Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged exclusive

Rss Feed Group items tagged

Gary Edwards

Obama impeachment bill now in Congress - 2 views

  •  
    In response to a hearing where the Secretary of Defense, Marxist Leon Panetta stated in a response to the question over who determines the proper and legal use of the US Military, that the Obama Regime would seek international permission from a NATO coalition or UN resolution.  Not Congress.   "Our goal would be to seek international permission and we would … come to the Congress and inform you and determine how best to approach this, whether or not we would want to get permission from the Congress - I think those are issues we would have to discuss as we decide what to do here." Of course, the Constitution expressly warrants that only Congress and Congress alone, has the power to declare war.  In response to the these globalist statements, a Bill has been introduced that elevates the unauthorized and un-Constitutional use of the US Military an impeachable offense. "The full wording of H. Con. Res. 107, which is currently referred to the House Committee on the Judiciary, is as follows: Expressing the sense of Congress that the use of offensive military force by a president without prior and clear authorization of an act of Congress constitutes an impeachable high crime and misdemeanor under Article II, Section 4 of the Constitution. Whereas the cornerstone of the Republic is honoring Congress's exclusive power to declare war under article I, section 8, clause 11 of the Constitution: Now, therefore, be it Resolved by the House of Representatives (the Senate concurring), That it is the sense of Congress that, except in response to an actual or imminent attack against the territory of the United States, the use of offensive military force by a president without prior and clear authorization of an act of Congress violates Congress's exclusive power to declare war under Article I, Section 8, clause 11 of the Constitution and therefore constitutes an impeachable high crime and misdemeanor under Article II, Section 4 of the Constitution."
  •  
    The headline is misleading. It is not a bill to impeach Obama; it is a bill to define the use of offensive military force without prior authorization of Congress as an impeachable offense. I checked the bill's history and both Ron Paul and Dennis Kucinich are cosponsors. Good on them. Unfortunately, both are lame ducks.
Paul Merrell

EXCLUSIVE: Snowden reveals more US cyberspying details | South China Morning Post - 0 views

  • US spies are hacking into Chinese mobile phone companies to steal text messages and attacking the servers at Tsinghua University, Edward Snowden has told the Sunday Morning Post. The latest explosive revelations about US National Security Agency cybersnooping in Hong Kong and on the mainland are based on further scrutiny and clarification of information Snowden provided on June 12. The former technician for the US Central Intelligence Agency and contractor for the National Security Agency provided documents revealing attacks on computers over a four-year period.
  • The documents listed operational details of specific attacks on computers, including internet protocol (IP) addresses, dates of attacks and whether a computer was still being monitored remotely. The Sunday Morning Post can now reveal Snowden's claims that the NSA is: Extensive hacking of major telecommunication companies in China to access text messages   Sustained attacks on network backbones at Tsinghua University, China’s premier seat of learning   Hacking of computers at the Hong Kong headquarters of Pacnet, which owns one of the most extensive fibre optic submarine cable networks in the region
  • Pacnet, which recently signed major deals with the mainland's top mobile phone companies, owns more than 46,000 kilometres of fibre-optic cables. The cables connect its regional data centres across the Asia-Pacific region, including Hong Kong, the mainland, Japan, South Korea, Singapore and Taiwan. It also has offices in the US. Snowden claims that data from Chinese mobile phone companies has been compromised, with millions of private text messages mined by the NSA. Cybersecurity experts on the mainland have long feared mobile phone companies had fallen victim to back-door attacks because they were forced to go overseas to buy core technology for their networks. In recent years, those security concerns became more vocal and as a result domestic network equipment suppliers such as Huawai, Datang and ZTE started to close the technology gap, enabling the phone companies to reduce their reliance on foreign suppliers.
  • ...1 more annotation...
  • As for the attacks at Tsinghua University, the leaked information points to the NSA hacking into the institute's servers as recently as January. Tsinghua is widely regarded as China's top education and research institute and carries out extensive work on next-generation web technologies. It is home to one of the mainland's six major network backbones, the China Education and Research Network.
Paul Merrell

FBI Investigating Clinton Foundation Corruption DoJ Objections - 0 views

  • Having detailed Clinton-appointee Loretta Lynch’s DoJ push-back against the FBI’s Clinton Foundation probe, it seems Director Comey has decided to flex his own muscles and save face as DailyCaller reports, multiple FBI investigations are underway involving potential corruption charges against the Clinton Foundation, according to a former senior law enforcement official.
  • However, as DailyCaller reports, The FBI is undertaking multiple investigations involving potential corruption changes against The Clinton Foundation… The investigation centers on New York City where the Clinton Foundation has its main offices, according to the former official who has direct knowledge of the activities. Prosecutorial support will come from various U.S. Attorneys Offices — a major departure from other centralized FBI investigations. The New York-based probe is being led by Preet Bharara, the U.S. attorney for the Southern District of New York.  The official said involvement of the U.S. Attorney’s Office in the Southern District of New York “would be seen by agents as a positive development as prosecutors there are generally thought to be more aggressive than the career lawyers within the DOJ.” … The former official said the investigation is being coordinated between bureau field offices and FBI managers at headquarters in Washington, D.C. The unusual process would ensure senior FBI supervisors, including Director James Comey, would be kept abreast of case progress and of significant developments. The reliance on U.S. attorneys would be a significant departure from the centralized manner in which the FBI managed the investigation of former Secretary of State Hillary Clinton’s use of a private server and email addresses. That investigation was conducted with agents at FBI headquarters, who coordinated with the Department of Justice’s National Security Division (NSD).
Gary Edwards

Paul Ryan: My Plan to Save America - 0 views

  •  
    "Newsmax asked vice presidential candidate Rep. Paul Ryan to provide his prescription for fixing the American economy and a defense of his proposed agenda, in light of the Obama's administration's refusal to address out-of-control entitlements. Here is his exclusive Newsmax Op-Ed. When President Barack Obama took office in 2009, he assumed a degree of command over the federal government that few U.S. presidents have enjoyed. His party had just enlarged its already-large majority in the House of Representatives, and gained a filibuster-proof majority in the Senate. The president enjoyed tremendous popularity following his historic victory. During his campaign, then-Sen. Obama argued that what had stopped us from meeting our nation's greatest challenges had been "the failure of leadership, the smallness of our politics - the ease with which we're distracted by the petty and trivial, our chronic avoidance of tough decisions, our preference for scoring cheap political points instead of rolling up our sleeves and building a working consensus to tackle big problems." To solve this problem, he pledged to help us "rediscover our bonds to each other and get out of this constant, petty bickering that's come to characterize our politics." Urgent: See Newsmax's Special Report on Paul Ryan - Includes Exclusive Interview The last three and a half years of divisive politics and broken promises have been disappointing. "
  •  
    A few random thoughts on the budgetary gridlock in Congress: -- The elephant in the room that both parties are ignoring is bankster control of the money supply. Any budgetary reform is doomed unless the power of banksters to print as many dollars as they want is eliminated. In terms of purchasing power, the incredible dilution of the dollar's value that commenced when we abandoned the gold standard has put massive upward pressure on prices and budgets, both governmental and private. The Constitution explicitly forbids anything other than gold or silver to be used for payment of debts. -- Both parties and Obama have been guilty of drawing lines in the sand as preconditions to negotiation. E.g., no entitlement cuts, increased taxes on the wealthy, no defense cuts, no new taxes, etc. These are terms of surrender, not terms of negotiation, akin to an advertising campaign based on the fine print of the sales agreement rather than on why the customer should buy the product. As any successful negotiator knows, the keys to a successful negotiation are: [i] agreeing at the outset that there s no deal until all terms have been agreed to; and [ii] focusing on what you are willing to offer the other side as incentives to agree to a deal, not on areas of disagreement. A successful negotiation results in a deal where both sides feel that the deal puts them ahead of where they began. -- Arguing over pre-conditions is not negotiation; it is no more than a lame excuse for not negotiating. But that is what the White House and both parties have been doing. -- By functioning as an echo chamber for preconditions to negotiation, constituents, wittingly or not, aid in prevention of serious negotiation. Serious negotiation has no substantive preconditions; everything is on the table. And the focus is on what each side is willing to give the other if the entire deal is agreed to, not on what each side is unwilling to offer. -- The major players in the White House and Congress alre
Paul Merrell

Exclusive: This Is the ISIS Intel the U.S. Military Dumbed Down - The Daily Beast - 0 views

  • The intelligence pros said killing certain ISIS leaders might not diminish the group and that airstrikes might not be working. The bosses didn’t like those answers—not at all.Senior intelligence officials at the U.S. military’s Central Command demanded significant alterations to analysts’ reports that questioned whether airstrikes against the so-called Islamic State widely known as ISIS were damaging the group’s finances and its ability to launch attacks. But reports that showed the group being weakened by the U.S.-led air campaign received comparatively little scrutiny, The Daily Beast has learned. Senior CENTCOM intelligence officials who reviewed the critical reports sent them back to the analysts and ordered them to write new versions that included more footnotes and details to support their assessments, according to two officials familiar with a complaint levied by more than 50 analysts about intelligence manipulation by CENTCOM higher-ups.
  • In some cases, analysts were also urged to state that killing particular ISIS leaders and key officials would diminish the group and lead to its collapse. Many analysts, however, didn’t believe that simply taking out top ISIS leaders would have an enduring effect on overall operations. “There was the reality on the ground but it was not as rosy as [the leadership] wanted it to be,” a defense official familiar with the complaint told The Daily Beast. “The challenge was assessing whether the glass was half empty, not half full.”Some analysts have also complained that they felt “bullied” into reaching conclusions favored by their bosses, two separate sources familiar with analysts’ complaints said. The written and verbal pressure created a climate at CENTCOM in which analysts felt they had to self-censor some of their reports.
  • Army General Lloyd Austin came under withering bipartisan criticism on Wednesday when he testified before the Senate Armed Services Committee that after spending at least $43 million over a 10-month period, the U.S. had trained only nine fighters to confront ISIS in Syria. Senators were dumbfounded that the nearly year-long effort had produced such paltry results, calling it “a joke” and “an abject failure.”
  • ...3 more annotations...
  • Some of the analysts have also accused their bosses of changing the reports in order to appeal to what they perceived as the Obama administration’s official line that the anti-ISIS campaign was making progress and would eventually end with the group’s destruction.Lawmakers and even presidential candidates seized on the allegations of politicizing intelligence as the White House tried to distance itself from the very strategy it has been pursuing.
  • Meanwhile, Pentagon investigators are examining the back-and-forth between the intelligence bosses at CENTCOM and the analysts, which created a paper trail. Favorable reports had fewer comments written on them, and requests that were more critical showed heavy questioning, the two officials said. The altering of intelligence led to reports that overstated the damage that U.S. strikes had on specific ISIS targets. For instance, strikes on oil refineries and equipment were said to have done more damage to the group’s financing of operations through illicit oil sales than the analysts believed. Also, strikes on military equipment were said to have set back the group’s ability to wage combat operations, when the analysts believed that wasn’t always the case.The altered reports made ISIS seem financially weakened and less capable of launching attacks, the analysts allege.
  • The CENTCOM supervisors “did not like the reports on the impact [of the airstrikes] because they didn’t believe it,” one military adviser familiar with CENTCOM operations told The Daily Beast. The Defense Department inspector general has been conducting interviews at CENTCOM headquarters in Tampa, Florida, in order to determine who in the command’s intelligence directorate may have distorted or manipulated the intelligence reports, some of which eventually made their way into materials briefed to President Obama. Investigators have pulled CENTCOM personnel one by one into private interviews to get to the bottom of the allegations and determine who was ultimately responsible for changing intelligence reports, according to individuals with knowledge of the investigation. The inspector general has confirmed that the investigation is focused on the CENTCOM intelligence directorate, or J2. Multiple sources told The Daily Beast that the head of intelligence, Army Major General Steven Grove, is named in the complaint, as are several other senior officials at CENTCOM. The tone of the complaint is said to be harsh and highly critical of senior officials’ leadership and actions.
Gary Edwards

Chris Dodd's carve-outs for cronies - NYPOST.com - 0 views

  •  
    Dangerous and sickening!  In Dodd's Bill, The Property Transaction Industry (Mortgage, Real Estate, Insurance, Legal, Appraisal, and Title) are exempted from the 1974 RESPA full disclosure act!   Regulators are authorized to take over and "bail out" any financial operation they deem troubled. excerpt: The financial-regulatory bill now before the Senate is so filled with special-interest loopholes and exclusions that it makes the health-care "reform" bill, with its "Cornhusker Kickback" and "Louisiana Purchase," look like a model of rectitude.The Senate bill, sponsored by Democrat Chris Dodd, claims to subject all "too big to fail" institutions to greater federal supervision, but in fact it only mandates such regulation for bank-holding companies. Regulators would have to make a case-by-case decision on whether to apply it to other financial companies.The Senate financial-regulation bill offers a stark choice: Do we aspire to be a country where everyone is subject to the same rules? Or do we accept a system where power, influence and money can buy exclusions and exemptions?The public needs to understand that, far from protecting the little guy and sticking it to the fat cats, this bill keeps good, old-fashioned political patronage alive and well. Read more: http://www.nypost.com/p/news/opinion/opedcolumnists/chris_dodd_carve_outs_for_cronies_MT1U7GBEPvzX3QXProqC9L#ixzz0mKJmEdn4 Read more: http://www.nypost.com/p/news/opinion/opedcolumnists/chris_dodd_carve_outs_for_cronies_MT1U7GBEPvzX3QXProqC9L#ixzz0mKJmEdn4Read more: http://www.nypost.com/p/news/opinion/opedcolumnists/chris_dodd_carve_outs_for_cronies_MT1U7GBEPvzX3QXProqC9L#ixzz0mKJcsmlN
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Brody File Exclusive: President Trump Says Persecuted Christians Will Be Given Priority... - 0 views

  • In an exclusive interview with The Brody File, President Donald Trump says persecuted Christians will be given priority when it comes to applying for refugee status in the United States. “We are going to help them,” President Trump tells CBN News. “They’ve been horribly treated. Do you know if you were a Christian in Syria it was impossible, at least very tough to get into the United States? If you were a Muslim you could come in, but if you were a Christian, it was almost impossible and the reason that was so unfair, everybody was persecuted in all fairness, but they were chopping off the heads of everybody but more so the Christians. And I thought it was very, very unfair.” The Brody File conducted the interview Friday morning in the Blue Room at The White House. More newsworthy clips are coming soon. The entire interview can be seen this Sunday at 11pm on Freeform (cable TV, formerly ABC Family Channel) during our special CBN News show. This is just the third interview President Trump has done from The White House and it will be the only interview that will air in its’ entirety this weekend.
  •  
    Major parts of Trump's immigration executive order have already been stayed by multiple federal courts.
Paul Merrell

Exclusive: US blocks publication of Chilcot's report on how Britain went to war with Ir... - 0 views

  • Washington is playing the lead role in delaying the publication of the long-awaited report into how Britain went to  war with Iraq, The Independent has learnt. Although the Cabinet Office has been under fire for stalling the progress of the four-year Iraq Inquiry by Sir John Chilcot, senior diplomatic sources in the US and Whitehall indicated that it is officials in the White House and the US Department of State who have refused to sanction any declassification of critical pre- and post-war communications between George W Bush and Tony Blair.Without permission from the US government, David Cameron faces the politically embarrassing situation of having to block evidence, on Washington’s orders, from being included in the report of an expensive and lengthy British inquiry.Earlier this year, The Independent revealed that early drafts of the report challenged the official version of events leading up to the Iraq war, which saw Mr Blair send in 45,000 troops to overthrow Saddam Hussein’s regime.
  •  
    According to The Independent, John Kerry's State Department is busily stifling the report of the U.K.'s four-year Iraq Inquiry into how the U.K. was drawn into the Iraq War, on secrecy grounds. Obama's campaign promise to have the most transparent U.S. administration in history is long forgotten. Government secrecy trumps any investigation into war crimes by prior presidents, even though the U.S. agreed by treaty to investigate and prosecute all war crimes committed by U.S. officials.  Not only that, the Obama Administration now includes a criminal conspiracy to suppress evidence of the commission of war crimes.
Paul Merrell

Exclusive: Watch Donald Rumsfeld Lie About Saddam Hussein and 9/11 in 'The Unknown Know... - 0 views

  • In this exclusive clip, Morris grills Rumsfeld about his response to 9/11, in particular why he, along with the rest of the Bush administration, led America to believe that Saddam Hussein was somehow involved in the 9/11 attacks.“Oh, I don’t think so,” replies Rumsfeld. “It was very clear that the direct planning for 9/11 was done by Osama bin Laden’s people, al Qaeda, and in Afghanistan. I don’t think the American people were confused about that.” Then Morris provides some eye-opening evidence to the contrary.   Watch their showdown here:
Paul Merrell

Press Release - Secret Trade in Services Agreement (TISA) - Financial Services Annex - 0 views

  • Today, WikiLeaks released the secret draft text for the Trade in Services Agreement (TISA) Financial Services Annex, which covers 50 countries and 68.2%1 of world trade in services. The US and the EU are the main proponents of the agreement, and the authors of most joint changes, which also covers cross-border data flow. In a significant anti-transparency manoeuvre by the parties, the draft has been classified to keep it secret not just during the negotiations but for five years after the TISA enters into force. Despite the failures in financial regulation evident during the 2007-2008 Global Financial Crisis and calls for improvement of relevant regulatory structures2, proponents of TISA aim to further deregulate global financial services markets. The draft Financial Services Annex sets rules which would assist the expansion of financial multi-nationals – mainly headquartered in New York, London, Paris and Frankfurt – into other nations by preventing regulatory barriers. The leaked draft also shows that the US is particularly keen on boosting cross-border data flow, which would allow uninhibited exchange of personal and financial data. TISA negotiations are currently taking place outside of the General Agreement on Trade in Services (GATS) and the World Trade Organization (WTO) framework. However, the Agreement is being crafted to be compatible with GATS so that a critical mass of participants will be able to pressure remaining WTO members to sign on in the future. Conspicuously absent from the 50 countries covered by the negotiations are the BRICS countries of Brazil, Russia, India and China. The exclusive nature of TISA will weaken their position in future services negotiations. The draft text comes from the April 2014 negotiation round - the sixth round since the first held in April 2013. The next round of negotiations will take place on 23-27 June in Geneva, Switzerland.
  •  
    "Today, WikiLeaks released the secret draft text for the Trade in Services Agreement (TISA) Financial Services Annex, which covers 50 countries and 68.2%1 of world trade in services. The US and the EU are the main proponents of the agreement, and the authors of most joint changes, which also covers cross-border data flow. In a significant anti-transparency manoeuvre by the parties, the draft has been classified to keep it secret not just during the negotiations but for five years after the TISA enters into force. Despite the failures in financial regulation evident during the 2007-2008 Global Financial Crisis and calls for improvement of relevant regulatory structures2, proponents of TISA aim to further deregulate global financial services markets. The draft Financial Services Annex sets rules which would assist the expansion of financial multi-nationals - mainly headquartered in New York, London, Paris and Frankfurt - into other nations by preventing regulatory barriers. The leaked draft also shows that the US is particularly keen on boosting cross-border data flow, which would allow uninhibited exchange of personal and financial data. TISA negotiations are currently taking place outside of the General Agreement on Trade in Services (GATS) and the World Trade Organization (WTO) framework. However, the Agreement is being crafted to be compatible with GATS so that a critical mass of participants will be able to pressure remaining WTO members to sign on in the future. Conspicuously absent from the 50 countries covered by the negotiations are the BRICS countries of Brazil, Russia, India and China. The exclusive nature of TISA will weaken their position in future services negotiations. The draft text comes from the April 2014 negotiation round - the sixth round since the first held in April 2013. The next round of negotiations will take place on 23-27 June in Geneva, Switzerland."
Gary Edwards

RealClearMarkets - Yes, IRS Harassment Blunted The Tea Party Ground Game - 0 views

  • We found that the effect was huge: the movement brought the Republican Party some 3-6 million additional votes in House races.
  • The bottom line is that the Tea Party movement, when properly activated, can generate a huge number of votes-more votes in 2010, in fact, than the vote advantage Obama held over Romney in 2012.
    • Gary Edwards
       
      Wow!  So the IRS re-elected Obama?  This is a bureaucratic coup.  We are living in a cleptocracy where the citizens treasury is being systematically looted by Federal bureacracies who are in position and powerfully corrupt enough to elect the representatives who enable them to loot at will. 
  • The data show that had the Tea Party groups continued to grow at the pace seen in 2009 and 2010,
  • ...8 more annotations...
  • and had their effect on the 2012 vote been similar to that seen in 2010, they would have brought the Republican Party as many as 5 - 8.5 million votes compared to Obama's victory margin of 5 million.
  • Unfortunately for Republicans, the IRS slowed Tea Party growth before the 2012 election.
  • In March 2010, the IRS decided to single Tea Party groups out for special treatment when applying for tax-exempt status by flagging organizations with names containing "Tea Party," "patriot," or "9/12."
  • For the next two years, the IRS approved the applications of only four such groups, delaying all others while subjecting the applicants to highly intrusive, intimidating requests for information regarding their activities, membership, contacts, Facebook posts, and private thoughts.
  • As a consequence, the founders, members, and donors of new Tea Party groups found themselves incapable of exercising their constitutional rights, and the Tea Party's impact was muted in the 2012 election cycle.
  • it doesn't take a conspiracy theorist to note that the president's team was competent enough to recognize the threat from the Tea Party and take it seriously.
  • The Obama campaign has made no secret of its efforts to revolutionize turnout models for the most recent campaign.
  • Its remarkable competence turning out its own voters has been widely discussed, and it seems quite plausible that efforts to suppress the Republican vote would have been equally sophisticated.
  •  
    excerpt: .................... The controversy over the IRS's harassment of conservative groups continues. President Obama's team continues to blame low-level bureaucrats. Some conservatives suspect a more sinister explanation: that the levers of government were used to attack an existential threat to the president's 2012 reelection. The president and his party dismiss this as a paranoid fantasy. The evidence, however, is enough to make one believe that targeting Tea Party groups would have been an effective campaign strategy going into the 2012 election cycle. It is a well-known fact that the Tea Party movement dealt the president his famous "shellacking" in the 2010 mid-term election. Less well-known is the actual number of votes this new movement delivered-and the continuing effects these votes could have had in 2012 had the movement not been de-mobilized by the IRS. In a new research paper, Andreas Madestam (from Stockholm University), Daniel Shoag and David Yanagizawa-Drott (both from the Harvard Kennedy School), and I set out to find out how much impact the Tea Party had on voter turnout in the 2010 election. We compared areas with high levels of Tea Party activity to otherwise similar areas with low levels of Tea Party activity, using data from the Census Bureau, the FEC, news reports, and a variety of other sources. We found that the effect was huge: the movement brought the Republican Party some 3-6 million additional votes in House races. That is an astonishing boost, given that all Republican House candidates combined received fewer than 45 million votes. It demonstrates conclusively how important the party's newly energized base was to its landslide victory in those elections, and how worried Democratic strategists must have been about the conservative movement's momentum. The Tea Party movement's huge success was not the result of a few days of work by an elected official or two, but involved activists all over the country who spent the year and a hal
  •  
    One interesting facet of this scandal is that the IRS in its own regulations rewrote a law passed by Congress in the early 50s to permit non-profit corporations to devote part of their resources to political issues. As passed by Congress, it says that the non-profits must be "exclusively" charitable in nature. But when the IRS wrote its implementing regulations, it substituted "primarily" for "exclusively," thus allowing the non-profits to engage in political political campaigns to an undefined extent and getting the IRS into the business of looking at political credentials rather than a simpler review of whether the given non-profit's purpose is purely charitable. Thus, a question of what should be done about this. Roughly, the choices are: [i] amend the statute to read "primarily;" or [ii] leave the statute alone and have someone litigate to correct the IRS regulations. The latter path, if followed, should result in ending *all* non-profits' participation in political campaigns. The advantage of the latter path is that it gets the IRS out of the business of picking whose politics they like. The disadvantage is that it gores a huge number of non-profits' oxen across the political spectrum, so a major lobbying effort to rewrite the statute to maintain the status quo is predictable. But with a court decision holding that the IRS got it wrong, that non-profits must be "exclusively" charitable, presumably it would be illegal for non-profits to do that campaigning themselves.
Gary Edwards

Did Money Seal Israeli-Saudi Alliance? | Consortiumnews - 0 views

  • Exclusive: The odd-couple relationship between Saudi Arabia and Israel may have been sealed with more than a mutual desire to kiss-off Iran. According to an intelligence source, there was a dowry involved, too, with the Saudis reportedly giving Israel some $16 billion, writes Robert Parry.By Robert Parry
  • For more than half a century, Saudi Arabia has tried to use its vast oil wealth to build a lobby in the United States that could rival the imposing Israel Lobby. At top dollar, the Saudis hired law firms and PR specialists – and exploited personal connections to powerful families like the Bushes – but the Saudis never could build the kind of grassroots political organization that has given Israel and its American backers such extraordinary clout.Indeed, Americans who did take Saudi money – including academic institutions and non-governmental organizations – were often pilloried as tools of the Arabs, with the Israel Lobby and its propagandists raising the political cost of accepting Saudi largesse so high that many people and institutions shied away.
  •  
    Thanks to Marbux we have this stunning summary explaining how Israel and Saudi Arabia are working together to stop Iran and the Shiite Crescent from taking over the Middle East and establishing an oil rich Shiite Caliphate. ........... "New Terrorist Gains Saudi Arabia and its Persian Gulf allies, along with Turkey, are also ramping up support in Syria for Al-Qaeda's Nusra Front and the Islamic State. Flush with jihadist reinforcements, the two terrorist organizations have seized new territory in recent weeks, including the Islamic State creating a humanitarian crisis by attacking a Palestinian refugee camp south of Damascus. All of these Saudi actions have drawn minimal criticism from mainstream U.S. media and political circles, in part, because the Saudis now have the protection of the Israel Lobby, which has kept American attention on the supposed threat from Iran, including allegedly controversial statements from Iranian leaders about their insistence that economic sanctions be lifted once the nuclear agreement is signed and/or implemented. Neocon warmongers have even been granted space in major U.S. newspapers, including the Washington Post and the New York Times, to openly advocate for the bombing of Iran despite the risk that destroying Iran's nuclear reactors could inflict both human and environmental devastation. That might serve the Saudi-Israeli interests by forcing Iran to focus exclusively on a domestic crisis but it would amount to a major war crime. [See Consortiumnews.com's "NYT Publishes Call to Bomb Iran."] The strategic benefit for Israel and Saudi Arabia would be that with Iran unable to assist the Iraqis and the Syrians in their desperate struggles against Al-Qaeda and the Islamic State, the Sunni jihadists might well be hoisting the black flag of their dystopian philosophy over Damascus, if not Baghdad. [See Consortiumnews.com's "The Secret Saudi Ties to Terrorism."] Beyond the slaughter of innocents that would follow
Paul Merrell

MH17: Malaysia's Barring from Investigation Reeks of Cover-up | nsnbc international - 0 views

  • It was a Malaysian jet, carrying Malaysian passengers, flown by Malaysian pilots, yet after Malaysia Airlines flight MH17 was shot down over Ukraine in July 2014, Malaysia has been systematically blocked from participating in the investigation, leaving an overwhelmingly pro-NATO bloc in charge of the evidence, investigation and outcome as well as the manner in which the investigation will be carried out. Despite the integral role Malaysia has played during several pivotal moments in the aftermath of the disaster, it appears that the closer to the truth the investigation should be getting, the further Malaysia itself is being pushed from both the evidence and any influence it has on the likely conclusions of the investigation. With the downed aircraft in question being Malaysian, Malaysia as a partner in the investigation would seem a given. Its exclusion from the investigation appears to be an indication that the investigation’s objectivity has been compromised and that the conclusions it draws will likely be politically motivated.
  • With the Dutch leading the investigation, the logic being that the flight originated from the Netherlands and the majority of the passengers were Dutch, it has formed a Joint Investigation Team (JIT). At the onset of its creation it seemed obvious that Malaysia would too be included, considering it lost the second largest number of citizens to the disaster and the plane itself was registered in Malaysia. Instead, JIT would end up comprised of Belgium, Ukraine, and Australia, specifically excluding Malaysia. Malaysia was both surprised and has protested its exclusion from JIT, and has repeatedly expressed a desire to be included directly in the investigation.
  • The Malaysian Insider cited Malaysian scholar Dr. Chandra Muzaffar who believes the decision to exclude his country from the investigation is politically motivated, aiming at excluding members that may urge caution and objectivity instead of draw conclusions first and bend the investigation’s results around those conclusions. In particular, Dr. Muzaffar believes that the investigations is intentionally being skewed to target Russia. Ukraine’s involvement in the investigation is particularly troublesome. Had MH17 crashed in Ukraine under different circumstances, Ukraine’s role would be welcome. However, it was apparently shot down specifically in a conflict in which Kiev itself is a participant. With both sides of the conflict possessing anti-aircraft weapons and with Kiev itself confirmed to possess weapons capable of reaching the altitude MH17 was flying at when it was allegedly hit, Kiev becomes a possible suspect in the investigation. Kiev’s inclusion in JIT represents a monumental conflict of interest.
  • ...3 more annotations...
  • And to compound this already glaring conflict of interest, it was revealed recently that an alleged “secret deal” was struck by JIT in which any member could bar the release of evidence. With all members of JIT being pro-NATO and decidedly arrayed against Moscow, such a “deal” could prevent crucial evidence from being revealed that would effect an otherwise distorted conclusion drawn by the investigators aimed specifically at advancing their greater political agenda in Eastern Europe. Had Malaysia been a member of JIT, the ability of other members to withhold evidence would have been greatly diminished and it is likely such a bizarre deal would not have been conceivable, real or imaged, in the first place.
  • With the ongoing conflict in Ukraine perceived as a proxy war between NATO and Moscow, JIT’s membership including the NATO-backed Kiev regime itself (a possible suspect), two NATO members (Belgium and the Netherlands) and Australia who has passed sanctions against Russia over the conflict, is a textbook case of conflict of interest.
  • To casual observers, the current investigation led by NATO members and Kiev, a possible suspect, would be no different than the Donetsk People’s Republic and Russia leading it. Few would consider a DPR or Russian led investigation impartial, and few should see a NATO-led investigation as impartial. Had Malaysia been included in the process, an argument could have been made that an actual investigation was taking place rather than a complex propaganda campaign. Malaysia’s exclusion is a troubling sign for the victims of the MH17 disaster, meaning the true culprits will never be known. The overt politically motivated nature of the investigation will on one hand  help fuel NATO’s propaganda war, but on the other hand, fuel the doubts of millions worldwide over the true events that took place in the skies of eastern Ukraine that day. Like so many other events in human history that took place amid a high stake political struggle, the downing of MH17 will be shrouded in mystery, mystery draped over the truth by the irresponsible leadership of NATO, and those in Washington, London and Brussels egging on the conflict in Ukraine to this very day.
Paul Merrell

Exclusive: TSA's Secret Behavior Checklist to Spot Terrorists - The Intercept - 0 views

  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening. The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program.
  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening.
  • The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program. The checklist ranges from the mind-numbingly obvious, like “appears to be in disguise,” which is worth three points, to the downright dubious, like a bobbing Adam’s apple. Many indicators, like “trembling” and “arriving late for flight,” appear to confirm allegations that the program picks out signs and emotions that are common to many people who fly.
  • ...5 more annotations...
  • A TSA spokesperson declined to comment on the criteria obtained by The Intercept. “Behavior detection, which is just one element of the Transportation Security Administration’s (TSA) efforts to mitigate threats against the traveling public, is vital to TSA’s layered approach to deter, detect and disrupt individuals who pose a threat to aviation,” a spokesperson said in an emailed statement.
  • Since its introduction in 2007, the SPOT program has attracted controversy for the lack of science supporting it. In 2013, the Government Accountability Office found that there was no evidence to back up the idea that “behavioral indicators … can be used to identify persons who may pose a risk to aviation security.” After analyzing hundreds of scientific studies, the GAO concluded that “the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance.” The inspector general of the Department of Homeland Security found in 2013 that TSA had failed to evaluate SPOT, and “cannot ensure that passengers at United States airports are screened objectively, show that the program is cost-effective, or reasonably justify the program’s expansion.” Despite those concerns, TSA has trained and deployed thousands of Behavior Detection Officers, and the program has cost more than $900 million since it began in 2007, according to the GAO.
  • The 92-point checklist listed in the “Spot Referral Report” is divided into various categories with a point score for each. Those categories include a preliminary “observation and behavior analysis,” and then those passengers pulled over for additional inspection are scored based on two more categories: whether they have “unusual items,” like almanacs and “numerous prepaid calling cards or cell phones,” and a final category for “signs of deception,” which include “covers mouth with hand when speaking” and “fast eye blink rate. Points can also be deducted from someone’s score based on observations about the traveler that make him or her less likely, in TSA’s eyes, to be a terrorist. For example, “apparent” married couples, if both people are over 55, have two points deducted off their score. Women over the age of 55 have one pointed deducted; for men, the point deduction doesn’t come until they reach 65. Last week, the ACLU sued TSA to obtain records related to its behavior detection programs, alleging that they lead to racial profiling. The lawsuit is based on a Freedom of Information Act request the ACLU filed last November asking for numerous documents related to the program, including the scientific justification for the program, changes to the list of behavior indicators, materials used to train officers and screen passengers, and what happens to the information collected on travelers.
  • “The TSA has insisted on keeping documents about SPOT secret, but the agency can’t hide the fact that there’s no evidence the program works,” said Hugh Handeyside, staff attorney with the ACLU National Security Project, in a statement announcing the lawsuit. Being on the lookout for suspicious behavior is a “common sense approach” that is used by law enforcement, according to TSA. “No single behavior alone will cause a traveler to be referred to additional screening or will result in a call to a law enforcement officer (LEO),” the agency said in its emailed statement. “Officers are trained and audited to ensure referrals for additional screening are based only on observable behaviors and not race or ethnicity.” One former Behavior Detection Officer manager, who asked not to be identified, said that SPOT indicators are used by law enforcement to justify pulling aside anyone officers find suspicious, rather than acting as an actual checklist for specific indicators. “The SPOT sheet was designed in such a way that virtually every passenger will exhibit multiple ‘behaviors’ that can be assigned a SPOT sheet value,” the former manager said.
  • The signs of deception and fear “are ridiculous,” the source continued. “These are just ‘catch all’ behaviors to justify BDO interaction with a passenger. A license to harass.” The observations of a TSA screener or a Behavior Detection Officer shouldn’t be the basis for referring someone to law enforcement. “The program is flawed and unnecessarily delays and harasses travelers. Taxpayer dollars would be better spent funding real police at TSA checkpoints,” the former manager said. A second former Behavior Detection Officer manager, who also asked not to be identified, told The Intercept that the program suffers from lack of science and simple inconsistency, with every airport training its officers differently. “The SPOT program is bullshit,” the manager told The Intercept. “Complete bullshit.”
  •  
    I've completely boycotted airlines in the U.S. since 2002 because I refuse to submit to the outrageous treatment by government that is now required to board a commercial airliner. If the airlines want my business, they need to start lobbying to end the politics of fear and the Gestapo tactics of government. plus pushing for an honest investigation of the 9/11/2001 incidents.  
Paul Merrell

US Sending Troops To Somalia For The First Time In 24 Years - 0 views

  • In October 1993, during the Battle of Mogadishu (the Black Hawk Down incident), 18 US soldiers were killed and 73 wounded, with a pair of Black Hawk helicopters shot down. The US responded by ceasing military operations, and within a few months had withdrawn all troops from Somalia. Today, they are headed back. The new deployment, which US African Command (AFRICOM) is presented as a simple training operation, will be the first time US ground troops are officially deployed to Somalia, though of course the US has had some special forces present on the ground on and off, conducting occasional operations and spotting for US airstrikes. AFRICOM also insists the new deployment was at the request of the Somali government, though indications in recent weeks has indicated that military officials have been pushing for an escalation of US intervention in the country at any rate, aimed at fighting al-Shabaab.
  • When commanders want to push for fighting in Somalia, al-Shabaab is presented as either ISIS or al-Qaeda affiliated, though in practice the group is largely an independent Islamist operation with a similar ideology. The group’s operations are confined almost exclusively to Somalia, though they have launched some strikes into neighboring countries, as retaliation for those countries (particularly Kenya) being involved in interventions against them. A lot has changed in Somalia in the 24 years between direct US interventions, with the country undergoing a long period of comparatively stable anarchy followed by a protracted war designed to prop up a self-proclaimed government. It was this war, and African Union interventions to try to claim territory for this government, that largely fueled the creation of al-Shabaab.
  •  
    Here we go ...
Paul Merrell

Obama Asks Pentagon For Syria No-Fly Zone Plan - The Daily Beast - 0 views

  • The White House has asked the Pentagon to draw up plans for a no-fly zone inside Syria that would be enforced by the U.S. and other countries such as France and Great Britain, two administration officials told The Daily Beast.
  • The request was made shortly before Secretary of State John Kerry toured the Middle East last week to try and finalize plans for an early June conference between the Syrian regime and rebel leaders in Geneva. The opposition, however, has yet to confirm its attendance and is demanding that the end of Syrian President Bashar al-Assad’s rule be a precondition for negotiations, a condition Assad is unlikely to accept.
Paul Merrell

Sibel Edmonds' Boiling Frogs Post | Home of the Irate Minority - 0 views

  • Here we go again- Déjà vu. Out of the blue we have a ‘terror event,’ a couple of pop-terrorists, and a new buzz-word nation-Chechnya. There they go again: USA Media tales made-in-government: Muslims, terrorists, fanatics, freedom-haters … this time from another exotic-sounding land-Chechnya. They are going to tell you about the new frontiers in the so-called Islamic Terror Cells: The Caucasus and Central Asia. They’ve been planning this for a long time. In fact, the plans were in motion as early as the mid-1990s. Since 2002, despite the gag orders and attacks, I have been talking about: Central Asia & the Caucasus. I have been talking about our operations-grooming our very own terrorists in that region. I have been talking about Chechnya. In fact, just recently, I talked and talked and talked about it on record:
  • Sibel Edmonds on Operation Gladio Part I, Part II, Part III, Part IV, Part V. The government and its media will give you the tales. They will give you the roller-coaster-like spins. They will not give you what you need to know. Two years ago, we, at Boiling Frogs Post, provided you with the following article-analysis. Please read it: with the recent home-made terror incident and the new media buzz-word ‘Chechnya’, you need to arm yourself with facts. Here are a few excerpts from my article on US-Chechen Joint Terror Operation published in November 2011:
Gary Edwards

Benghazi report: Trinkets of treason - 1 views

  •  
    The truth is dribbling out, thn=anks to Douglas J. Hagmann and Canada Free Press .....................  We've been aligned and hostage to the Saudi Royal Family ever since FDR met with King Ibn Saud, Feb 14th, 1945 near the end of WWII.  It was at this meeting that FDR promised protection for the Saudi family in exchange for the right to develop Saudi oil and sell that oil exclusively in dollars.  Hence the "petro dollar" - backed by Saudi oil instead of GOLD. That agreement, and our subsequent history of our military and state departments acting to further Saudi interests has dominated America.  Our troops and military resources ae mercenaries fighting for Saudi dominance of the Globalist ruling elites.  Our politicians are bought and paid for by the Saudi Globalist Alliance.  They have sold their souls for power and money, with the destruction of the USA Constitution the only thing standing between the Globalist and their quest to rule the world. excerpt: We are witnessing one of the biggest government cover-ups since Watergate. A cover-up that involves murder, arms trafficking, and lies by high ranking officials under oath. It involves the murderous attacks in Benghazi, and congressional investigators just released a 46-page interim progress report that at least exposes Hillary Rodham Clinton and the White House lying under oath. Where's the accountability? Where's the outrage? Where's the media? A 46-page interim progress report of an ongoing investigation across five House Committees by the U.S. House of Representatives was released on Tuesday, April 23, 2013. The executive summary states that former Secretary of State Hillary Rodham Clinton signed off on a reduction of diplomatic security forces suggesting that this reduction of security was, in large part, to blame for the attack in Benghazi on September 11, 2012.  The report emphasizes that this is "inconsistent" with her sworn testimony of January 23, 2013. Simply stated, Hillary Rod
1 - 20 of 238 Next › Last »
Showing 20 items per page