Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged criminal

Rss Feed Group items tagged

Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Gary Edwards

I Am a Peaceful AR-15 Assault Rifle Owner | Casey Research - 0 views

  •  
    ""Firearms stand next in importance to the constitution itself. They are the American people's liberty teeth and keystone under independence … from the hour the Pilgrims landed to the present day, events, occurances and tendencies prove that to ensure peace security and happiness, the rifle and pistol are equally indispensable … the very atmosphere of firearms anywhere restrains evil interference - they deserve a place of honor with all that's good." George Washington I can't think of any reason I need to own my AR-15 assault[1] rifle. I don't pretend to need it for self defense. I also own several handguns. Any one of my handguns would be adequate to allow me an opportunity to defend myself, or another person, from virtually any act of aggression by another individual. Indeed, I could have easily halted any of the recent gun based rampages, by any of those deranged lunatics, with just one of my handguns. I wish I had been there. I have needlessly and peacefully owned my AR-15 for many years. I keep my AR-15 securely locked in a gun safe in the very same home where my young children live. My children are aware of my AR-15. Like many other things in life, I have taught my children about guns. Recently, some of my kids attended a private gun safety class given by a highly experienced gun expert. I enjoyed watching my kids learn about my AR-15. I admit being a bit nostalgic about my AR-15. I spent lots of time learning about every aspect of the AR-15 when I was in Marine Corps boot camp at Parris Island, South Carolina. I also carried an AR-15 when I served my country in Operation Desert Storm in Saudi Arabia. I had it with me when I lived in a dirt hole on the border of Kuwait. It is the weapon I know better than any other. I own lots of dangerous things I don't need. I don't need my highly modified 600+ hp Z06 Corvette, or my Harley Davidson motorcycle, or that crazy looking knife I sometimes jokingly say was imported directly from the Klingon Empire.[2] Al
Gary Edwards

"High Crimes and Misdemeanors" - Tea Party Command Center - 0 views

  • high crimes and misdemeanors”
  • Officials accused of “high crimes and misdemeanors” were accused of offenses as varied as misappropriating government funds, appointing unfit subordinates, not prosecuting cases, not spending money allocated by Parliament, promoting themselves ahead of more deserving candidates, threatening a grand jury, disobeying an order from Parliament, arresting a man to keep him from running for Parliament, losing a ship by neglecting to moor it, helping “suppress petitions to the King to call a Parliament,” granting warrants without cause, and bribery. Some of these charges were crimes. Others were not. The one common denominator in all these accusations was that the official had somehow abused the power of his office and was unfit to serve.
  • Patriots plan for resisting the Globalist agenda: Develop Secure Community Co-ops (Interactive Neighborhood Watch on steroids).  Groups should be from about 5 to 15 people in the same general area, neighborhood.  All members should be conservative/responsible adults.Members should work at fortifying local, county and state govts. as well as joining Shrf. Reserve Forces (as long as the shrf. is an oathkeeper), Constitutional Sheriffs Assoc./ USCDA, State Militias, Constitutional Militias, etc.  Also,  should be involved in TP, 9-12, John Birch Soc., etc.SCC's should have a liason with other like-minded grps. in order to give/obtain support when needed.The states should and hopefully will be the first line of defense against an overreaching tyrannical govt.(Don't count on it if you are living in a Blue State)  Next, it would fall on the counties and local communities, working in concert with the various State Militia units, Co. Shrfs' Depts., Constitutional and SCC elements.  After that,  if needed,  Bug Out procedures should be implemented.  Hopefully, to safe areas.
  • ...3 more annotations...
  • The Constitution defines treason in Article 3, Section 3, Clause 1: Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.
  • In all the articles of impeachment that the House has drawn, no official has been charged with treason
  • What are “high crimes and misdemeanors”?
  •  
    "The U.S. Constitution provides impeachment as the method for removing the president, vice president, federal judges, and other federal officials from office. The impeachment process begins in the House of Representatives and follows these steps: The House Judiciary Committee holds hearings and, if necessary, prepares articles of impeachment. These are the charges against the official. If a majority of the committee votes to approve the articles, the whole House debates and votes on them. If a majority of the House votes to impeach the official on any article, then the official must then stand trial in the Senate. For the official to be removed from office, two-thirds of the Senate must vote to convict the official. Upon conviction, the official is automatically removed from office and, if the Senate so decides, may be forbidden from holding governmental office again. The impeachment process is political in nature, not criminal. Congress has no power to impose criminal penalties on impeached officials. But criminal courts may try and punish officials if they have committed crimes. The Constitution sets specific grounds for impeachment. They are "treason, bribery, and other high crimes and misdemeanors." To be impeached and removed from office, the House and Senate must find that the official committed one of these acts. The Constitution defines treason in Article 3, Section 3, Clause 1: Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court."
Paul Merrell

Watchdog: FBI Facial Recognition May Not Be Accurate - Nextgov.com - 0 views

  • The FBI doesn’t know exactly how accurate its facial recognition technology is, new watchdog report finds. The bureau's Next Generation Identification-Interstate Photo System, a database including more than 30 million photos of criminals, lets law enforcement match a surveillance camera photo to that of a known criminal by narrowing their identity to between two and 50 possible candidates. But the FBI hasn't ensured its facial recognition technology doesn’t “unnecessarily include photos of innocent people as investigative leads,” according to a new report from the Government Accountability Office. The NGI-IPS and the FBI’s "Facial Analysis, Comparison and Evaluation Services," or FACE, which accesses databases from other federal, state and local groups, were the subject of a recent audit.  Most photos in NGI-IPS are submitted from 18,000 external groups among federal, state and local law enforcement -- about 70 percent are criminal mugshots. It’s the same technology that helped the FBI and a state track down a sex offender who had been on the run for 20 years. The FBI has spent about $55 million on facial recognition over the last six years.
  • FBI officials haven’t tested the detection rate -- how often a match is generated against a submitted photo -- for lists less than 50 candidates, according to GAO. Law enforcement may request a specific number of candidates for any search, though the default is 20. Verifying that NGI-IPS is accurate for all candidate list sizes would provide more assurance that the system helps to “enhance, rather than hinder, criminal investigations,” the GAO report said. <a href="http://pubads.g.doubleclick.net/gampad/jump?sz=300x300&c=801138892&iu=%2F617%2Fnextgov.com%2Fsection_emergingtech%2Fcontent%2Fpid_129155&t=noscript%3Dtrue%26referring_domain%3DTyped%252FBookmarked%26pos%3Dinjector%26level%3D0"> <img src="http://pubads.g.doubleclick.net/gampad/ad?sz=300x300&c=801138892&iu=%2F617%2Fnextgov.com%2Fsection_emergingtech%2Fcontent%2Fpid_129155&t=noscript%3Dtrue%26referring_domain%3DTyped%252FBookmarked%26pos%3Dinjector%26level%3D0"/> </a> The FBI also hasn’t assessed how often errors occur in facial matching. These can be caused both by lower-quality technology, but also by low-quality photos, the report said. The detection- and the false-positive rate are key data points that will help the bureau and the public understand these risks before the technology is deployed, the report said. GAO also found FBI hadn’t determined whether the facial recognition technology its federal, state and local partners use is accurate enough to support its own investigations. These oversights could impinge on citizen's privacy and civil liberties, the report noted. In 2012, the advocacy group the Electronic Frontier Foundation suggested facial recognition systems could allow “covert, remote, and mass capture and identification of images.”
  • In criminal cases, a false positive might force a defendant to prove he or she isn’t who the facial recognition system thought he was -- such a scenario might “alter the traditional presumption of innocence,” an EFF statement said. The FBI has also been slow in publishing its privacy protocol, the report found. The Justice Department hadn’t updated a key “Privacy Impact Assessment” between 2008 and 2015; and though NGI-IPS has existed since 2011, the FBI also didn’t publish the requisite System of Records Notice, explaining how the technology is used, until May 2016. Publishing these notices more promptly would reassure the public “the FBI is evaluating risks to privacy,” the report said.  The GAO review comes shortly after DOJ published a notice arguing its massive biometric database should be excluded from the Privacy Act, which requires the federal government to disclose, upon inquiry from the subject, the information it collects on the public. The system includes finger and palm prints, iris and facial scans, images of tattoos, from criminals, suspects, detainees and anyone undergoing background checks, security clearances and other government assessments.
Paul Merrell

Conflict Erupts in Public Rebuke on C.I.A. Inquiry - NYTimes.com - 0 views

  • A festering conflict between the Central Intelligence Agency and its congressional overseers broke into the open Tuesday when Senator Dianne Feinstein, chairwoman of the Intelligence Committee and one of the C.I.A.’s staunchest defenders, delivered an extraordinary denunciation of the agency, accusing it of withholding information about its treatment of prisoners and trying to intimidate committee staff members investigating the detention program.Describing what she called a “defining moment” for the oversight of American spy agencies, Ms. Feinstein said the C.I.A. had removed documents from computers used by Senate Intelligence Committee staff members working on a report about the agency’s detention program, searched the computers after the committee completed its report and referred a criminal case to the Justice Department in an attempt to thwart their investigation.
  • Ms. Feinstein’s disclosures came a week after it was first reported that the C.I.A. last year had monitored computers used by her staff in an effort to learn how the committee may have gained access to the agency’s own internal review of the detention and interrogation program that became perhaps the most criticized part of the American government’s response to the Sept. 11, 2001, attacks. Ms. Feinstein said the internal review bolstered the conclusions of the committee’s still-classified report on the program, which President Obama officially ended in January 2009 after sharply criticizing it during the 2008 presidential campaign. For an intelligence community already buffeted by controversies over electronic surveillance and armed drone strikes, the rupture with Ms. Feinstein, one of its closest congressional allies, could have broad ramifications.
  • “Feinstein has always pushed the agency in private and defended it in public,” said Amy B. Zegart, who studies intelligence issues at Stanford University. “Now she is skewering the C.I.A. in public. This is a whole new world for the C.I.A.”Ms. Feinstein, who had refused to comment on the dispute between the C.I.A. and her committee, took the Senate floor on Tuesday morning to say the agency’s actions had breached constitutional provisions for the separation of powers and “were a potential effort to intimidate.” “How this will be resolved will show whether the Intelligence Committee can be effective in monitoring and investigating our nation’s intelligence activities, or whether our work can be thwarted by those we oversee,” she said.
  • ...4 more annotations...
  • The dispute came to a head in mid-January when Mr. Brennan told members of the committee that the agency had carried out a search of computers used by committee investigators at a C.I.A. facility in Northern Virginia, where the committee was examining documents the agency had made available for its report. Ms. Feinstein said on Tuesday that during the meeting, Mr. Brennan told her that the C.I.A. had searched a “walled-off committee network drive containing the committee’s own internal work product and communications” and that he was going to “order further forensic evidence of the committee network to learn more about activities of the committee’s oversight staff.”
  • The C.I.A. had carried out the search to determine whether committee investigators may have gained unauthorized access to the internal review of the detention program that the agency had carried out without informing the committee. Ms. Feinstein on Tuesday vigorously disputed this allegation, saying the document had been included — intentionally or not — as part of a dump of millions of pages the C.I.A. had provided for the Intelligence Committee.
  • Mr. Brennan, in a January letter to Ms. Feinstein that a government official who did not want to be identified released on Tuesday, said the committee had not been entitled to the internal review because it contained “sensitive, deliberative, pre-decisional C.I.A. material”— and therefore was protected under executive privilege considerations. The letter, attached to a statement that Mr. Brennan issued to the agency’s employees on Tuesday, raised questions about Ms. Feinstein’s statements earlier in the day concerning at what point the committee came into possession of the internal review. The C.I.A.’s acting general counsel has referred the matter to the Justice Department as a possible criminal offense, a move Ms. Feinstein called a strong-arm tactic by someone with a conflict of interest in the case. She said that that official had previously been a lawyer in the C.I.A.’s Counterterrorism Center — the section of the spy agency that was running the detention and interrogation program — and that his name is mentioned more than 1,600 times in the committee’s report. Ms. Feinstein did not name the lawyer, but she appeared to be referring to Robert Eatinger, the C.I.A.’s senior deputy general counsel. In 2007, The New York Times reported that when a top C.I.A. official in 2005 destroyed videotapes of brutal interrogations of Al Qaeda detainees, Mr. Eatinger had been one of two lawyers to approve their destruction.
  • Ms. Feinstein said that on two occasions in 2010, the C.I.A. had removed documents totaling hundreds of pages from the computer server used by her staff at the Northern Virginia facility. She did not provide any details about the documents, but said that when committee investigators confronted the C.I.A. they received a number of answers — first a denial that the documents had been removed, then an explanation that they had been removed by contractors working at the facility, then an explanation that the removal of documents was ordered by the White House. When the committee approached the White House, she said, it denied giving such an order.Ms. Feinstein’s broadside rallied Senate Democrats, but divided Republicans.
  •  
    The separation of powers Constitutional issue here is plain. The Senate has oversight of the CIA; the CIA has no lawful oversight of the Senate and furthermore is forbidden by law from conducting surveillance within the U.S. But the CIA spied on the Senate, then used evidence it found to file a criminal complaint with the DoJ against Senate staffers. Tit for tat, a criminal complaint has been filed against the CIA staffers.   
Paul Merrell

Toxic US corporate culture 'unchanged': watchdog - Yahoo News - 0 views

  • Five years after the US financial crisis forced the massive government TARP bailout, the US corporate culture remains toxic and breeding crime, the watchdog for the bailout program said Tuesday.More than 300 people in the banking, housing and securities industries are in the hands of the criminal system, whether it is a charge, a conviction or a sentencing, the Office of the Special Inspector General for the Troubled Asset Relief Program (SIGTARP) said in a quarterly report to Congress."The financial system has stabilized, but the toxic corporate culture that led up to the crisis and TARP has not sufficiently changed," said Christy Romero, the special inspector general."At the core of the crisis was a pervasive culture at institutions of rampant risktaking and greed combined with significant unchecked power," she said.
  • SIGTARP was launched in early 2009 to detect fraud in the massive TARP bailout program. Within weeks of the Lehman Brothers bankruptcy, the government set up the $700 billion TARP to prop up the collapsing financial system. In 2010, the cap on the Treasury's authority to purchase and guarantee assets under TARP was reduced to $475 billion.To date, 65 people have been sentenced to prison for their crimes investigated by SIGTARP and its law enforcement partners, 112 have been convicted and await sentencing and 154 individuals have been criminally charged and face trial on those charges, the report said.In addition, 60 people have been banned from their industries."Many of these defendants were at the highest levels of banks or companies that applied for or received TARP bailout money. They were trusted to exercise good judgment and make sound decisions. However, they abused that trust. Many times they abused that trust for their own personal benefit," the report said.
  • As of September 30 Treasury had $30.7 billion in write-offs, losses or money not collectible from the program, according to the report."Treasury's write-offs and realized losses are money that taxpayers will never get back. Treasury generally expects the amounts currently not collectible will also be lost," the agency said.The watchdog was harshly critical of the Treasury's oversight of the Hardest Hit Fund, set up in February 2010 to help families in places hurt the most by the housing crisis.The Treasury allocated $7.6 billion in TARP funds for the HHF program in 18 states and Washington, DC, administered by local authorities.But states have reduced their proposed numbers of homeowners needing help, and the Treasury has ignored the SIGTARP's conclusions of an audit reported in April 2012.
  • ...1 more annotation...
  • "Rather than fix the problem that SIGTARP warned Treasury about in its audit, Treasury allowed the problem to get worse. Rather than following SIGTARP’s recommendations, which were designed to make Treasury and states set goals and work hard to achieve those goals, Treasury is refusing to hold itself or the states accountable to any goal of the number of homeowners to be assisted in HHF, and the result has been that the program is reaching far fewer homeowners than the states expected," the agency said.As of June 30, 2013, the latest data available, it said, states had spent only 22 percent, or $1.7 billion, of the TARP funds and the program had helped only 27 percent of the homeowners that states had anticipated helping in 2011.
  •  
    So many convictions. But somehow, I missed the news about executives at the too-big-to-fail banks being even prosecuted, let alone being convicted. But I did hear about a few of them becoming Obama Administration officials and bankster industry regulators. I'd really like to see a breakdown of who was convicted, of what, and their former positions. And for the 154 awaiting trial, what they're charged with and the positions they occupied at the relevant times. Forgive me for my cynicism, but those in charge of the too-big-to-fail frauds seem to be buying deals not to prosecute people criminally in return for civil penalties that are far less than the money gained by their frauds. Perhaps a relevant reform would be to limit the Justice Department and SEC's ability to bring civil cases against corporations to situations in which they have already secured a criminal conviction of one or more of the the company's principles?  Civil penalties levied against corporations have done little to deter bankster fraud. 
Paul Merrell

And The Benghazi Media Circus Plays On… | Global Research - 0 views

  • A recent article written by this writer for Global Research posted last Saturday – “The Benghazi Scandal Is Obama’s Watergate But Worse” – was written in an effort to seek and uncover the truth. Accurate reporting on major world events is a challenge in today’s world where propaganda and disinformation are mainstream media norms and where virtually all major players in American politics simply lie through their teeth every time they open their mouths in constant effort to look good and cover up the truth. The American public knows this pathetic and sobering fact that deception has come to rule in the world of both politics and the media. People today neither believe their newscasters nor their political leaders. That is why examining the content of the tidal wave of assertions and opinions spewing forth from politicians and pundits in the aftermath of the latest Benghazi revelations must be taken with a grain of salt. Again, truth in today’s world is hard to come by. But as an investigative reporter, presenting a brief overview of recent comments and statements for any informed citizen to process and digest seems a worthwhile and important enterprise.
  • A timeline of recently unfolding events: On 10/12/12 exactly one month after the Benghazi incident, the legal conservative group Judicial Watch filed a Freedom of Information Act request seeking documents related to the Benghazi attack on September 11th, 2012 that killed the US Ambassador to Libya Christopher Stevens and three other Americans. Obama, who had campaigned on a promise of transparency in the criminal wake of the Bush regime, has proven to be anything but open and transparent. Having to sue the US government for access to the records, on April 18th, 2014, a full year and a half later, the Obama administration’s stonewalling ultimately failed and Judicial Watch successfully got hold of 41 State Department Benghazi related documents. Emails between high level White House officials discussing damage control strategies in the immediate aftermath of the Benghazi assault were released last week. Jubilant Republicans are now calling one of those emails their “smoking gun,” believing it is so incriminating that it will do in their would-be opponent Hillary Clinton from potentially competing in the 2016 presidential election.
  • The newly declassified email written by Obama’s then Deputy Strategic Communications Adviser Ben Rhodes specifically directed then UN Ambassador Susan Rice in preparation for her Sunday morning talk show appearances on September 16th, 2012 to explain the administration’s take on what it knew of the Benghazi murders. Rhodes advised Rice to attribute the Benghazi uprising as “rooted in an Internet video, and not a failure of policy,” pushing talking points designed to bolster Obama’s presidential image as a cool-as-a-cucumber-under-fire kind of wise and benevolent leader and statesman. The major emphasis of the email instructed Rice to blame the bogus anti-Moslem video as inciting a spontaneous protest like in other countries in the region that apparently grew violently out of control, of course all the while knowing that that was a boldface lie. This crucial piece of evidence proves that President Obama and Secretary of State Hillary Clinton both knew that the video did not cause the attack but that they chose to willfully deceive the American public in order to protect their own political careers and hence was born the infamously never ending Benghazi cover-up. Obama and Hillary withheld this damning email evidence even from the House Oversight Committee led by Congressman Darrel Issa (R-CA) requesting all documents pertaining to Benghazi more than a year ago. With the presidential election less than two months away at the time of the attack, Obama and Hillary were determined at all cost to keep hidden from Americans the real truth of criminal Benghazi activity they were guilty of engaging in during the months leading up to the attack. Last Thursday an angry Issa subpoenaed current Secretary of State John Kerry to appear before the committee on May 21st to further explain why those critical State Department records recently given to Judicial Watch were not among the 3200 documents originally handed over to his committee well over a year ago.
  • ...9 more annotations...
  • Investigative reporter Kenneth R. Timmerman as author of a new forthcoming book entitled ‘Dark Forces: The Truth About What Happened in Benghazi’ states: We know that orders were issued, then recalled, to deploy a 50-man Special Forces unit from Croatia that could have reached Benghazi within hours.Timmerman concludes that to date no documents revealing the person who ordered that unit to stand down have yet to surface.
  • Within hours of the general’s testimony came rebukes from both the senior Republican and Democrat on the powerful House Armed Services Committee making claims backing the administration’s that the military was incapable of responding in time to assist the ill-fated Americans in Benghazi. Because they represent the military in Congress that had already drawn the conclusion that nothing tactically could have been done to save the four Americans, they were quick to rebut the general’s testimony. Yet the day before 9/11 every year since 9/11/01 including on 9/10/11, the president meets with top military and security personnel to ensure that US embassies around the globe are bolstered with much needed extra security for 9/11 readiness. Yet the Benghazi compound was so insecure despite repeated requests, both Obama and the military apparently failed to have any military units on standby that could reach Benghazi to be of service on the night of 9/11/12. And this comes after intelligence sources have been reporting insufficient security at the Benghazi embassy compound.
  • Another disclosure at last Thursday’s House Oversight Committee hearing further damaging the credibility and actions of the Obama administration came from retired Air Force General Robert Lovell who at the time of Benghazi was in Germany serving as the senior African Command deputy director for intelligence. Lovell testified, “We should have sent help,” adding that the White House decision not to attempt military assistance due to the time factor was unacceptable. Lovell also stated unequivocally that the military knew that the Benghazi attack had nothing to do with the video falsely used by the administration to explain away the tragedy. The ex-general felt his military should have intervened and was waiting all night long for the call that never came from his bosses in Washington. Clearly he feels a sense of remorse and regret over the passivity imposed on him by his commander-in-chief Obama and State Department head Clinton.
  • Meanwhile, last week in a heated exchange with ABC correspondent Jon Karl a visibly agitated White House Press Secretary Jay Carney insisted that Rhodes’ email was not related to Benghazi at all but referred to the Moslem protests generally taking place in the region in response to the video. The next day Fox reporter Ed Henry engaged Carney on the same issue, eliciting the same haranguing reaction. All this appears to be yet more desperate lies in a feeble attempt to cover his bosses’ Obama and Hillary’s asses called criminal guilt, and by so doing committing his own. Carney had been among the original recipients of Rhodes’ email. Carney further explained that the same Rhodes talking points echoed those delivered earlier to Congress and the White House by deputy CIA director Mike Morell who a month ago claimed he received no pressure or influence from anyone in the Obama administration in coming up with his version of what most likely transpired on 9/11/12 based on all CIA intelligence sources available at the time. Yet on his own Morell admitted to toning down the intelligence reports leading up to the Benghazi attack purposely so as to not appear to be an “I told you so” gesture that would offend Hillary and her State Department. That said, Hillary’s underling and rising star Victoria Nuland (the later promoted to profanity-speaking Assistant Secretary of State who played such a key role in the recent US backed fascist Ukrainan coup) objected to Morell’s talking points that in her mind leaned too heavily toward blaming her boss and their State Department for insufficient security at the Benghazi compound. Her words:
  • Why do we want Hill to start fingering Ansar Al Sharia [the known al Qaeda affiliated attackers that murdered the four Americans], when we aren’t doing that ourselves until we have the investigation results…and the penultimate point could be abused by Members to beat the State Department for not paying attention to Agency warnings so why do we want to feed that?… Concerned.Observe how the exclusive focus of all post-Benghazi interdepartmental correspondence from Rhodes’ to Morell’s to Nuland’s all center on appearance and potential perception to avoid CYA blame. Furthest down on their priority list is honest and truthful disclosure and self-accountability. Again, the name of the game in the world of politics is passing the buck whenever possible to minimize potential heat that comes with looking bad and maximizing looking good by any means or lies necessary. Benghazi perfectly illustrates all of this.
  • Based on the information finally coming to light all last week, last Friday House Speaker John Boehner (R-OH) called for a special select committee not unlike the one for Watergate to further investigate Benghazi. Representative Trey Gowdy (SC-R) has already been selected as its lead investigator. This grandstanding ploy seems a bit superfluous and redundant since the House Oversight Committee has ostensibly been trying to get to the bottom of Benghazi for nearly a year and a half, albeit thus far ineffective in its results, no help from the State Department’s prior email omissions. Not only is Benghazi the hot topic buzzing here in America, on that same day last Friday, more bullets was buzzing in Benghazi as well. Nine police security soldiers were gunned down by, you guessed it, the same murderers still remaining at large that were behind the 9/11/12 Benghazi attack – the militant group the US has for years labeled an al Qaeda affiliated terrorist organization Ansar al-Sharia. After massacring 31 peaceful demonstrators protesting outside the militants’ headquarters last June, last week’s massacre is a powerful statement showing that the terrorists are still in charge in Benghazi and immune from any accountability from the US installed puppet government either in Tripoli or Washington. They remain free men at large despite Obama’s promise to hunt them down and bring them to justice.
  • The senior Democratic House Intel Committee Representative Adam Schiff (D-CA) typifies the partisan Obama-Hillary politics games of each side racing to the media to point fingers at each other in their same old, same old blame game. On Sunday Schiff stated he does not want any Democrats to participate in the newly forming select committee that the Republican House Speaker Boehner has just recently called for, already naming its GOP chair. That is simply a game the Dems will refuse to play. Why? Because Republicans cannot make them. Sound familiar? Perhaps your 7-year old child might employ this same game strategy. Insider Dems like former White House advisor turned ABC analyst (and another original recipient of Rhodes’ infamous email) David Plouffe conveniently took to ABC’s Sunday morning On This Week with George Stephanopoulos crying foul even louder with their familiar “conspiracy” chant they customarily use to discredit any criticism leveled at the Obama administration. His cries reaching desperation this week accuse a “very loud, delusional minority” of Republicans of an obsessive politics game over Benghazi. Another all too familiar grade school tactic, whatever misbehavior you are accused of, simply accuse your enemy of the same offense, an old early childhood trick that you never need outgrow in the world of politics.
  • Still another indignant reaction hardcore defenders of Hillary and Obama are now quick to cite are the thirteen embassy attacks that occurred as so called “Benghazi’s on Bush’s watch” when not a peep was ever heard from the press. This straw house strategy is designed to show how Republicans and Fox News are hypocritical in their obsession to find dirt on Benghazi where they deny any exists. Yet this accusation seems to omit one very significant fact. Not one of those embassy attacks during the Bush regime resulted in any murdered Americans, much less four of them and one being a US Ambassador, something that has not happened in the last 32 years before Benghazi. The media circus demonizing partisan politics players on both sides epitomizes why the US government is so utterly broken, horribly dysfunctional, morally bankrupt and totally ineffective in addressing any and all of the most pressing problems facing America and the world today. The blame game is all they know. Yet in all their exaggeration, lies, name calling and finger pointing, not one of them is even addressing the pink elephant in the room.
  • Obama, Hillary and then CIA Director retired General Betrayus Petraeus were/are international gun running criminal outlaws of the worst kind, working with the very same al Qaeda terrorist bunch that murdered those four nearly forgotten Americans. US tax dollars were/are going into the pockets of Ansar al-Sharia and al Qaeda mercenaries that looted Muammar Kaddafi’s gold cache and enormous weapon arsenal that included chemical weapons as well as surface to air missiles. And Obama, Petraeus and 2016 presidential heir apparent Hillary were in deep over their heads under Hillary and Stevens’ State Department cover, shipping them from Benghazi through Turkey to Syria to covertly fight a war by proxy against Assad’s government forces. After more than three bloody years, to this day the US is still bent on destroying another sovereign nation posing absolutely no security threat to America. These are the war crimes constantly being committed by Obama, Petraeus and Hillary and their lies upon lies are unraveling at an accelerated clip with each passing month. Thus, expect to see more desperate acts of aggression from desperate despots who know that their jig is up. Yet desperate despots do not care how many humans they will take down with them. But justice for these longtime perpetrators of multiple crimes against humanity will be served in the end.
Gary Edwards

The Dark Side of the Socialist Joker: "Don't Just Take Their Wealth, Destroy it!" - 0 views

  •  
    Business Insiders John Carney describes what happened at evil doer, AIG. In describing the black hole that is swallowing up endless volumes of taxpayer wealth, Carney points out that AIG is a channel for redistributing American wealth to International Bankers. ".... In last summer's blockbuster "The Dark Knight," the Joker invites one of the top crime lords of Gotham City to the rundown warehouse where he has stashed his ill-gotten gains. The mobster stares in awe at the huge stack of money the arch-criminal has amassed. But a moment later, his awe turns to horror as the Joker sets the money aflame. "This town deserves a better class of criminal," he explains. The exchange reveals the deep evil of the Joker. Unlike a common criminal, he doesn't just want to steal money from others. He wants to destroy their wealth....... At the heart of AIG's problems is a financial product called a credit default swap, which is really just an insurance contract on debt. If a borrower failed to pay off a loan fully, an investor protected by a credit default swap would be able to collect the outstanding amount from the insurance company. The idea was that credit default swaps would reduce the risk to any investor who bought bonds. In the best of worlds, they would reduce risk throughout the financial system by spreading out the costs of defaults. But that's not how things worked out. Instead, credit default swaps came to be used by banks in a way that no one anticipated-to avoid banking regulations. And AIG decided to get into the business of enabling this scheme...... "
Paul Merrell

Details of Illegal Torture That the CIA Doesn't Want You to Know About - Atlantic Mobile - 0 views

  • The Senate report on CIA torture is still being suppressed. But details are leaking out, according to a report by Jason Leopold. Citing Intelligence Committee staffers, he writes that "at least one high-value detainee was subjected to torture techniques that went beyond those authorized by George W. Bush's Justice Department." In addition, "harsh measures authorized by the Department of Justice had been applied to at least one detainee before such legal authorization was received."  The notion that Bush-era interrogations were lawful has always been highly dubious. This latest news plucks away even the fig leaf afforded by Bush Administration attorneys. Some say it would be unfair to prosecute anyone told that a tactic was permitted.  Will they call for a criminal investigation of these incidents? The CIA seems to agree that these details are important. It is seeking new assurances that the report won't lead to criminal investigations, according to Leopold's sources:
  • When Panetta briefed CIA employees on March 16, 2009, about the Senate Intelligence Committee’s review, he said Feinstein and her Republican counterpart, Kit Bond of Missouri, had “assured” him “that their goal is to draw lessons for future policy decisions, not to punish those who followed guidance from the Department of Justice.” But now that some of the report’s conclusions suggest that some of the techniques used on Abu Zubaydah and other captives either went beyond what was authorized by the Justice Department or were applied before they had been authorized, the congressional staffers and U.S. officials who spoke to Al Jazeera said CIA officials are seeking further assurances against any criminal investigation. Thus far, no such assurances have been given, according to Al Jazeera’s sources, nor is there any indication that the Senate Intelligence Committee’s report would prompt a criminal investigation. Any agreement to refrain from investigating torture as a criminal offense would itself violate the law. The UN Convention Against Torture, signed by Ronald Reagan and later ratified by the U.S. Senate, compels signatories to investigate torture and "submit the case to its competent authorities for the purpose of prosecution." Perhaps the U.S. will one day adhere to the law.
Paul Merrell

WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief's ou... - 0 views

  • An internal CIA investigation confirmed allegations that agency personnel improperly intruded into a protected database used by Senate Intelligence Committee staff to compile a scathing report on the agency’s detention and interrogation program, prompting bipartisan outrage and at least two calls for spy chief John Brennan to resign.“This is very, very serious, and I will tell you, as a member of the committee, someone who has great respect for the CIA, I am extremely disappointed in the actions of the agents of the CIA who carried out this breach of the committee’s computers,” said Sen. Saxby Chambliss, R-Ga., the committee’s vice chairman.
  • The rare display of bipartisan fury followed a three-hour private briefing by Inspector General David Buckley. His investigation revealed that five CIA employees, two lawyers and three information technology specialists improperly accessed or “caused access” to a database that only committee staff were permitted to use.Buckley’s inquiry also determined that a CIA crimes report to the Justice Department alleging that the panel staff removed classified documents from a top-secret facility without authorization was based on “inaccurate information,” according to a summary of the findings prepared for the Senate and House intelligence committees and released by the CIA.In other conclusions, Buckley found that CIA security officers conducted keyword searches of the emails of staffers of the committee’s Democratic majority _ and reviewed some of them _ and that the three CIA information technology specialists showed “a lack of candor” in interviews with Buckley’s office.
  • The inspector general’s summary did not say who may have ordered the intrusion or when senior CIA officials learned of it.Following the briefing, some senators struggled to maintain their composure over what they saw as a violation of the constitutional separation of powers between an executive branch agency and its congressional overseers.“We’re the only people watching these organizations, and if we can’t rely on the information that we’re given as being accurate, then it makes a mockery of the entire oversight function,” said Sen. Angus King, an independent from Maine who caucuses with the Democrats.The findings confirmed charges by the committee chairwoman, Sen. Dianne Feinstein, D-Calif., that the CIA intruded into the database that by agreement was to be used by her staffers compiling the report on the harsh interrogation methods used by the agency on suspected terrorists held in secret overseas prisons under the George W. Bush administration.The findings also contradicted Brennan’s denials of Feinstein’s allegations, prompting two panel members, Sens. Mark Udall, D-Colo., and Martin Heinrich, D-N.M., to demand that the spy chief resign.
  • ...7 more annotations...
  • Another committee member, Sen. Ron Wyden, D-Ore., and some civil rights groups called for a fuller investigation. The demands clashed with a desire by President Barack Obama, other lawmakers and the CIA to move beyond the controversy over the “enhanced interrogation program” after Feinstein releases her committee’s report, which could come as soon as next weekMany members demanded that Brennan explain his earlier denial that the CIA had accessed the Senate committee database.“Director Brennan should make a very public explanation and correction of what he said,” said Sen. Carl Levin, D-Mich. He all but accused the Justice Department of a coverup by deciding not to pursue a criminal investigation into the CIA’s intrusion.
  • “I thought there might have been information that was produced after the department reached their conclusion,” he said. “What I understand, they have all of the information which the IG has.”He hinted that the scandal goes further than the individuals cited in Buckley’s report.“I think it’s very clear that CIA people knew exactly what they were doing and either knew or should’ve known,” said Levin, adding that he thought that Buckley’s findings should be referred to the Justice Department.A person with knowledge of the issue insisted that the CIA personnel who improperly accessed the database “acted in good faith,” believing that they were empowered to do so because they believed there had been a security violation.“There was no malicious intent. They acted in good faith believing they had the legal standing to do so,” said the knowledgeable person, who asked not to be further identified because they weren’t authorized to discuss the issue publicly. “But it did not conform with the legal agreement reached with the Senate committee.”
  • Feinstein called Brennan’s apology and his decision to submit Buckley’s findings to the accountability board “positive first steps.”“This IG report corrects the record and it is my understanding that a declassified report will be made available to the public shortly,” she said in a statement.“The investigation confirmed what I said on the Senate floor in March _ CIA personnel inappropriately searched Senate Intelligence Committee computers in violation of an agreement we had reached, and I believe in violation of the constitutional separation of powers,” she said.It was not clear why Feinstein didn’t repeat her charges from March that the agency also may have broken the law and had sought to “thwart” her investigation into the CIA’s use of waterboarding, which simulates drowning, sleep deprivation and other harsh interrogation methods _ tactics denounced by many experts as torture.
  • Buckley’s findings clashed with denials by Brennan that he issued only hours after Feinstein’s blistering Senate speech.“As far as the allegations of, you know, CIA hacking into, you know, Senate computers, nothing could be further from the truth. I mean, we wouldn’t do that. I mean, that’s _ that’s just beyond the _ you know, the scope of reason in terms of what we would do,” he said in an appearance at the Council on Foreign Relations.White House Press Secretary Josh Earnest issued a strong defense of Brennan, crediting him with playing an “instrumental role” in the administration’s fight against terrorism, in launching Buckley’s investigation and in looking for ways to prevent such occurrences in the future.Earnest was asked at a news briefing whether there was a credibility issue for Brennan, given his forceful denial in March.“Not at all,” he replied, adding that Brennan had suggested the inspector general’s investigation in the first place. And, he added, Brennan had taken the further step of appointing the accountability board to review the situation and the conduct of those accused of acting improperly to “ensure that they are properly held accountable for that conduct.”
  • The allegations and the separate CIA charge that the committee staff removed classified documents from the secret CIA facility in Northern Virginia without authorization were referred to the Justice Department for investigation.The department earlier this month announced that it had found insufficient evidence on which to proceed with criminal probes into either matter “at this time.” Thursday, Justice Department officials declined comment.
  • In her speech, Feinstein asserted that her staff found the material _ known as the Panetta review, after former CIA Director Leon Panetta, who ordered it _ in the protected database and that the CIA discovered the staff had it by monitoring its computers in violation of the user agreement.The inspector general’s summary, which was prepared for the Senate and the House intelligence committees, didn’t identify the CIA personnel who had accessed the Senate’s protected database.Furthermore, it said, the CIA crimes report to the Justice Department alleging that panel staffers had removed classified materials without permission was grounded on inaccurate information. The report is believed to have been sent by the CIA’s then acting general counsel, Robert Eatinger, who was a legal adviser to the interrogation program.“The factual basis for the referral was not supported, as the author of the referral had been provided inaccurate information on which the letter was based,” said the summary, noting that the Justice Department decided not to pursue the issue.
  • Christopher Anders, senior legislative counsel with the American Civil Liberties Union, criticized the CIA announcement, saying that “an apology isn’t enough.”“The Justice Department must refer the (CIA) inspector general’s report to a federal prosecutor for a full investigation into any crimes by CIA personnel or contractors,” said Anders.
  •  
    And no one but the lowest ranking staffer knew anything about it, not even the CIA lawyer who made the criminal referral to the Justice Dept., alleging that the Senate Intelligence Committee had accessed classified documents it wasn't authorized to access. So the Justice Dept. announces that there's insufficient evidence to warrant a criminal investigation. As though the CIA lawyer's allegations were not based on the unlawful surveillance of the Senate Intelligence Committee's network.  Can't we just get an official announcement that Attorney General Holder has decided that there shall be a cover-up? 
Paul Merrell

U.S. First Shields Its Torturers and War Criminals From Prosecution, Now Officially Hon... - 0 views

  • As vice president, Dick Cheney was a prime architect of the worldwide torture regime implemented by the U.S. government (which extended far beyond waterboarding), as well as the invasion and destruction of Iraq, which caused the deaths of at least 500,000 people and more likely over a million. As such, he is one of the planet’s most notorious war criminals. President Obama made the decision in early 2009 to block the Justice Department from criminally investigating and prosecuting Cheney and his fellow torturers, as well as to protect them from foreign investigations and even civil liability sought by torture victims. Obama did that notwithstanding a campaign decree that even top Bush officials are subject to the rule of law and, more importantly, notwithstanding a treaty signed in 1984 by Ronald Reagan requiring that all signatory states criminally prosecute their own torturers. Obama’s immunizing Bush-era torturers converted torture from a global taboo and decades-old crime into a reasonable, debatable policy question, which is why so many GOP candidates are now openly suggesting its use.
  • But now, the Obama administration has moved from legally protecting Bush-era war criminals to honoring and gushing over them in public. Yesterday, the House of Representatives unveiled a marble bust of former Vice President Cheney, which — until a person of conscience vandalizes or destroys it — will reside in Emancipation Hall of the U.S. Capitol. At the unveiling ceremony, Cheney was, in the playful words of NPR, “lightly roasted” — as though he’s some sort of grumpy though beloved avuncular stand-up comic. Along with George W. Bush, one of the speakers in attendance was Vice President Joe Biden, who spoke movingly of Cheney’s kind and generous soul
  • Yesterday, the U.S. government unambiguously signaled to the world that not only does it regard itself as entirely exempt from the laws of wars, the principal Nuremberg prohibition against aggressive invasions, and global prohibitions on torture (something that has been self-evident for many years), but believes that the official perpetrators should be honored and memorialized provided they engage in these crimes on behalf of the U.S. government. That’s a message that most of the U.S. media and thus large parts of the American population will not hear, but much of the world will hear it quite loudly and clearly. How could they not?
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

IG Horowitz Finds FBI, DOJ Broke Law In Clinton Probe, Refers To Prosecutor For Crimina... - 1 views

  • Now, journalist Paul Sperry reports that "IG Horowitz has found "reasonable grounds" for believing there has been a violation of federal criminal law in the FBI/DOJ's handling of the Clinton investigation/s and has referred his findings of potential criminal misconduct to Huber for possible criminal prosecution."
Paul Merrell

Malaysia Drops Criminal Charges Against Goldman After $3.9BN 1MDB Penalty | Zero Hedge - 0 views

  • After agreeing to pay a whopping $3.9 billion in fines and restitution, Goldman Sachs has finally been freed from one of its biggest albatrosses for its international business: Malaysian prosecutors have dropped all criminal charges in the 1MDB episode.
  • Reuters reports that, on Friday morning local time, Malaysian prosecutors announced that they would be withdrawing criminal charges against three Goldman Sachs units accused of misleading investors over a series of bond sales worth a combined $6.5 billion which helped fund the ill-fated sovereign wealth fund 1MDB (it stands for 1Malaysia Development Berhad). The Goldman subsidiaries based in London, Hong Kong and Singapore had pleaded not guilty to criminal charges back in February and the bank has consistently denied wrongdoing, though gallons of ink have been spilled about the alleged skulduggery that reportedly involved officials as senior as CEO Lloyd Blankfein. Now, the bank needs to settle things with the DoJ, which is also pursuing a criminal investigation. The DoJ estimates that $4.5 billion was siphoned from the fund by a group of insiders led by the fugitive financier Jho Low, the alleged mastermind, and former PM Najib Razak, who received hundreds of millions of dollars in proceeds from the fraud. Late last year, the bank was reportedly on the verge of a settlement with US authorities for roughly $2 billion, but those talks have reportedly fallen apart.
Paul Merrell

JPMorgan to pay record $920 million to resolve trading probes - 1 views

  • JPMorgan Chase is set to pay a record $920 million to resolve probes from three federal agencies over its role in the manipulation of global markets for metals and Treasurys.The figure was released Tuesday morning by the Commodity Futures Trading Commission in a statement from Commissioner Dan Berkovitz. Last week, news reports indicated that the New York-based bank was nearing a settlement of almost $1 billion.The penalty is a record for spoofing, which is when sophisticated traders flood markets with orders that they have no intention of actually executing. The practice was banned after the 2008 financial crisis and regulators have made it a priority to stamp out.Of the $920 million, $436.4 million is a criminal monetary penalty, $172 million is a “criminal disgorgement amount” and $311.7 million is for victim compensation, according to the Department of Justice.
  • JPMorgan Chase is set to pay a record $920 million to resolve probes from three federal agencies over its role in the manipulation of global markets for metals and Treasurys.The figure was released Tuesday morning by the Commodity Futures Trading Commission in a statement from Commissioner Dan Berkovitz. Last week, news reports indicated that the New York-based bank was nearing a settlement of almost $1 billion.The penalty is a record for spoofing, which is when sophisticated traders flood markets with orders that they have no intention of actually executing. The practice was banned after the 2008 financial crisis and regulators have made it a priority to stamp out.Of the $920 million, $436.4 million is a criminal monetary penalty, $172 million is a “criminal disgorgement amount” and $311.7 million is for victim compensation, according to the Department of Justice.
  • The bank, the biggest U.S. lender by assets, has entered into a deferred prosecution agreement with the DOJ that will expire in three years if the firm satisfies its obligations under the deal. 
  • ...4 more annotations...
  • In his statement, the CFTC’s Berkovitz said he opposed the ruling from his agency that JPMorgan’s actions “should not result in any disqualifications under the ‘bad actor’ provisions of the securities laws.” He is apparently referring to the fact that the settlement isn’t expected to result in business restrictions on other areas of the firm.
  • The bank also has quietly settled a long-running lawsuit that accused the bank of manipulating precious metals markets with “spoofing” trades. The lawsuit was filed in 2015 by Daniel Shak, the hedge fund operator and high-stakes poker player, and two metals traders, Mark Grumet and Thomas Wacker.The three plaintiffs had accused JPMorgan of manipulating the silver futures market from 2010 through 2011 through spoofing trades. Details of the settlement were not disclosed in court filings.
  • In September 2019, federal prosecutors charged Nowak and two other former JPMorgan precious metals traders, Gregg Smith and Christopher Jordan, with participating in a racketeering conspiracy in connection with a multiyear scheme to manipulate the markets and defraud customers, as well as other crimes related to alleged spoofing.A superseding indictment was filed in the criminal case two months later, adding another defendant, ex-JPMorgan executive Jeffrey Ruffo, who had worked in hedge fund sales on the firm’s precious metals desk.All four defendants have pleaded not guilty. Trial in that case is scheduled to begin next April in Chicago federal court.
  • The CFTC noted in their press release that the agency continues to pursue civil litigation against Nowak and  Smith, for spoofing and attempted price manipulation.Although Shak’s lawsuit has been settled, JPMorgan still faces a class action lawsuit related to alleged spoofing in the precious metals markets.
Paul Merrell

FBI Celebrates Duping Another Mentally Ill Man Into Fake Terror Plot - 0 views

  • Following a series of similar widely ridiculed so-called “sting” operations, the Federal Bureau of Investigation announced last week that it had foiled yet another “terror plot” that, like virtually every supposed “terrorist” case in recent years, was created and managed from start to finish by the FBI itself. This time, the dupe was a 28-year-old California man, Matthew Aaron Llaneza, with a documented history of mental illness, who apparently believed his government handlers were helping him wage “jihad.” Critics, however, say the whole scheme smacks of entrapment and a waste of taxpayer money. Llaneza was arrested by federal agents on February 7 in Oakland after he supposedly tried to blow up a bogus bomb the FBI helped him create. According to authorities, the mentally ill San Jose suspect planned to detonate the fake explosives outside a Bank of America branch. The alleged plan, officials said, was to start a “civil war” by making it appear as if the attack had been carried out by “anti-government militias,” sparking a crackdown by the government on right-of-center dissidents.       “Unbeknownst to Llaneza, the explosive device that he allegedly attempted to use had been rendered inoperable by law enforcement and posed no threat to the public,” the FBI admitted in a press release celebrating the arrest of its mentally unstable stooge. The man was charged in a criminal complaint with “attempted use of a weapon of mass destruction against property used in an activity that affects interstate or foreign commerce.” If convicted, he could face life in prison.
  • According to the government’s court filings, the mentally ill man met with an undercover FBI agent late last year under mysterious circumstances. The federal official somehow managed to convince the naïve dupe that he was connected to the “Taliban and the mujahidin in Afghanistan” — Islamist forces that were originally armed and trained by the U.S. government before becoming official enemies. From there, federal handlers worked with the man to develop the half-baked plot and the fake bomb to blow something up.  
  •  
    The trend continues. Still no Terrorist™ criminal charges brought against anyone by the FBI other than alleged 9/11 participants that the FBI did not incite to commit an act of Terrorism™; i.e., no real Terrorist™ threat resulting in criminal charges. Hard to justify continuation of all that funding the FBI gets for chasing domestic Terrorists™ if there aren't any, so the FBI continues to manufacture them in sting operations. Not to mention that the whole War on Terror™ government propaganda campaign would fall apart and the TSA would have to stop forcing air passengers to choose between being groped or viewed naked in those nifty body scanners. Heaven forbid that we might begin restoring civil rights and spending those trillions of dollars on the War on Terror™. No! No! We must maintain Cold War military spending as a percentage of GDP or we'd be flooded with unemployed military veterans and former government contractor workers. We only start wars to defend the U.S., not to enrich military contractors, seize natural resources from those that own or control them, enable the banksters to siphon more from a bigger bucket, or  expand the Globalist Empire. We are America! We are the good guys. Our motives for waging the War on Terror™ are entirely altruistic. Ditto for our professional politicians.   Not.     
Paul Merrell

5 Big Banks Expected to Plead Guilty to Felony Charges, but Punishments May Be Tempered... - 0 views

  • The Justice Department is preparing to announce that Barclays, JPMorgan Chase, Citigroup and the Royal Bank of Scotland will collectively pay several billion dollars and plead guilty to criminal antitrust violations for rigging the price of foreign currencies, according to people briefed on the matter who spoke on the condition of anonymity. Most if not all of the pleas are expected to come from the banks’ holding companies, the people said — a first for Wall Street giants that until now have had only subsidiaries or their biggest banking units plead guilty.
  • The Justice Department is also preparing to resolve accusations of foreign currency misconduct at UBS. As part of that deal, prosecutors are taking the rare step of tearing up a 2012 nonprosecution agreement with the bank over the manipulation of benchmark interest rates, the people said, citing the bank’s foreign currency misconduct as a violation of the earlier agreement. UBS A.G., the banking unit that signed the 2012 nonprosecution agreement, is expected to plead guilty to the earlier charges and pay a fine that could be as high as $500 million rather than go to trial, the people said.
  • Holding companies, while appearing to be the most important entities at the banks, are in less jeopardy of suffering the consequences of guilty pleas. Some banks worried that a guilty plea by their biggest banking units, which hold licenses that enable them to operate branches and make loans, would be riskier, two of the people briefed on the matter said. The fear, they said, centered on whether state or federal regulators might revoke those licenses in response to the pleas. Advertisement Continue reading the main story Behind the scenes in Washington, the banks’ lawyers are also seeking assurances from federal regulators — including the Securities and Exchange Commission and the Labor Department — that the banks will not be barred from certain business practices after the guilty pleas, the people said. While the S.E.C.’s five commissioners have not yet voted on the requests for waivers, which would allow the banks to conduct business as usual despite being felons, the people briefed on the matter expected a majority of commissioners to grant them.In reality, those accommodations render the plea deals, at least in part, an exercise in stagecraft. And while banks might prefer a deferred-prosecution agreement that suspends charges in exchange for fines and other concessions — or a nonprosecution deal like the one that UBS is on the verge of losing — the reputational blow of being a felon does not spell disaster.
  • ...6 more annotations...
  • The foreign exchange investigation, which centers on accusations that traders colluded to fix the price of major currencies, will test the Justice Department’s strategy for securing guilty pleas on Wall Street.
  • In the case of UBS, the bank will lose its nonprosecution agreement over interest rate manipulation, the people briefed on the matter said, a consequence of its misconduct in the foreign exchange case. It is unclear why that penalty will fall on UBS, but not on other banks suspected of manipulating both interest rates and currency prices.
  • the bank is expected to avoid pleading guilty in the foreign exchange case, the people said, though it will probably pay a fine. While UBS was unlikely to plead guilty to antitrust violations because it was the first to cooperate in the foreign exchange investigation, the bank was facing the possibility of pleading guilty to fraud charges related to the currency manipulation. The exact punishment is not yet final, the people added.The Justice Department negotiations coincide with the banks’ separate efforts to persuade the S.E.C. to issue waivers from automatic bans that occur when a company pleads guilty. If the waivers are not granted, a decision that the Justice Department does not control, the banks could face significant consequences.For example, some banks may be seeking waivers to a ban on overseeing mutual funds, one of the people said. They are also requesting waivers to ensure they do not lose their special status as “well-known seasoned issuers,” which allows them to fast-track securities offerings. For some of the banks, there is also a concern that they will lose their “safe harbor” status for making forward-looking statements in securities documents.
  • In turn, the S.E.C. asked the Justice Department to hold off on announcing the currency cases until the banks’ requests had been reviewed, one of the people said. As of Wednesday, it seemed probable that a majority of the S.E.C.’s commissioners would approve most of the waivers, which can be granted for a cause like the public good. Still, the agency’s two Democratic commissioners — Kara M. Stein and Luis A. Aguilar, who have denounced the S.E.C.’s use of waivers — might be more likely to balk.
  • Corporate prosecutions are a delicate matter, peppered with political and legal land mines. Senator Elizabeth Warren, Democrat of Massachusetts, and other liberal politicians have criticized prosecutors for treating Wall Street with kid gloves. Banks and their lawyers, however, complain about huge penalties and guilty pleas. Continue reading the main story Recent Comments AvangionQ 14 hours ago These are the sorts of crimes that take down nations, jail sentences should be mandatory. Lance Haley 14 hours ago I find this whole legal exercise not only irrational, but insulting. I am a criminal defense attorney. Punishing the shareholders and the... loomypop 14 hours ago There is much more than Irony in the reality of how America treats criminal action and punishment when the entire determination and outcome... See All Comments And lingering in the background is the case of Arthur Andersen, an accounting giant that imploded after being convicted in 2002 of criminal charges related to its work for Enron. After the firm’s collapse, and the later reversal of its conviction, prosecutors began to shift from indictments and guilty pleas to deferred-prosecution agreements. And in 2008, the Justice Department updated guidelines for prosecuting corporations, which have long included a requirement that prosecutors weigh collateral consequences like harm to shareholders and innocent employees.
  • “The collateral consequences consideration is designed to address the risk that a particular criminal charge might inflict disproportionate harm to shareholders, pension holders and employees who are not even alleged to be culpable or to have profited potentially from wrongdoing,” said Mark Filip, the Justice Department official who wrote the 2008 memo. “Arthur Andersen was ultimately never convicted of anything, but the mere act of indicting it destroyed one of the cornerstones of the Midwest’s economy.”
  •  
    In related news, the Dept. of Justice announced that it would begin using its "collateral consequences" analysis to decisions whether to charge human beings with crimes, taking into account the hardships imposed on innocent family members and other dependents if a person were sentenced to prison.  No? Sounds like corporations have more rights than human beings, yes?
Paul Merrell

Why Aren't Big Bankers in Jail? - FAIR: Fairness & Accuracy In Reporting - 0 views

  • The man in charge of a bank that engaged in massive mortgage fraud chatted with a corporate media host (CNBC Squawk on the Street, 7/12/13) about the fact that virtually none of those who enriched themselves while eviscerating the life savings of many blameless people, derailing the US economy along the way, have faced criminal prosecution
  • Granted, Cramer is no one's idea of a serious interrogator of the financial system (FAIR Blog, 3/13/09). But much journalism on the question of criminal prosecution of industry leaders amounts to similar apologia. While there have been substantive inquiries into the wrongdoing of investment banks and auditors, those calling for jail time are often dismissed as irrational, driven by "blood lust" (Washington Post, 9/12/13), "anger" (Chicago Tribune, 11/30/13) or "vengeance" (Washington Post, 11/18/13).
  • What the soft-headed among us don't recognize, evidently, is that "blowing up your company isn't necessarily a crime," as the Christian Science Monitor (10/11/11) put it. "America doesn't criminalize bad business decisions," wrote the Washington Post (9/12/13). Or, from Businessweek (5/12/11): "In the American legal system, people who merely act badly or unwisely do not do time." But some have no trouble pointing to actual crimes in the crisis. "Issuing a mortgage that is known to be based on false information and then selling it in the secondary market is fraud and punishable by time in jail," economist Dean Baker (Beat the Press, 9/13/13) noted, citing the Financial Crisis Inquiry Commission. "Packaging loans into mortgage backed securities that an investment bank has good reason to believe are based on false information is also fraud and punishable by time in jail." Former federal bailout inspector Neil Barofsky agrees we're not talking about a perhaps lamentable but inactionable "culture." Asked by NPR (7/26/13) about the no-actual-crime "narrative," Barofsky answered: "No. I think that there was a tremendous amount of fraud."
  • ...2 more annotations...
  • We're told such calls come from the margins: That no "financial industry types" have been jailed is "a recurring theme among Occupy Wall Street protesters and some Democratic politicians" (Christian Science Monitor, 10/11/11) or "the Occupy Wall Street crowd" (New York Times, 3/1/13). People who believe bankers should go to jail are deflecting blame—from the people: "The real scandal," explained the Washington Post's Charles Lane ("Banks Aren't the Bad Guys," 11/18/13), was "Americans' shared, erroneous belief in ever-rising housing prices and corresponding mania to profit from them." And maybe they need to move on: "This all happened a really long time ago. What-ever happened to the statute of limitations?" the Washington Post (11/19/13) asked itself in a recent Q&A.
  • Certainly the problem extends beyond the actions of a few bigwigs. But people who say jailing industry executives should be the sole response exist only in pundits' minds. William Black, who advocates prison for industry executives (Moyers & Company, 9/17/13), pointed to structural reasons for a lack of prosecutions, including regulatory agencies' abandonment of key functions since the 1980s' Savings & Loan scandal. "When the regulators ceased making criminal referrals—which had nothing to with an end of crime, obviously; it just had to do with a refusal to be involved in the prosecutorial effort anymore—they doomed us to a disaster where we would not succeed." Others say revolving-door relationships between banks and their government watchdogs contribute to settlements that are too generous to serve as deterrents (LittleSis, 10/23/13). Even the historic $13 billion JP Morgan settlement winds up being less than meets the eye, as much of the fine is tax-deductible, $4 billion of it is part of an earlier settlement and much of the rest will take the form of mortgage relief that will help the bank in the long run (Salon, 11/20/13).
  •  
    Fairness & Accuracy in Reporting weighs in on mainstream media's reluctance to call for banksters to be issued horizontal striped suits, noting that the excuses used ignore that there are real victims and that real crimes were comitted. 
Paul Merrell

Prosecute Torturers and Their Bosses - NYTimes.com - 0 views

  • The American Civil Liberties Union and Human Rights Watch are to give Attorney General Eric Holder Jr. a letter Monday calling for appointment of a special prosecutor to investigate what appears increasingly to be “a vast criminal conspiracy, under color of law, to commit torture and other serious crimes.”
  • The question everyone will want answered, of course, is: Who should be held accountable? That will depend on what an investigation finds, and as hard as it is to imagine Mr. Obama having the political courage to order a new investigation, it is harder to imagine a criminal probe of the actions of a former president. Continue reading the main story Write A Comment But any credible investigation should include former Vice President Dick Cheney; Mr. Cheney’s chief of staff, David Addington; the former C.I.A. director George Tenet; and John Yoo and Jay Bybee, the Office of Legal Counsel lawyers who drafted what became known as the torture memos. There are many more names that could be considered, including Jose Rodriguez Jr., the C.I.A. official who ordered the destruction of the videotapes; the psychologists who devised the torture regimen; and the C.I.A. employees who carried out that regimen.
  •  
    New York Times calls editorially for criminal prosecutions of all involved in the CIA's torture program.
Paul Merrell

Hague court under western pressure not to open Gaza war crimes inquiry | Law | The Guar... - 0 views

  • The international criminal court has persistently avoided opening an investigation into alleged war crimes in Gaza as a result of US and other western pressure, former court officials and lawyers claim.In recent days, a potential ICC investigation into the actions of both the Israel Defence Forces and Hamas in Gaza has become a fraught political battlefield and a key negotiating issue at ceasefire talks in Cairo. But the question of whether the ICC could or should mount an investigation has also divided the Hague-based court itself.
  • An ICC investigation could have a far-reaching impact. It would not just examine alleged war crimes by the Israeli military, Hamas and other Islamist militants in the course of recent fighting in Gaza that left about 2,000 people dead, including women and children. It could also address the issue of Israeli settlements in the Palestinian territories, for which the Israeli leadership would be responsible.
  •  
    Pressuring a court is a good way for a lawyer to be disbarred in the U.S. But pressuring the International Criminal Court, of which neither the U.S. nor Israel are members, well that's just good clean fun. 
‹ Previous 21 - 40 of 620 Next › Last »
Showing 20 items per page