Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged deleted

Rss Feed Group items tagged

Paul Merrell

CIA watchdog 'accidentally destroyed' copy of 'torture report' | TheHill - 0 views

  • The CIA’s inspector general has accidentally deleted its only copy of a controversial Senate report about the agency’s history of brutal interrogation techniques, opening a new front in the long battle over the document.Like many federal agencies across Washington, the spy agency watchdog was handed a copy of the Senate Intelligence Committee’s full, 6,700-page report about the CIA’s former methods shortly after it was completed. The full version of the report remains classified, however a 500-page executive summary was released to the public in late 2014.ADVERTISEMENTBut at some point last summer, both the electronic copy and a hard disk were destroyed, the watchdog told Congress.Sen. Dianne FeinsteinDianne FeinsteinCIA watchdog ‘accidentally destroyed’ copy of ‘torture report’ Overnight Energy: Senate rejects Iran measure, clearing way for energy spending bill Senate votes down Iran amendment to energy spending bill MORE (D-Calif.), the driving force behind the 2014 report, sent letters to the CIA and Justice Department on Friday confirming that the spy agency’s inspector general “has misplaced and/or accidentally destroyed” its copy of the report.According to Yahoo News, which first reported the development, the deletion was described as “inadvertent.”
  •  
    Yes, it's just too easy to delete uncomfortable facts. Now if they'd just start making keyboards without a delete key ...
Paul Merrell

Disclosing Classified Info to the Press - With Permission | - 0 views

  • Intelligence officials disclosed classified information to members of the press on at least three occasions in 2013, according to a National Security Agency report to Congress that was released last week under the Freedom of Information Act. See Congressional Notification — Authorized Disclosures of Classified Information to Media Personnel, NSA memorandum to the staff director, House Permanent Select Committee on Intelligence, December 13, 2013. The specific information that NSA gave to the unnamed reporters was not declassified. But the disclosures were not “leaks,” or unauthorized disclosures. They were, instead, authorized disclosures. For their part, the reporters agreed not to disseminate the information further. “Noteworthy among the classified topics disclosed were NSA’s use of metadata to locate terrorists, the techniques we use and the processes we follow to assist in locating hostages, [several words deleted] overseas support to the warfighter and U.S. allies in war zones, and NSA support to overall USG efforts to mitigate cyber threats. The [deleted] personnel executed non-disclosure agreements that covered all classified discussions.” In one case, “classified information was disclosed in order to correct inaccurate understandings held by the reporter about the nature and circumstances of [deleted].” On another occasion, “classified information was disclosed in an effort to limit or avoid reporting that could lead to the loss of the capability [deleted].”
  • In all three cases, “the decision to disclose classified information was made in consultation with the Director of National Intelligence pursuant to Executive Order 13526, and in each case the information disclosed remains properly classified.” This seems like a generous interpretation of the Executive Order, which does not mention disclosures to the press at all. It does say, in section 4.2(b) that “In an emergency, when necessary to respond to an imminent threat to life or in defense of the homeland, the agency head or any designee may authorize the disclosure of classified information […] to an individual or individuals who are otherwise not eligible for access.” In an emergency, then, but not just “to correct inaccurate understandings.” Still, the report accurately reflects the true instrumental nature of the classification system. That is, the protection of classified information under all circumstances is not a paramount goal. National security secrecy is a tool to be used if it advances the national interest (and is consistent with law and policy) and to be set aside when it does not. So hypocrisy in the handling of classified information is not an issue here. The concern, rather, is that the power of selective disclosure of classified material can be easily abused to manage and to manipulate public perceptions. The congressional requirement to report on authorized disclosures of classified information to the press may help to mitigate that danger.
  •  
    This would set up an interesting Freedom of Information Act case aimed at resolving the issue whether the "authorized" disclosures established a waiver of the FOIA exemption for national security information. A waiver, viewed most simplistically, is any conduct that is inconsistent with later assertion of a right. Deliberate disclosure to anyone who lacks a national security clearance would seem to be inconsistent with later assertion of the exemption. That the purpose of the disclosures was to adjust the attitudes of press members seems a very poor justification in that it establishes particular reporters as a class of persons entitled to more disclosure than other members of the public. Yet the Supreme Court has held time and again that journalists have no more right to access government information than any other member of the public. So there is a strong argument that everyone should be entitled to the same disclosures.
Paul Merrell

In Hearing on Internet Surveillance, Nobody Knows How Many Americans Impacted in Data C... - 0 views

  • The Senate Judiciary Committee held an open hearing today on the FISA Amendments Act, the law that ostensibly authorizes the digital surveillance of hundreds of millions of people both in the United States and around the world. Section 702 of the law, scheduled to expire next year, is designed to allow U.S. intelligence services to collect signals intelligence on foreign targets related to our national security interests. However—thanks to the leaks of many whistleblowers including Edward Snowden, the work of investigative journalists, and statements by public officials—we now know that the FISA Amendments Act has been used to sweep up data on hundreds of millions of people who have no connection to a terrorist investigation, including countless Americans. What do we mean by “countless”? As became increasingly clear in the hearing today, the exact number of Americans impacted by this surveillance is unknown. Senator Franken asked the panel of witnesses, “Is it possible for the government to provide an exact count of how many United States persons have been swept up in Section 702 surveillance? And if not the exact count, then what about an estimate?”
  • Elizabeth Goitein, the Brennan Center director whose articulate and thought-provoking testimony was the highlight of the hearing, noted that at this time an exact number would be difficult to provide. However, she asserted that an estimate should be possible for most if not all of the government’s surveillance programs. None of the other panel participants—which included David Medine and Rachel Brand of the Privacy and Civil Liberties Oversight Board as well as Matthew Olsen of IronNet Cybersecurity and attorney Kenneth Wainstein—offered an estimate. Today’s hearing reaffirmed that it is not only the American people who are left in the dark about how many people or accounts are impacted by the NSA’s dragnet surveillance of the Internet. Even vital oversight committees in Congress like the Senate Judiciary Committee are left to speculate about just how far-reaching this surveillance is. It's part of the reason why we urged the House Judiciary Committee to demand that the Intelligence Community provide the public with a number. 
  • The lack of information makes rigorous oversight of the programs all but impossible. As Senator Franken put it in the hearing today, “When the public lacks even a rough sense of the scope of the government’s surveillance program, they have no way of knowing if the government is striking the right balance, whether we are safeguarding our national security without trampling on our citizens’ fundamental privacy rights. But the public can’t know if we succeed in striking that balance if they don’t even have the most basic information about our major surveillance programs."  Senator Patrick Leahy also questioned the panel about the “minimization procedures” associated with this type of surveillance, the privacy safeguard that is intended to ensure that irrelevant data and data on American citizens is swiftly deleted. Senator Leahy asked the panel: “Do you believe the current minimization procedures ensure that data about innocent Americans is deleted? Is that enough?”  David Medine, who recently announced his pending retirement from the Privacy and Civil Liberties Oversight Board, answered unequivocally:
  • ...2 more annotations...
  • Senator Leahy, they don’t. The minimization procedures call for the deletion of innocent Americans’ information upon discovery to determine whether it has any foreign intelligence value. But what the board’s report found is that in fact information is never deleted. It sits in the databases for 5 years, or sometimes longer. And so the minimization doesn’t really address the privacy concerns of incidentally collected communications—again, where there’s been no warrant at all in the process… In the United States, we simply can’t read people’s emails and listen to their phone calls without court approval, and the same should be true when the government shifts its attention to Americans under this program. One of the most startling exchanges from the hearing today came toward the end of the session, when Senator Dianne Feinstein—who also sits on the Intelligence Committee—seemed taken aback by Ms. Goitein’s mention of “backdoor searches.” 
  • Feinstein: Wow, wow. What do you call it? What’s a backdoor search? Goitein: Backdoor search is when the FBI or any other agency targets a U.S. person for a search of data that was collected under Section 702, which is supposed to be targeted against foreigners overseas. Feinstein: Regardless of the minimization that was properly carried out. Goitein: Well the data is searched in its unminimized form. So the FBI gets raw data, the NSA, the CIA get raw data. And they search that raw data using U.S. person identifiers. That’s what I’m referring to as backdoor searches. It’s deeply concerning that any member of Congress, much less a member of the Senate Judiciary Committee and the Senate Intelligence Committee, might not be aware of the problem surrounding backdoor searches. In April 2014, the Director of National Intelligence acknowledged the searches of this data, which Senators Ron Wyden and Mark Udall termed “the ‘back-door search’ loophole in section 702.” The public was so incensed that the House of Representatives passed an amendment to that year's defense appropriations bill effectively banning the warrantless backdoor searches. Nonetheless, in the hearing today it seemed like Senator Feinstein might not recognize or appreciate the serious implications of allowing U.S. law enforcement agencies to query the raw data collected through these Internet surveillance programs. Hopefully today’s testimony helped convince the Senator that there is more to this topic than what she’s hearing in jargon-filled classified security briefings.
  •  
    The 4th Amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and *particularly describing the place to be searched, and the* persons or *things to be seized."* So much for the particularized description of the place to be searched and the thngs to be seized.  Fah! Who needs a Constitution, anyway .... 
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

M of A - The "Salafist Principality" - ISIS Paid Off To Leave Mosul, Take Deir Ezzor? - 0 views

  • On September 20 I wrote about the likely reason for the willful U.S. bombing attack on a critical Syrian army position in Deir Ezzor: Two recent attacks against the Syrian Arab Army in east-Syria point to a U.S. plan to eliminate all Syrian government presence east of Palmyra. This would enable the U.S. and its allies to create a "Sunni entity" in east-Syria and west-Iraq which would be a permanent thorn in side of Syria and its allies. ... The U.S. plan is to eventually take Raqqa by using Turkish or Kurdish proxies. It also plans to let the Iraqi army retake Mosul in Iraq. The only major city in Islamic State territory left between those two is Deir Ezzor. Should IS be able to take it away from the isolated Syrian army garrison it has at least a decent base to survive. (Conveniently there are also rich oil wells nearby.) No one, but the hampered Syrian state, would have an immediate interest to remove it from there. There are new signs that this analysis was correct.
  • Yesterday the Turkish President Erdogan made a remark that points into that direction. As the British journalist Elijah Magnier summarized it: Elijah J. Magnier @EjmAlrai Erdogan: #Turkey will participate in #Mosul just like it did in #Jarablus.Army doesn't take orders from #Iraq PM who should know his limits. 4:06 AM - 11 Oct 2016 "Like Jarablus" was an interesting comparison. The Turks and their proxies took Jarablus in center-north Syria from the Islamic State without any fight and without any casualties from fighting. ISIS had moved away from the city before the Turks walked in. There obviously had been a deal made. That's why I replied this to Magnier's tweet above: Moon of Alabama @MoonofA The Turks will pay off ISIS in Mosul to leave early just like they did in Jarablus? 5:58 AM - 12 Oct 2016
  • Three hours later this rumor from a well connected Syrian historian and journalist in London answered that question: Nizar Nayouf @nizarnayouf Breaking news:Sources in #London say:“#US& #Saudi_Arabia concluded an agreement to let #ISIS leave #Mosul secretly& safely to #Syria"! 9:28 AM - 12 Oct 2016 Erdogan predicts that his troops and proxy forces will march into Mosul just like they marched into Jarablus: In a peaceful walk, without any fight, into a city free of Jihadis. The Saudis and the U.S. arranged for that. The U.S. bombed the most important SAA position in Deir Ezzor so that ISIS, now with the help of its cadres from Mosul, can take over the city. A nice place to keep it holed up in east-Syria until it can further be used in this or that imperial enterprise.
  • ...4 more annotations...
  • A good plan when your overall aim is to create an obedient mercenary statelet in the center of the Middle East. As the U.S. Defense Intelligence Agency wrote in 2012: THERE IS THE POSSIBILITY OF ESTABLISHING A DECLARED OR UNDECLARED SALAFIST PRINCIPALITY IN EASTERN SYRIA (HASAKA AND DER ZOR), AND THIS IS EXACTLY WHAT THE SUPPORTING POWERS TO THE OPPOSITION WANT, IN ORDER TO ISOLATE THE SYRIAN REGIME. But this plan requires to fight the Syrian and Russian air-forces which will do their utmost to defend the SAA group and the 100-200,000 ISIS besieged Syrian civilians in Deir Ezzor. The the U.S. and its allies may be willing to do that. A well known British Tory member of parliament already made noise that British fighter jets should be free to shoot down Russian planes in Syria. The U.S. had claimed that British planes took part in the Deir Ezzor ambush. The defenders of Deir Ezzor lack their own air defenses. The Russian systems at the Syrian west-coast can not reach that far east. The Syrian system are mostly positioned to defend Damascus and other cities from attacks by Israel. Russia recently talked about delivering 10 new Pantsyr-S1 short-to-medium range air defense systems to Syria. At least two of those should be airlifted to Deir Ezzor as soon as possible.
  • UPDATE: I was just made aware of a recent speech by Hizbullah leader Nasrallah who smells the same stinking plot: Sayyed Nasrallah said that the Americans intend to repeat Fallujah plot when they opened a way for ISIL to escape towards eastern Syria before the Iraqi warplanes targeted the terrorists’ convoy, warning that the same deceptive scheme is possible to be carried out in Mosul.
  • All the .mil conspiracy theory folks (me) knew why those ships were sent into the straits. The only thing we couldn't figure out was what kind of false flag the U.S. would use to Tomahawk Yemen because nobody would believe the Houthis would be dumb enough to fire on a U.S. missile cruiser. They hate the U.S., but have no reason to rattle our cage THAT much. They fired on the UAE-contracted Swift because it was bringing armor and weapons to Saudi puppet Hadi's forces in Yemen. Attacking a U.S. missile destroyer accomplishes absolutely nothing for them. When the Houthis heard the USS Mason and Nitze were attacked, they thought it was a joke. They denied any such attack as preposterous, asking the obvious question: "Why the hell would we ever do that? But it gets a little better for us in tinfoil hat land. This post by someone looking for images of deleted Tweets sums it up nicely: https://twitter.com/teddy_cat1/status/786333929309556736 Few hours before Reuter's announcement of a U.S. Navy destroyer came under missile attack off Yemen on Sunday, Saudi official accounts on tweeter like Journalist Fahd Kamely and Saudi-24 News had tweeted that the Royal Saudi Naval Forces targeted what they thought to be an Iranian ship for suspicion of supplying Houthis with weapons! They immediately deleted their tweets following this announcement, but many people have saved a picture for those tweets before being deleted and since then are circulating them on tweeter...
  • So we know the U.S. Navy lied when they said the missiles came from Yemen. The RSNF most likely did launch the missiles and used the 'Iranian arms smuggling' as a cover story in case anyone noticed. The U.S. destroyers were never targeted or in danger, but probably did use the occasion to test their anti-missile defenses. All this set up the false flag, providing Obama and excuse to order the U.S. Navy to Tomahawk the Yemeni coastal radars at the behest of some pissed-off UAE emir (likely a Clinton Foundation donor).
  •  
    There are other signs that the U.S. made this slimy deal with the Saudis and that it is being implemented. I'll post other links. And I've seen other confirmation that the UK has authorized its pilots to down Russian aiircraft. Meanwhile, Turkey's Erdogan has commanded that Mosul is to become a Sunni Arab city and has forbidden Shi'ite Militia form participating in the "battle" for Mosul. Today, MSM is full of news about the launch of the Iraqi attack on Mosul. But no mention of the deal to allow ISIL to escape into Syria, of course. Make no mistake: this is the U.S. launching ISIL against Russia, Syria, Iran, and Hezbollah in Syria. With the added bonus of being able to claim that this time, they trained the Iraqi Army correctly, as it walks into Mosul against only token resistance. Smoke and mirrors. This is U.S. war against Russia.
Paul Merrell

Deleted BBC Report. "Ukrainian Fighter Jet Shot Down MHI7″, Donetsk Eyewitnes... - 0 views

  • The original BBC Video Report was published by BBC Russian Service on July 23, 2014. In a bitter irony, The BBC is censoring its own news productions.  Why did BBC delete this report by Olga Ivshina? Is it because the BBC team was unable to find any evidence that a rocket was launched in the area that the Ukrainian Security Service (“SBU”) alleges to be the place from which the Novorossiya Militia launched a “BUK” missile? Or is it because every eyewitness interviewed by the BBC team specifically indicated the presence of a Ukrainian military aircraft right beside the Malaysian Airlines Boeing MH17 at the time that it was shot down?
  • Or is it because of eyewitness accounts confirming that the Ukrainian air force regularly used civilian aircraft flying over Novorossiya as human shields to protect its military aircraft conducting strikes against the civilian population from the Militia’s anti-aircraft units?
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Paul Merrell

Dropbox: Condoleeza Rice appointment won't alter privacy pledge - CNET - 0 views

  •  
    The straw that broke this camel's back. On top of having an absolutely horrible security model, Dropbox elects Condi Rice to its board of directors. I just completed transfer of my files to another service (in the E.U. where U.S. court orders don't reach) and deleted my Dropbox account.  
Paul Merrell

Gowdy wants Clinton to answer 'all questions' on Benghazi - Jennifer Shutt - POLITICO - 0 views

  • The chairman of the House Benghazi Committee said on Sunday former Secretary of State Hillary Clinton’s scheduled Oct. 22 committee testimony on the 2012 terrorist attack in Libya will take as long as necessary for all of the committee’s questions to be answered. “If she is going to insist on only coming once, I’m going to insist that all questions are asked and answered, so she’s going to be there for a while,” Rep. Trey Gowdy (R-S.C.) said on “Fox News Sunday.” Story Continued Below The questions, he said, will include why Clinton set up a private email account to use at the State Department and why some classified documents were on her private server. “I don’t have any yoga emails, but the greater steps you take to delete something or clean something — that is a higher level of concealment,” Gowdy said, referring to comments that Clinton deleted private emails related to yoga classes and her daughter Chelsea’s wedding.
  • Gowdy insisted the committee’s investigation is to determine how four Americans died at the U.S. diplomatic compound in Libya and is not politically motivated. “We are trying to run this in the way serious investigations are run,” he said. “We are going to follow the facts wherever they go — and if that impacts people’s perception of her fitness to be commander and chief, so be it.”
  •  
    But will she plead the 5th Amendment? And will the Committee even attempt to learn and disclose what the State Dept. and CIA were up to in Libya when the attack occurred? Don't hold your breath for that one. This hearing is about bruising Hillary's prospects in Auction 2016, not about exposing the CIA ratline of weapons shipments from Libya to "jihadi" mercenaries in Syria.  Fun and games on Capitol Hill. 
Gary Edwards

Our Economic Future: From Best to Worst Case - Casey Research - 0 views

  •  
    This article was sent to me marked URGENT: MUST READ.  Usually that's a hint to delete.  This time however the message was true.  Nicely written article presenting in a historical context three possible futures for the world.   And, a basic plan for anyone trying to guess which future will land on our heads.  Excellent read.  Well written too. excerpt: There is a great deal of uncertainty among investors about what the future of the U.S. economy may look like - so I decided to take a stab at what's likely to happen over the next 20 years. That's enough time for a child to grow up and mature, and it's long enough for major trends to develop and make themselves felt. I'll confine myself to areas that are, as the benighted Rumsfeld might have observed, "known unknowns." I don't want to deal with possibilities of the deus ex machina sort. So we'll rule out natural events like a super-volcano eruption, an asteroid strike, a new ice age, global warming, and the like. Although all these things absolutely will occur sometime in the future, the timing is very uncertain - at least from the perspective of one human lifespan. It's pointless dealing with geological time and astronomical probability here. And, more important, there's absolutely nothing we can do about such things. So let's limit ourselves to the possibilities presented by human action. They're plenty weird and scary, and unpredictable enough.............
Paul Merrell

West touting 'classified' evidence to avoid impartial MH17 investigation | nsnbc intern... - 0 views

  • Though Ukraine, the United States, and other countries have accused Russia of supplying the rebels with surface-to-air missiles and orchestrating the shoot-down of MH17, none of those governments have made their evidence publically available. Germany’s intelligence agency has not shared its evidence with the official investigation team, while the United States has similarly refused to declassify its intelligence, refusing even to discuss the sources and methodology behind its findings. No conclusive evidence has been made public to prove that rebels militias possess missile systems capable of bringing down a commercial airliner, or that Russia supplied this technology to rebel fighters. The satellite images and military data made public by Moscow, which suggest a completely different series of events, have been entirely absent from the media’s narrative. The ongoing investigation can only be considered impartial if the findings of all parties are fairly considered. At this stage, that is not happening.
  • Dutch investigators have wholly omitted findings from radar data submitted by Moscow that purportedly showed a Ukrainian Su-25 fighter jet flying in close proximity to MH17 prior to it disappearing from radar. DSB’s findings also fail to distinguish whether the port or starboard sides of the aircraft were struck by foreign objects – or both. This information is highly important because, as experts have claimed, a surface-fired missile alone could not have created entry points on both the port and starboard sides of the aircraft. The blast fragmentation patterns on the wreckage that has been photographed shows two distinct shapes: pronounced flechette-like shredding and cleaner circular pockmarks. Michael Bociurkiw, a Canadian monitor from the Organization for Security and Cooperation in Europe (OSCE) and one of the first observers to arrive at the crash site, described the marks as being consistent with “very, very strong machine gun fire.”
  • BBC’s Russian language service broadcasted – then swiftly deleted, under dubious pretenses – a report produced by its correspondent that interviewed several local eyewitnesses who claimed to see a military aircraft in the sky flying in the vicinity of MH17 as it exploded and broke apart. The investigation has a responsibility to address the question of the Ukrainian fighter jet and its possible role in the incident.
Paul Merrell

The Missing Pages of the 9/11 Report - The Daily Beast - 0 views

  • The lead author of the Senate’s report on 9/11 says it’s time to reveal what’s in the 28 pages that were redacted from it, which he says will embarrass the Saudis.A story that might otherwise have slipped away in a morass of conspiracy theories gained new life Wednesday when former Sen. Bob Graham headlined a press conference on Capitol Hill to press for the release of 28 pages redacted from a Senate report on the 9/11 attacks. And according to Graham, the lead author of the report, the pages “point a very strong finger at Saudi Arabia as the principal financier” of the 9/11 hijackers.
  • “This may seem stale to some but it’s as current as the headlines we see today,” Graham said, referring to the terrorist attack on a satirical newspaper in Paris. The pages are being kept under wraps out of concern their disclosure would hurt U.S. national security. But as chairman of the Senate Select Committee that issued the report in 2002, Graham argues the opposite is true, and that the real “threat to national security is non-disclosure.” Graham said the redacted pages characterize the support network that allowed the 9/11 attacks to occur, and if that network goes unchallenged, it will only flourish. He said that keeping the pages classified is part of “a general pattern of coverup” that for 12 years has kept the American people in the dark. It is “highly improbable” the 19 hijackers acted alone, he said, yet the U.S. government’s position is “to protect the government most responsible for that network of support.”   The Saudis know what they did, Graham continued, and the U.S. knows what they did, and when the U.S. government takes a position of passivity, or actively shuts down inquiry, that sends a message to the Saudis. “They have continued, maybe accelerated their support for the most extreme form of Islam,” he said, arguing that both al Qaeda and ISIS are “a creation of Saudi Arabia.”
  • It all signals that the decades-long bipartisan policy of always keeping the Saudis happy, and never rocking the boat, may be coming to an end. In Sarasota, Florida, a federal judge is reviewing 80,000 pages of documents that relate to a prominent Saudi family and its extensive contacts with three of the hijackers when they attended flight school in Sarasota.
  • ...1 more annotation...
  • When the 800-page Senate report was made public in 2002, Graham recalled that he and Republican Sen. Richard Shelby were “shocked to see an important chapter in the report has been redacted.” All but three Senate Democrats, joined by one Republican and one independent, signed a letter calling on President Bush to declassify the 28-page section detailing the role of foreign governments in bankrolling the 9/11 attackers. “Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters,” the redacted portion, begins midway through the report, on page 395. Despite the title, then-CIA Director Porter Goss and the co-chairs of the 9/11 Commission all called for it to be declassified, yet it has stayed secret for a dozen years, fueling conspiracy theories that Graham says can only be put to rest by its release.   
  •  
    Graham went farther than before, now saying that the deleted section is about Saudi Arabia's involvement in the 9-11 attack. But is this all to reinforce the narrative of 19 Islamic hijackers -- none of whom had the necessary pilot skills, flying airliners into targets on 9-11? Why no investigation of Israeli and U.S. government participation in the attack?  
Paul Merrell

Verizon Will Now Let Users Kill Previously Indestructible Tracking Code - ProPublica - 0 views

  • Verizon says it will soon offer customers a way to opt out from having their smartphone and tablet browsing tracked via a hidden un-killable tracking identifier. The decision came after a ProPublica article revealed that an online advertiser, Turn, was exploiting the Verizon identifier to respawn tracking cookies that users had deleted. Two days after the article appeared, Turn said it would suspend the practice of creating so-called "zombie cookies" that couldn't be deleted. But Verizon couldn't assure users that other companies might not also exploit the number - which was transmitted automatically to any website or app a user visited from a Verizon-enabled device - to build dossiers about people's behavior on their mobile devices. Verizon subsequently updated its website to note Turn's decision and declared that it would "work with other partners to ensure that their use of [the undeletable tracking number] is consistent with the purposes we intended." Previously, its website had stated: "It is unlikely that sites and ad entities will attempt to build customer profiles.
  • However, policing the hundreds of companies in the online tracking business was likely to be a difficult task for Verizon. And so, on Monday, Verizon followed in the footsteps of AT&T, which had already declared in November that it would stop inserting the hidden undeletable number in its users' Web traffic. In a statement emailed to reporters on Friday, Verizon said, "We have begun working to expand the opt-out to include the identifier referred to as the UIDH, and expect that to be available soon." Previously, users who opted out from Verizon's program were told that information about their demographics and Web browsing behavior would no longer be shared with advertisers, but that the tracking number would still be attached to their traffic. For more coverage, read ProPublica's previous reporting on Verizon's indestructible tracking and how one company used the tool to create zombie cookies.
  •  
    Good for Pro Publica!
Paul Merrell

Ex-Chief of C.I.A. Shapes Response to Detention Report - NYTimes.com - 0 views

  • Just after the Senate Intelligence Committee voted in April to declassify hundreds of pages of a withering report on the Central Intelligence Agency’s detention and interrogation program, C.I.A. Director John O. Brennan convened a meeting of the men who had played a role overseeing the program in its seven-year history.The spies, past and present, faced each other around the long wooden conference table on the seventh floor of the C.I.A.’s headquarters in Northern Virginia: J. Cofer Black, head of the agency’s counterterrorism center at the time of the Sept. 11 attacks; the undercover officer who now holds that job; and a number of other former officials from the C.I.A.’s clandestine service. Over the speakerphone came the distinctive, Queens-accented voice of George J. Tenet.
  • Ms. Feinstein agreed to let a group of former senior C.I.A. officials read a draft of the report, although she initially insisted they be allowed to review it only at the committee’s office. Officials said President Obama’s chief of staff, Denis McDonough, intervened and brokered an arrangement in which the officials could read an unredacted version of the report inside a secure room at the office of the Director of National Intelligence. Ms. Feinstein declined to comment.
  • Mr. Tenet, who declined to be interviewed for this article, has arranged a number of conference calls with former C.I.A. officials to discuss the impending report. After private conversations with Mr. Brennan, he and two other former C.I.A. directors — Porter J. Goss and Michael V. Hayden — drafted a letter to Mr. Brennan asking that, as a matter of fairness, they be allowed to see the report before it was made public. Describing the letter, one former C.I.A. officer who spoke on condition of anonymity said that the former directors “think that those people who were heavily involved in the operations have a right to see what’s being said about them.”Mr. Brennan then passed the letter to Senator Dianne Feinstein, the California Democrat who is chairwoman of the Senate Intelligence Committee.
  • ...4 more annotations...
  • Over the past several months, Mr. Tenet has quietly engineered a counterattack against the Senate committee’s voluminous report, which could become public next month. The effort to discredit the report has set up a three-way showdown among former C.I.A. officials who believe history has been distorted, a White House carefully managing the process and politics of declassifying the document, and Senate Democrats convinced that the Obama administration is trying to protect the C.I.A. at all costs.The report is expected to accuse a number of former C.I.A. officials of misleading Congress and the White House about the program and its effectiveness, but it is Mr. Tenet who might have the most at stake.
  • “While former C.I.A. officials may be working to hide their own past wrongs, there’s no reason Brennan or any other current C.I.A. official should help facilitate the defense of the indefensible,” said Christopher Anders, senior legislative counsel at the American Civil Liberties Union.Spokesmen for the C.I.A. and the White House declined to comment.
  • The April meeting at C.I.A. headquarters highlighted how much of the agency is still seeded with officers who participated in the detention and interrogation program, which Mr. Obama officially ended during his first week in office in 2009.At one point during the meeting, the current head of the counterterrorism center, an officer with the first name Mike, told Mr. Brennan that roughly 200 people under his leadership had at some point participated in the interrogation program. They wanted to know, he said, how Mr. Brennan planned to defend them in public against accusations that the C.I.A. engaged in systematic torture and lied about its efficacy.
  • Mr. Tenet resigned a decade ago amid the wash of recriminations over the C.I.A.’s botched Iraq assessments, and he has given few interviews since his book tour.
  •  
    Major Obama scandal brewing here. The current head of the CIA, John Brennan, has been caught conspiring with former CIA heads and others to counter the Senate Intelligence Committee's pending report on CIA torture and extraordinary rendition, even as Brennan works to delay the report summary's publication by censoring it, resulting in delay while the Committee argues with the CIA over the deletions. All of which sharply contrasts with Obama's publicly expressed desire to have the report published promptly.    The article also makes a very strong case that those CIA officials who participated in the torture and rendition program have been enabled, on Obama's watch, to act as the censors of the Senate Report.  A must-read
Paul Merrell

NARA Backs Away from CIA Email Destruction Proposal - 0 views

  • The National Archives and Records Administration told the Central Intelligence Agency last week that it was withholding approval of a CIA proposal to allow the destruction of the email records of all but 22 senior Agency officials. “NARA intends to reassess the Central Intelligence Agency (CIA) proposal for the disposition of non-senior email accounts,” wrote Paul M. Wester, Jr., Chief Records Officer at NARA in a November 20 letter to Joseph Lambert, Director of Information Management Services at CIA. “Based on comments from Members of the U.S. Senate Select Committee on Intelligence and a number of public interest groups, we are concerned about the scope of the proposed schedule and the proposed retention periods,” Mr. Wester wrote. Based on a preliminary review of the CIA proposal, NARA had initially recommended approval of the plan, Secrecy News reported last month. (“CIA Asks to Destroy Email of Non-Senior Officials,” October 1.)
  • But critical comments that were submitted to NARA — from the Federation of American Scientists, Openthegovernment.org and other public interest groups and individuals, the Department of Defense Chief Defense Counsel, and especially from Senators Feinstein and Chambliss, the leaders of the Senate Intelligence Committee, and Senators Wyden, Udall and Heinrich, Members of the Committee — turned the tide and blocked the proposal in its current form. “We will hold a public meeting on this schedule in the coming months to address the comments raise by you and others and to share how NARA is moving forward,” wrote Margaret Hawkins of NARA Records Management Services in an email message today. “This meeting will be announced in the Federal Register and will be open to all commenters and the public.” For related coverage, see: “The CIA Wants To Delete Old Email; Critics Say ‘Not So Fast'” by David Welna, NPR All Things Considered, November 20; “Top Senators Oppose CIA Move to Destroy Email” by Siobhan Gorman, Wall Street Journal, November 19; “National Archives: Ok, So Maybe Letting The CIA Destroy Emails Wasn’t A Great Idea” by Ali Watkins, Huffington Post, November 21; and “Furor Over CIA Shake-Up of Email System” by Adam Klasfeld, Courthouse News Service, November 7.
  •  
    The CIA's request for permission to destroy the emails was based on the bald assertion that all information contained in the emails of historical significance had already been incorporated in more formal reports, without any actual study of the email contents. The very notion is preposterous.
Gary Edwards

Chinese agency bans online mention of Panama Papers - CNET - 0 views

  •  
    "China is flexing its censorship muscles yet again, banning any online mention of the widely publicized Panama Papers. A government agency sent an order to media groups to "find and delete reprinted reports of the Panama Papers. Do not follow up on related content, no exceptions," according to the China Digital Times. "If material from foreign media attacking China is found on any website, it will be dealt with severely." The Panama Papers refer to 2.6 terabytes of information published online Sunday after a yearlong investigation by the International Consortium of Investigative Journalists, a German newspaper and other news groups. The more than 11 million legal and financial records were stolen from Panama-based law firm Mossack Fonseca's servers. They focus on 140 politicians and public officials worldwide with previously undisclosed involvement in or ownership of offshore financial havens. Relatives of eight current or former members of China's ruling party were implicated. MORE ON THE PANAMA PAPERS Panama Papers show no one's secrets safe Panama Papers leak claims its first victim The most significant findings among the Chinese officials were secret offshore activities linked to the family of Xi Jinping, the country's president. His brother-in-law, Deng Jiagui, was named. Xi assumed office in 2013 and has led a public charge against corruption in China. Also named were Li Xiaolin, daughter of former premier Li Peng, and Jasmine Li, granddaughter of former Standing Committee member Jia Qinglin. The Chinese agency also ordered that references be removed relating to money laundering of people associated with Russian President Vladamir Putin. The Global Times, a publication run by the Chinese government, posted an op-ed shortly after the leaks that implied the Panama Papers' information had been distorted to make countries like China and Russia look bad. The leaks have already made an impact, with Iceland Prime Minister Sigmundur David Gunnlaugsson resigni
Paul Merrell

CIA 'mistakenly' destroys copy of 6,700-page US torture report - Crunchs Magazine - 0 views

  • The CIA inspector general’s office has said it “mistakenly” destroyed its only copy of a comprehensive Senate torture report, despite lawyers for the Justice Department assuring a federal judge that copies of the documents were being preserved. The erasure of the document by the spy agency’s internal watchdog was deemed an “inadvertent” foul-up by the inspector general, according to Yahoo News. One intelligence community source told Yahoo News, which first reported the development, that last summer CIA inspector general officials deleted an uploaded computer file with the report and then accidentally destroyed a disk that also contained the document.
  • The 6,700-page report contains thousands of secret files about the CIA’s use of “enhanced” interrogation methods, including waterboarding, sleep deprivation and other aggressive interrogation techniques at “black site” prisons overseas. The full version of the report remains classified, but a 500-page executive summary was released to the public in 2014. Christoper R. Sharpley, the CIA’s acting inspector general (CIA IG), alerted the Senate intelligence panel that his office’s copy of the report had vanished in August. And Senator Dianne Feinstein, the driving force behind the 2014 report, sent letters to the CIA and Justice Department confirming the spy agency’s inspector general “has misplaced and/or accidentally destroyed” its copy of the report. Douglas Cox, a City University of New York School of Law professor who specialises in tracking the preservation of federal records told Yahoo News: “It’s breathtaking that this could have happened, especially in the inspector general’s office – they’re the ones that are supposed to be providing accountability within the agency itself.”
  • Another copy of the report exists elsewhere within the CIA, which is waiting for the conclusion of a years-long legal battle over the document.
  •  
    Uh-huh ...
Paul Merrell

Secret to Prism program: Even bigger data seizure - 0 views

  • The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe. But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort. Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.
  • Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information. The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.
  • The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant. Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations. Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light. "You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades. The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a key hub for fiber optic cables.
  • ...11 more annotations...
  • Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism's success. The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far. The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.
  • The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer. That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation. The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now. What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.
  • The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required. Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
  • That's one example of how emails belonging to Americans can become swept up in the hunt. In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber optics cables that actually captures the data, experts agree. "I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."
  • When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.
  • For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN. It was known as Prism. Though many details are still unknown, it worked like this:
  • Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.
  • Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more. Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines. In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables. Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user. With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property. Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.
  • What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans. Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
  • A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to. Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.
  • Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the government collects everything, he said. He said it doesn't matter what the government and the companies say, either. It's spycraft, after all. "Everyone is playing word games," he said. "No one is telling the truth."
  •  
    Associated Press is now doing its job with a masterful overview of NSA capabilities, discussing how NSA scoops up all "backbone" telecommunications, then uses PRISM to narrow down the specific communications they decide to look at. This one is a "must read" article if you're interested in the NSA scandal. It ties a lot of the pieces together.  
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Gary Edwards

Secret White House Email Accounts Uncover IRS-Obama Smoking Gun : palookavillepost.com - 0 views

  • During an investigation of President Barack Hussein Obama’s political appointees and White House aides, FBI agents discovered secret government email accounts they say were used as primary means for Obama’s staff to interact with IRS officials for day-to-day business.
  • Investigators became curious about the possibility of such accounts after Congress requested all emails from the White House regarding the Benghazi, IRS and other scandals, and the White House could only produce a handful of emails that discussed those topics.
  • “We had one of our hackers get into a White House intern’s computer, and that’s where we located a slew of private email accounts not associated with Federal government accounts,” said a spokesman for the powerful federal police agency.
  • ...6 more annotations...
  • Emails sent to people outside of the secret network of White House email accounts were programmed to automatically be deleted five minutes after opening the message, just like on Mission Impossible. This explains the absence of White House emails received by IRS officials.
  • “The content of the emails is still being reviewed, but it is clear that people inside the White House knew about the IRS targeting conservatives, and that somebody with the nickname “Basketball Jones” was the person who told American forces to stand down during the attacks in Benghazi.”
  • “The White House tried to cover their tracks by saying that former IRS Commissioner Douglas Shulman visited the White House 157 times, and that they never used email to communicate,” said the FBI spokesman.
  • Only a few of the emails have been reviewed, but already several of them indicate that President Obama not only knew about the scheme, but he himself ordered the IRS to flood the Tea Party with paperwork and fees.
  • Here is one transcript of a hidden email from an unknown White House aide in April, 2011:
  • “Hey Shulman… What’s up?… Don’t forget BJ(Basketball Jones) wants you to kick up the fees on anyone with Tea Party or Conservative in their names… try to see if you can make them hire expensive tax attorneys too… bog them down with paperwork so they can’t campaign for milk boy(Mitt Romney) or Ru Paul(Ron Paul)… sorry you missed the Easter Egg Hunt… maybe next year… I’d invite you to stay in the Lincoln bedroom but that costs real money… send me a report on how many Tea Party groups quit because of being jerked around…ASAP… Chow!”
  •  
    Although this article has zero credibility and even less reference checking, everyone in America knows that Obama ordered the IRS hit on Tea Party Patriots, Conservatives and Jewish Homeland organizations.  That the IRS admits to violating the Constitutional civil rights of tens of millions of law abviding Americans, and did so in ways that only benefit the Obama re-election campaign is proof enough for anyone who loves liberty.
1 - 20 of 56 Next › Last »
Showing 20 items per page