed any figures at all on people who were detained at Homan Square but never ultimately charged. Nor has it released any information about detentions or arrests before September 2004, claiming that information is burdensome to produce because it is not digital. (Chicago purchased the warehouse in 1995.) “It’s hard to believe that 7,185 arrests is an accurate number of arrestees at Homan Square,” said the University of Chicago’s Futterman. “Even if it were true that less than 1% of Homan arrestees were given access to counsel, that would be abhorrent in and of itself.”
  • 11.8% of detainees in the Homan Square logs were Hispanic, compared with 28.9% of the population. 5.5% of the detainees were white, compared with 31.7% of the population. Of the 68 people who Chicago police claim had access to counsel at Homan Square, however, 45% were black, 26% were Hispanic and another 26% were white.
  • Twenty-two people have told the Guardian that Chicago police kept them at Homan Square for hours and even days. They describe pressure from officers to become informants, and all but two – both white – have said the police denied them phone calls to alert relatives or attorneys of their whereabouts. Their accounts point to violations of police directives, which say police must “complete the booking process” regardless of their interest in interrogating a suspect and must also “allow the arrestee to make a reasonable number of telephone calls to an attorney, family member or friend”, usually within “the first hour” of detention. The most recent disclosure of Homan Square data provides the scale behind those accounts: the demographic trends within the 7,185 disclosed arrests at the warehouse are now far more vast than what the Guardian reported in August after launching the transparency lawsuit – but are consistently disproportionate in terms of race and constitutional access to legal counsel. 82.2% of people detained at Homan Square were black, compared with 32.9% of the Chicago population.
  • Despite the lack of booking and minimal attorney access at Homan Square, it is not a facility for detaining and interrogating the most violent of Chicago’s criminals. Drug possession charges were eventually levied in 5,386 of the disclosed Homan Square arrests, or 74.9%; heroin accounted for 35.4% of those, with marijuana next at 22.3%. The facility’s use by police has intensified in recent years. Nearly 65% of documented Homan Square arrests since August 2004 took place in the five years since Rahm Emanuel, formerly Barack Obama’s top aide, became mayor. (The Guardian has filed a Foia request with Emanuel’s office to disclose the extent of its involvement in Homan Square.) The 68 documented attorney visits are actually slightly higher, statistically speaking, than the extremely minimal legal access Chicago police provide suspects in custody during the initial stages of their arrest. The 2014 citywide total at declared police stations, according to First Defense Legal Aid, was 0.3%. On face value, the lawyer visit rate at Homan Square, according to the newly disclosed documents, was 0.9% over nearly 11 years.
  • Chicago attorneys say they are not routinely turned away from police precinct houses, as they are at Homan Square. The warehouse is also unique in not generating public records of someone’s detention there, permitting police to effectively hide detainees from their attorneys. “Try finding a phone number for Homan to see if anyone’s there. You can’t, ever,” said Gaeger. “If you’re laboring under the assumption that your client’s at Homan, there really isn’t much you can do as a lawyer. You’re shut out. It’s guarded like a military installation.”
  • “Often,” Futterman continued, “prisoners aren’t entered into the central booking system until they’re being processed – which doesn’t occur at Homan Square. They’re supposed to begin that processing right away, under CPD procedures, and at Homan Square the reality is, that isn’t happening or is happening sporadically and inconsistently, which leads to the whole find-your-client game.”
  • According to police, when they took a woman the Guardian will identify as Chevoughn to Homan Square in May 2007 regarding a theft, they allowed her attorney to see her. Chevoughn says that never happened. “I was there a very long time, maybe eight to 10 hours,” said Chevoughn, who remembered being “petrified”, particularly as police questioned her in what she calls a “cage”. “I went to Harrison and Kedzie,” Chevoughn said, referring to the cross streets of central booking. “That’s where I slept. It’s where they did fingerprinting, all that crap. That’s when my attorney came.”
  • Police arrested another man, whom the Guardian will call Anthony, in 2006 on charges of starting a garbage fire, and moved him to Homan Square. Police identified him as receiving an attorney there. But Anthony told the Guardian: “That’s not true.”
  •  
    It's good to see The Guardian following through on this story.
Paul Merrell

Erdoğan's Turkey, King Salman's Saudi Arabia and the Coming "Sunni" War for O... - 0 views

  • We’re about to be plunged into a new oil war in the Middle East, this one with a possible nuclear dimension. Wars for control of oil have been instigated for more than a century since the dawn of the petroleum era around the time of the First World War. This war for control of oil, however, promises to be of a scale that will change world politics in a spectacular and highly destructive manner. It is on one level, a Saudi war to redraw the national borders of the infamous Anglo-French Sykes-Picot carve-up of the bankrupt Ottoman Turkish Empire of 1916. This new war has as its foolish goal bringing the oil fields and pipeline routes of Iraq and Syria, and perhaps more of the region, under direct Saudi control, with Qatar and Erdogan’s Turkey as Riyadh’s partners in crime. Unfortunately, as in all wars, there will be no winners. The EU will be a major loser as will the present citizens of Iraq and Syria, as well as the Kurdish Turkish and the very different Kurdish Syrian populations for starters. Erdogan’s Turkish “sultanate” will be destroyed at a great cost to lives and peace, as will King Salman’s pre-feudal Kingdom as an influence in world power games. First they will fall into a deadly trap that has been carefully prepared for them by NATO. It’s necessary to look more closely at the elements and key players preparing this new war, a war which it is likely will not last beyond perhaps the summer of 2016.
Paul Merrell

Are US Academics Who Cite WikiLeaks Blackballed? - 0 views

  • Speaking to Germany’s Der Spiegel magazine in July 2015, Assange suggested that institutions within the international relations discipline have failed to understand the intersection between current geopolitical and technological developments. Specifically, Assange charged that the US journal International Studies Quarterly (ISQ), published by the prestigious International Studies Association (ISA), would not accept manuscripts based on WikiLeaks’ material. Professor of international politics Daniel W. Drezner hit back on July 30 in The Washington Post, arguing that there were other explanations for why the journal was not publishing WikiLeaks’ material. However, he did concede that it is possible that the “structural forces” opposing WikiLeaks were so powerful that a scholar would eschew WikiLeaks’ publications for “fear of being blackballed”. For the thousands of undergraduate to PhD students, fellows and academic researchers facing a precarious employment market, self-censorship for fear of freezing one’s career is not unlikely. One publicised incident from November 2010 concerning the office of career services at Columbia University’s School of International and Public Affairs (SIPA), which according to The New York Times “grooms future diplomats”, provides the perfect illustration. That year the office sent an email to students warning them against commenting on or posting WikiLeaks’ documents on social media because “engaging in these activities would call into question your ability to deal with confidential information, which is part of most positions with the federal government”. The warning came to the office through a SIPA alumnus working at the State Department.
  • Years later, the tone of the warning continued to reverberate through the halls of one of the most reputable universities in the world. In documenting human rights abuses in June 2013 a Columbia University graduate class produced the anonymous academic paper “WikiLeaks and Iraq Body Count: the sum of parts may not add up to the whole — a comparison of two tallies of Iraqi civilian deaths”. The acknowledgements section of their report refers to the 2010 warning email and states that in light of that email it would be “unwise and perhaps unethical to acknowledge all the participating students by name”. Others participating in a peer-review process have cited additional factors curtailing their use of comprehensive and illuminating WikiLeaks publications. Former US presidential candidate for the Green Party Cynthia McKinney, for example, says that she was forced to scrub her PhD dissertation from any reference of WikiLeaks material. However Drezner, who is an ISA member and on the ISQ’s web advisory board, claims that WikiLeaks’ published diplomatic cables “are not nearly as significant as Assange believes” and that the “academic universe is indifferent to WikiLeaks”. A surprising claim, given that international human rights courts have not been indifferent to evidence derived from WikiLeaks’ published cables, including cables that show the insidious ways in which European officials attempt to conceal CIA torture in secret prisons.
  • To help address the gap in scholarly analysis of the more than 2 million US diplomatic cables and State Department records published by WikiLeaks since 2010, WikiLeaks has produced a new book, The WikiLeaks Files: The World According to US Empire, published September 7, 2015. The book brings together journalists, researchers and experts on international law and foreign policy to examine the current cables and records. The documents are extensive. They expose US efforts —  across Bush and Obama administrations — to use bribes and threats to keep the US protected from facing war crimes allegations, conveying the fading effervescence of concepts such as “international justice” or “rule of law” in the face of a superpower that clearly believes that “might makes right”. Analysts review the efforts US diplomats take to maintain ties with dictators. They examine the meaning of human rights in the context of a global “War on Terror”. Like the cables they seek to illuminate, the 18 chapters of the book touch upon most major regions of the world. Experts on US foreign policy such as Robert Naiman, Stephen Zunes and Gareth Porter examine cables that reveal US meddling in Syria, US acceptance of Israeli violations of international law, and how the US dealt with the International Atomic Energy Agency in relation to Iranian nuclear development. The book offers a user guide written by WikiLeaks’ investigations editor Sarah Harrison on how to research WikiLeaks’ cables including meta data and content.
  • ...2 more annotations...
  • Writing in the book’s introduction, Assange proposes that the diplomatic cables provide “the vivisection of a living empire, showing what substance flowed from which state organ and when”. Assange notes in his introduction that academic disciplines outside international relations, and where career aspirations do not go hand in hand with patronage by government institutions, have voluminous coverage of the cables. But the ISA does not accept submissions citing WikiLeaks’ material. Although ISA executive director Mark Boyer denies that the association has a formal policy against publishing WikiLeaks’ material, he says that journal editors have discussed the implications of publishing material that is legally prohibited by the US government. According to Gabriel J. Michael, author of the Yale Law School paper Who’s Afraid of WikiLeaks? Missed Opportunities in Political Science Research, the ISQ has adopted a “provisional policy” against handling manuscripts that make use of leaked documents if such use could be interpreted as mishandling “classified” material. According to an ISQ editor quoted in Michael’s paper, this policy prohibits direct quotations as well as data mining, and was developed in consultation with legal counsel. Stating that editors are currently “in an untenable position”. According to the editor, ISQ’s policy will remain in place pending broader action from the ISA, which publishes several other disciplinary journals. The ISA and ISQ concerns about handling material that the US government forbids —  which include WikiLeaks’ cables —  amount to throwing the baby out with the bathwater. The cables go into the heart of an empire, and reflect on matters that affect everyone.
  • Without WikiLeaks, the public would still be in the dark about the Trans-Pacific Partnership “agreement” currently being negotiated. The treaty aims to rewrite the global rules on intellectual property rights and would create spheres of trade which would be protected from judicial oversight. Such agreements have the potential to change the fabric of how states operate, and the leaked cables shed light on how states negotiate significant treaties, aiming to keep citizenship participation in politics out. Where academia bans the use of important leaked documents the public loses out.
Paul Merrell

Israel Sued in US over Flotilla Attacks. Civil Law Suit against the State of Israel | G... - 0 views

  • Four people, including three Americans, have filed a civil suit against the state of Israel, seeking compensatory damages for injuries suffered during an attack aboard a U.S. ship in international waters during the year 2010. At a Washington press conference, Tuesday, the plaintiffs said they wanted compensation for “the harm and distress, injuries and losses caused by the attack”. Israel has refused to acknowledge responsibility and liability for the attack and is yet to pay compensation to victims aboard the Challenger I, which was part of a Freedom Flotilla set to deliver humanitarian aid and medical supplies to the Gaza Strip, which was and still remains under an Israeli blockade. According to the complaint, the U.S. ship has never been returned by Israel and is still being held there. Israeli special forces stormed the ships and killed nine civilians aboard another ship in the flotilla, the Turkish Mavi Marmara. That event has since frozen relations between Israel and Turkey. That case was referred to the International Criminal Court by the Union of the Comoros because the Turkish vessel was sailing under its flag.
  • The family of a 19-year old American-Turkish national, Furkan Dogan, who was killed in the Mavi Marmara raid, last October, sued former Israeli Defense Minister Ehud Barak on war crimes charges. The latest lawsuit filed Monday is the first U.S. case brought against Israel relating to the Freedom Flotilla. The plaintiffs and their attorneys spoke to Anadolu Agency, following a press conference that announced the suit: “States are generally immune from suit in United States courts. But that immunity is waived in a number of circumstances. When agents of foreign governments commit wrongful acts in the United States that cause personal injury, and egregious acts against U.S. nationals anywhere in the world, they are not entitled to immunity,” said lawyer Steven Schneebaum. He noted that both exceptions apply to the facts of Challenger I case because a U.S. flagged ship falls under U.S. jurisdiction. The case is ground-breaking as it relies on an exception in American law that allows lawsuits to be brought against foreign states, in limited cases.
  • According to professor Ralph Steinhardt, a member of the plaintiffs’ legal team, Israel’s sovereignty does not allow it to attack American flagged civilian ships and attack those on it. “The attack on Challenger I was a patent violation of international law, including the laws of war, human rights, and the law of the sea,” according to the George Washington University international law professor. A UK-based international lawyer representing the plaintiffs, Sir Geoffrey Nice, described the case against Israel as “a real test” for the rule of international law. “This case, alongside the others, the one in the International Criminal Court and the one in California would have the following very clear political outcome: If Israel has enjoyed special privileged status of impunity because of protection by the United State of America, then that impunity is on the way out,” he said.
Paul Merrell

Redaction error reveals FBI did target Lavabit to spy on Edward Snowden | Technology | ... - 0 views

  • A redaction oversight by the US government has finally confirmed that the Federal Bureau of Investigation’s targeting of secure email service Lavabit was used specifically to spy on Edward Snowden. Ladar Levison, creator of the email service, which was founded on a basis of private communications secured by encryption and had 410,000 users, was served a sealed order in 2013 forcing him to aid the FBI in its surveillance of Snowden. Levison was ordered to install a surveillance package on his company’s servers and later to turn over Lavabit’s encryption keys so that it would give the FBI the ability to read the most secure messages that the company offered. He was also ordered not to disclose the fact to third-parties. After 38 days of legal fighting, a court appearance, subpoena, appeals and being found in contempt of court, Levison abruptly shuttered Lavabit citing government interference and stating that he would not become “complicit in crimes against the American people”.
  • We now know that reports of Snowden’s use of Lavabit for his secure communications were true and that, as most presumed, the reason the FBI drove Lavabit into closure was to surveil the leaker of the NSA files. Documents obtained from the federal court were published by transparency organisation Cryptome, as noted by Wired’s Kim Zetter, revealing that “Ed_Snowden@lavabit.com” was the intended target of the action against Lavabit. The documents were released after legal action from Levison, who has been fighting in an attempt to lift himself from his order of silence and reveal what really happened. A motion filed in December prompted the court to order the release of files within the case, specifically with the identity of the subscriber redacted. As the documents show, that didn’t happen. Snowden’s email address was left unredacted, and while Levison is still under order not to reveal who the FBI was after, the redaction error has confirmed Snowden as the target.
Paul Merrell

Second judge says Clinton email setup may have been in 'bad faith' | Reuters - 0 views

  • A second federal judge has taken the rare step of allowing a group suing for records from Hillary Clinton's time as U.S. secretary of state to seek sworn testimony from officials, saying there was "evidence of government wrong-doing and bad faith."The language in Judge Royce Lamberth's order undercut the Democratic presidential contender's assertion she was allowed to set up a private email server in her home for her work as the country's top diplomat and that the arrangement was not particularly unusual.He described Clinton's email arrangement as "extraordinary" in his order filed on Tuesday in federal district court in Washington.Referring to the State Department, Clinton and Clinton's aides, he said there had been "constantly shifting admissions by the Government and the former government officials."Spokesmen for Clinton did not immediately respond to a request for comment.
  • The case is a civil matter, but the order adds to the legal uncertainty that has overshadowed Clinton's campaign to be the Democratic nominee in the Nov. 8 presidential election. The FBI is also conducting a criminal inquiry into the arrangement after it emerged that classified government secrets ended up in Clinton's unsecured email account. Clinton has said she does not think she will be charged with a crime. Lamberth's order granted the request by Judicial Watch, a conservative watchdog group suing the department under open records laws, to gather evidence, including sworn testimony. The group has filed several lawsuits, including one seeking records about the 2012 attack in Benghazi, Libya, that killed U.S. Ambassador Christopher Stevens and three other Americans."Where there is evidence of government wrong-doing and bad faith, as here, limited discovery is appropriate, even though it is exceedingly rare in FOIA (freedom-of-information) cases," Lamberth noted in his order.The government is normally given the benefit of the doubt that it properly searched and produced records.
  • Since the email arrangement came to public knowledge a year ago, the State Department has found itself defending Clinton in scores of lawsuits from groups, individuals and news outlets who say they were wrongly denied access to Clinton's federal records. Clinton left the department in 2013, but did not return her email records to the government until nearly two years later. Last month, Judge Emmet Sullivan, who is overseeing a separate Judicial Watch lawsuit over other Clinton-related records, allowed a similar motion for discovery.
Paul Merrell

First to Fall? Panama Papers Bring Down Iceland PM, Portending Future Fallout | Common ... - 0 views

  • In the first instance of a prominent politician taken down by the 11.5 million documents leaked in the Panama Papers, Iceland Prime Minister Sigmundur Davíð Gunnlaugsson resigned on Tuesday after fully 10 percent of Iceland's population rallied in protest of his wife's secret, offshore shell company holding millions. Gunnlaugsson was asked about the account on the day the leak was announced in a television interview, and he walked out rather than answer the question:
  • The next day, "an estimated 22,000 Icelanders slung eggs and protested outside the Parliament building" demanding his resignation, as Common Dreams reported. Gunnlaugsson initially refused to bow to the public pressure, but eventually announced his resignation on Tuesday evening.
  • News editor of the Reykjavík Grapevine Paul Fontaine said Tuesday, "While the Prime Minister's particular role in the Panama Papers leak is huge, and I don't want to downplay it, I also don't want to downplay the involvement other Icelanders—and the countless others around the world—also had in this." "This extends beyond the prime minister; it reaches parliament, it reaches Reykjavík City Hall, and it reportedly reaches hundreds of as yet unnamed Icelandic businesspeople," Fontaine pointed out. "The greater crime, which the Panama Papers illustrate comprehensively, is that we have a secret economy connected to and even supporting some of the worst aspects of the global capitalist system."
  • ...5 more annotations...
  • Meanwhile, Ukraine's president faces possible impeachment proceedings for his offshore holdings in the British Virgin Islands, and the Chilean head of anti-corruption group Transparency International resigned Tuesday after the Panama Papers revealed his own use of secret shell companies.
  • Relatively few Americans have been named in the leak thus far, perhaps pointing to the country's status as one of the foremost locales for creating shell corporations like those documented in the Panama Papers. "Americans can form shell companies right in Wyoming, Delaware or Nevada," said Shima Baradaran Baughman, a law professor at the University of Utah, in an interview with Fusion. "They have no need to go to Panama to form a shell company to use for illicit activities."
  • David Dayen explored in depth the paltry U.S. regulations around onshore shell companies in Salon: "While we force foreign financial institutions to give up information on accounts held by U.S. taxpayers through the Foreign Account Tax Compliance Act of 2010, we don’t reciprocate by complying with international disclosure requirements standardized by the Organization for Economic Co-Operation and Development (OECD) and agreed to by 97 other nations. As a result, the U.S. is becoming one of the world’s foremost tax havens."
  • President Barack Obama addressed the Panama Papers leak for the first time on Tuesday, condemning the laws that make offshore tax havens legal. But those words rang hollow to many observers who recalled that the Obama Administration was behind the very trade deal, Panama TPA, that enshrined the rights of firms such as Mossack Fonseca to funnel millions into untraceable offshore shell companies. As Common Dreams noted, "Much of [Mossack Fonseca's] activities were not necessarily illegal—thanks to agreements such as the Panama TPA." It is worth noting that Bernie Sanders advocated against the deal.
  • Reform also seems unlikely should Hillary Clinton become the Democratic party's nominee, considering that she and her husband own a shell corporation such as the ones documented in the Panama Papers, as the Associated Press reported last year. Unnamed officials told the AP that "the entity was a 'pass-through' company designed to channel payments to the former president." Thanks to the nature of the laws surrounding such corporations, Clinton is not required to disclose the company's existence or earnings in her campaign finance reports. Still, observers are hopeful that this record-shattering leak will drum up enough public pressure to not only topple prominent politicians, but to also propel the efforts of groups seeking real legislative reform. "The Panama Papers are a boost to the global movement to stop tax-haven abuse and recapture trillions of the hidden wealth of nations," wrote author Chuck Collins in The Nation. "This story isn’t going away anytime soon."
Paul Merrell

Despite Comey Assurances, Vast Bulk of Weiner Laptop Emails Were Never Examined | RealC... - 0 views

  • When then-FBI Director James Comey announced he was closing the Hillary Clinton email investigation for a second time just days before the 2016 election, he certified to Congress that his agency had “reviewed all of the communications” discovered on a personal laptop used by Clinton’s closest aide, Huma Abedin, and her husband, Anthony Weiner.
  • At the time, many wondered how investigators managed over the course of one week to read the “hundreds of thousands” of emails residing on the machine, which had been a focus of a sex-crimes investigation of Weiner, a former Congressman. Comey later told Congress that “thanks to the wizardry of our technology,” the FBI was able to eliminate the vast majority of messages as “duplicates” of emails they’d previously seen. Tireless agents, he claimed, then worked “night after night after night” to scrutinize the remaining material. But virtually none of his account was true, a growing body of evidence reveals.
Paul Merrell

Gina Haspel CIA Torture Cables Declassified | National Security Archive - 0 views

  • Current CIA director Gina Haspel described graphic acts of deliberate physical torture including the waterboarding of a suspected Al-Qa’ida terrorist under her supervision when she was chief of base at a CIA black site in Thailand in 2002, according to declassified CIA cables – most of which she wrote or authorized – obtained by the National Security Archive through a Freedom of Information Act lawsuit and posted on the Web today. The Haspel cables detail conditions the public has only seen in the infamous Abu Ghraib photographs from Iraq of detainees hooded and shackled, forced nudity, wall slamming, and box confinement, as well as “enhanced techniques” never photographed such as the simulated drowning of suspects on the waterboard. Waterboarding is a war crime under both U.S. and international law, dating back to U.S. prosecution of Japanese solders for torturing U.S. POWs during World War II.[1]
Paul Merrell

Germany - ECCHR - EUROPEAN CENTER FOR CONSTITUTIONAL AND HUMAN RIGHTS (en) - 0 views

  • ECCHR’s legal intervention filed with the German Federal Public Prosecutor (Generalbundesanwalt – GBA) is aimed at securing an arrest warrant for CIA Deputy Director Gina Haspel. Haspel was appointed to the post by President Donald Trump in February 2017. The information submitted to the GBA by ECCHR on 6 June 2017 documents Haspel’s role in the torture of detainees in 2002 at a secret CIA prison in Thailand. In the dossier, ECCHR argues that Haspel oversaw the daily torture of detainees at the black site in 2002 and failed to do anything to stop it.  “Those who commit, order or allow torture should be brought before a court – this is especially true for senior officials from powerful nations,” said ECCHR’s General Secretary Wolfgang Kaleck. “The prosecutor must, under the principle of universal jurisdiction, open investigations, secure evidence and seek an arrest warrant. If the deputy director travels to Germany or Europe, she must be arrested.”
Paul Merrell

Israel using 'strange gases' against protesters in Gaza - Middle East Monitor - 0 views

  • April 9, 2018 at 9:26 am Israeli occupation forces used “strange” and “unknown” gases against unarmed, peaceful protesters in Gaza, Quds Press reported the central commission for documentation and pursuit of Israeli war criminals –Tawtheeq saying. Head of the commission Imad Al-Baz told Quds Press that Israel used strange gases against the protesters for the first time last Friday as Palestinians continued their peaceful activities as part of the Great March of Return. The gases caused protesters’ bodies to convulse and tremble, he explained. Many lost consciousness as a result for several hours, he added. “We do not know the kind of gases which were used for the first time,” he said, “but we took cultures from the blood and urine of those affected and we expect the results will be shocking.”
  • Israeli occupation forces used unmanned drones to drop the gas on the demonstrators, Al-Baz said. Protesters were being targeted in their lower body, Al-Baz said, with 55 shot with live ammunition in their genitals, likely in an effort to cause infertility. Some 32 Palestinians have been killed since 30 March when the Right of Return March was launch. A further 2,850 were injured.
Paul Merrell

Putin orders Russian officials relatives studying abroad to return home - YouTube - 0 views

  • Russia is ordering all of its officials to fly home any relatives living abroad amid heightened tensions over the prospect of global war, it has been claimed.Politicians and high-ranking figures are said to have received a warning from president Vladimir Putin to bring their loved-ones home to the 'Motherland', according to local media.It comes after Putin cancelled a planned visit to France amid a furious row over Moscow's role in the Syrian conflict and just days after it emerged the Kremlin had moved nuclear-capable missiles near to the Polish border.Former Soviet leader Mikhail Gorbachev has also warned that the world is at a 'dangerous point' due to rising tensions between Russia and the US.According to the Daily Star, administration staff, regional administrators, lawmakers of all levels and employees of public corporations have been ordered to take their children out of foreign schools immediately.Failure to act will see officials jeopardising their chances of promotion, local media has reported.The exact reason for the order is not yet clear.But Russian political analyst Stanislav Belkovsky is quoted by the Daily Star as saying: 'This is all part of the package of measures to prepare elites to some 'big war'.' Relations between Russia and the US are at their lowest since the Cold War and have soured in recent days after Washington pulled the plug on Syria talks and accused Russia of hacking attacks.
  • The Kremlin has also suspended a series of nuclear pacts, including a symbolic cooperation deal to cut stocks of weapons-grade plutonium. Just days ago, it was reported that Russia had moved nuclear-capable missiles near to the Polish border as tensions escalated between the world’s largest nation and the West.The Iskander missiles sent to Kaliningrad, a Russian enclave on the Baltic Sea between Nato members Poland and Lithuania, are now within range of major Western cities including Berlin.Polish officials – whose capital Warsaw is potentially threatened – have described the move as of the 'highest concern'. Putin's decision to cancel his Paris visit came a day after French President Francois Hollande said Syrian forces had committed a 'war crime' in the battered city of Aleppo with the support of Russian air strikes.Putin had been due in Paris on October 19 to inaugurate a spiritual centre at a new Russian Orthodox church near the Eiffel Tower, but Hollande had insisted his Russian counterpart also took part in talks with him about Syria.The unprecedented cancellation of a visit so close to being finalised is a 'serious step... reminiscent of the Cold War', said Russian foreign policy analyst Fyodor Lukyanov.'This is part of the broader escalation in the tensions between Russia and the West, and Russia and NATO,' he told AFP.The Kremlin has also been angered over the banning of the Russian Paralympic team from the Rio Olympics amid claims of state-sponsored doping of its athletes.
  • Meanwhile, the top advisor to US presidential candidate Hillary Clinton has said the FBI is investigating Russia's possible role in hacking thousands of his personal emails.But Russian officials have vigorously rejected accusations of meddling in the US presidential elections and dismissed allegations that Moscow was behind a series of recent hacks on US institutions. Retired Russian Lt. Gen. Evgeny Buzhinsky told the BBC: 'Of course there is a reaction. As far as Russia sees it, as Putin sees it, it is full-scale confrontation on all fronts. If you want a confrontation, you'll get one.'But it won't be a confrontation that doesn't harm the interests of the United States. You want a confrontation, you'll get one everywhere.'Earlier this week British Foreign Secretary Boris Johnson waded into the row, calling for anti-war campaigners to protest outside the Russian embassy in London.Johnson said the 'wells of outrage are growing exhausted' and anti-war groups were not expressing sufficient outrage at the conflict in Aleppo.'Where is the Stop the War Coalition at the moment? Where are they?' he said during a parliamentary debate.
« First ‹ Previous 561 - 580 of 589 Next ›
Showing 20 items per page