Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged grand-jury

Rss Feed Group items tagged

Gary Edwards

Obama gives himself control of all communication systems in America - RT - 0 views

  •  
    Awful stuff.  Another Obama executive order suspending the Constitution and terminating the Bill of Rights. Revoking the right of habeas corpus is unconstitutional. So is declaring a national emergency without congressional approval. The Constitution declares, "The Privilege of the Writ of Habeas Corpus shall not be suspended, unless when in cases of rebellion or invasion the public safety may require it." While Congress has passed many an unConstitutional Law regarding "National Emergency Powers", there is nothing in the Constitution granting any branch of the Federal government to tear up the Constitution and Bill of Rights.  Atrocities like FiSA, The Military Commissions Act, NSP51, HSPD20, the John Warner Defense Authorization Act, the National Emergencies Act, and the Patriot Act are un Constitutional to the core.   Only the American people, through their representatives in Congress, can declare a national emergency.  With the exception of the habeas corpus clause, the Constitution makes no allowance for the suspension of any of its provisions during a national emergency.  Many statist seeking to breach the Constitution and Bill of Rights argue that the granting of emergency powers by Congress is implicit in its Article I, section 8 authority to "provide for the common Defense and general Welfare," the commerce clause, its war, armed forces, and militia powers, and the "necessary and proper" clause empowering it to make such laws as are required to fulfill the executions of "the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." But this issue of "implied" powers defies an actual reading of the Constitution, and seeks to breach the meaning of that most basic of all Madisonian  Constitutional concepts embedded into the framework of limited government: "enumerated powers".  The United States is a government of enumerated powers.  N
Gary Edwards

Clinton Articles of Impeachment - Senate Votes - 1 views

  •  
    "Article One: In his conduct while President of the United States, William Jefferson Clinton, in violation of his constitutional oath faithfully to execute the office of President of the United States and, to the best of his ability, preserve, protect, and defend the Constitution of the United States, and in violation of his constitutional duty to take care that the laws be faithfully executed, has willfully corrupted and manipulated the judicial process of the United States for his personal gain and exoneration, impeding the administra tion of justice, in that: On August 17, 1998, William Jefferson Clinton swore to tell the truth, the whole truth, and nothing but the truth before a Federal grand jury of the United States. Contrary to that oath, William Jefferson Clinton willfully provided perjurious, false and misleading testimony to the grand jury concerning one or more of the following: (1) the nature and details of his relationship with a subordinate Government employee; (2) prior perjurious, false and misleading testimony he gave in a Federal civil rights action brought against him; (3) prior false and misleading statements he allowed his attorney to make to a Federal judge in that civil rights action; and (4) his corrupt efforts to influence the testimony of witnesses and to impede the discovery of evidence in that civil rights action. In doing this, William Jefferson Clinton has undermined the integrity of his office, has brought disrepute on the Presidency, has betrayed his trust as President, and has acted in a manner subversive of the rule of law and justice, to the manifest injury of the people of the United States. Wherefore, William Jefferson Clinton, by such conduct, warrants impeachment and trial, and removal from office and disqualification to hold and enjoy any office of honor, trust or profit under the United States. Article Two: Obstruction of Justice .. In his conduct while President of the United States, William Jefferson Clinton, in viola
Gary Edwards

Public unions thrive at taxpayer expense - 1 views

  •  
    The bottom line is that the public unions continue to increase their wages and benefits, inspite of the economic free fall the economy is in, because they ruthlessly use members dues for lobbying and bargaining with politicians who are paying them with "other people's money". CC provides some interesting diagrams describing how the scam works, and, he does point to two solutions being tested in Wisconsin and Indiana. In Wisconsin, gov Walker is trying to end public sector "collective bargaining". While Gov Daniels in Indiana has successfully ended the the requirement that the State deduct union workers membership dues from their pay checks. When given the chance to choose, most union workers chose NOT to pay those dues. The Daniels method seems to be working very well, and is based on an easy to understand Constitutional principle; money earned is personal property, and the individual should have the right to chose what happens to their property. There are some other things that might be tried, although i think the Daniels principle should be an automatic first step taxpayers take to restore Constitutional Rule of Law. .... Break strike threat with non union replacements President Reagan was tested by the public sector unions when they threatened a strike by the thought to be essential and irreplaceable Air Controllers union. Reagan called them on it, and brought in non union replacements to break the strike. Painful, but it worked. ..... Privatization The most basic and Constitutional response is to privatize the service, and turn it over to the open market of competitive contract bids. Works every time, but the awarding of contracts has it's own level of political corruption and influence peddling. Personally i would prefer a grand jury approach to oversight problem involved in the awarding of contracts. Citizens need to be pressed into the task of backstopping political corruption. Any connection of cross channeling of people or t
Paul Merrell

Julian Assange unlikely to face U.S. charges over publishing classified documents - The... - 0 views

  • The Justice Department has all but concluded it will not bring charges against WikiLeaks founder Julian Assange for publishing classified documents because government lawyers said they could not do so without also prosecuting U.S. news organizations and journalists, according to U.S. officials. The officials stressed that a formal decision has not been made, and a grand jury investigating WikiLeaks remains impaneled, but they said there is little possibility of bringing a case against Assange, unless he is implicated in criminal activity other than releasing online top-secret military and diplomatic documents.
  • Justice officials said they looked hard at Assange but realized that they have what they described as a “New York Times problem.” If the Justice Department indicted Assange, it would also have to prosecute the New York Times and other news organizations and writers who published classified material, including The Washington Post and Britain’s Guardian newspaper, according to the officials, who spoke on the condition of anonymity to discuss internal deliberations.
  • “We have repeatedly asked the Department of Justice to tell us what the status of the investigation was with respect to Mr. Assange,” said Barry J. Pollack, a Washington attorney for Assange. “They have declined to do so. They have not informed us in any way that they are closing the investigation or have made a decision not to bring charges against Mr. Assange. While we would certainly welcome that development, it should not have taken the Department of Justice several years to come to the conclusion that it should not be investigating journalists for publishing truthful information.”
  • ...1 more annotation...
  • There have been persistent rumors that the grand jury investigation of Assange and WikiLeaks had secretly led to charges. Officials told The Post last week that there was no sealed indictment, and other officials have since come forward to say, as one senior U.S. official put it, that the department has “all but concluded” that it will not bring a case against Assange.
Paul Merrell

Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer - The Intercept - 0 views

  • The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks. Newly unsealed court documents obtained by The Intercept reveal the Justice Department won an order forcing Google to turn over more than one year’s worth of data from the Gmail account of Jacob Appelbaum (pictured above), a developer for the Tor online anonymity project who has worked with WikiLeaks as a volunteer. The order also gagged Google, preventing it from notifying Appelbaum that his records had been provided to the government. The surveillance of Appelbaum’s Gmail account was tied to the Justice Department’s long-running criminal investigation of WikiLeaks, which began in 2010 following the transparency group’s publication of a large cache of U.S. government diplomatic cables. According to the unsealed documents, the Justice Department first sought details from Google about a Gmail account operated by Appelbaum in January 2011, triggering a three-month dispute between the government and the tech giant. Government investigators demanded metadata records from the account showing email addresses of those with whom Appelbaum had corresponded between the period of November 2009 and early 2011; they also wanted to obtain information showing the unique IP addresses of the computers he had used to log in to the account.
  • The Justice Department argued in the case that Appelbaum had “no reasonable expectation of privacy” over his email records under the Fourth Amendment, which protects against unreasonable searches and seizures. Rather than seeking a search warrant that would require it to show probable cause that he had committed a crime, the government instead sought and received an order to obtain the data under a lesser standard, requiring only “reasonable grounds” to believe that the records were “relevant and material” to an ongoing criminal investigation. Google repeatedly attempted to challenge the demand, and wanted to immediately notify Appelbaum that his records were being sought so he could have an opportunity to launch his own legal defense. Attorneys for the tech giant argued in a series of court filings that the government’s case raised “serious First Amendment concerns.” They noted that Appelbaum’s records “may implicate journalistic and academic freedom” because they could “reveal confidential sources or information about WikiLeaks’ purported journalistic or academic activities.” However, the Justice Department asserted that “journalists have no special privilege to resist compelled disclosure of their records, absent evidence that the government is acting in bad faith,” and refused to concede Appelbaum was in fact a journalist. It claimed it had acted in “good faith throughout this criminal investigation, and there is no evidence that either the investigation or the order is intended to harass the … subscriber or anyone else.” Google’s attempts to fight the surveillance gag order angered the government, with the Justice Department stating that the company’s “resistance to providing the records” had “frustrated the government’s ability to efficiently conduct a lawful criminal investigation.”
  • The Justice Department wanted to keep the surveillance secret largely because of an earlier public backlash over its WikiLeaks investigation. In January 2011, Appelbaum and other WikiLeaks volunteers’ – including Icelandic parlimentarian Birgitta Jonsdottir – were notified by Twitter that the Justice Department had obtained data about their accounts. This disclosure generated widepread news coverage and controversy; the government says in the unsealed court records that it “failed to anticipate the degree of  damage that would be caused” by the Twitter disclosure and did not want to “exacerbate this problem” when it went after Appelbaum’s Gmail data. The court documents show the Justice Department said the disclosure of its Twitter data grab “seriously jeopardized the [WikiLeaks] investigation” because it resulted in efforts to “conceal evidence” and put public pressure on other companies to resist similar surveillance orders. It also claimed that officials named in the subpeona ordering Twitter to turn over information were “harassed” after a copy was published by Intercept co-founder Glenn Greenwald at Salon in 2011. (The only specific evidence of the alleged harassment cited by the government is an email that was sent to an employee of the U.S. Attorney’s office that purportedly said: “You guys are fucking nazis trying to controll [sic] the whole fucking world. Well guess what. WE DO NOT FORGIVE. WE DO NOT FORGET. EXPECT US.”)
  • ...4 more annotations...
  • Google accused the government of hyperbole and argued that the backlash over the Twitter order did not justify secrecy related to the Gmail surveillance. “Rather than demonstrating how unsealing the order will harm its well-publicized investigation, the government lists a parade of horribles that have allegedly occurred since it unsealed the Twitter order, yet fails to establish how any of these developments could be further exacerbated by unsealing this order,” wrote Google’s attorneys. “The proverbial toothpaste is out of the tube, and continuing to seal a materially identical order will not change it.” But Google’s attempt to overturn the gag order was denied by magistrate judge Ivan D. Davis in February 2011. The company launched an appeal against that decision, but this too was rebuffed, in March 2011, by District Court judge Thomas Selby Ellis, III.
  • The government agreed to unseal some of the court records on Apr. 1 this year, and they were apparently turned over to Appelbaum on May 14 through a notification sent to his Gmail account. The files were released on condition that they would contain some redactions, which are bizarre and inconsistent, in some cases censoring the name of “WikiLeaks” from cited public news reports. Not all of the documents in the case – such as the original surveillance orders contested by Google – were released as part of the latest disclosure. Some contain “specific and sensitive details of the investigation” and “remain properly sealed while the grand jury investigation continues,” according to the court records from April this year. Appelbaum, an American citizen who is based in Berlin, called the case “a travesty that continues at a slow pace” and said he felt it was important to highlight “the absolute madness in these documents.”
  • He told The Intercept: “After five years, receiving such legal documents is neither a shock nor a needed confirmation. … Will we ever see the full documents about our respective cases? Will we even learn the names of those signing so-called legal orders against us in secret sealed documents? Certainly not in a timely manner and certainly not in a transparent, just manner.” The 32-year-old, who has recently collaborated with Intercept co-founder Laura Poitras to report revelations about National Security Agency surveillance for German news magazine Der Spiegel, said he plans to remain in Germany “in exile, rather than returning to the U.S. to experience more harassment of a less than legal kind.”
  • “My presence in Berlin ensures that the cost of physically harassing me or politically harassing me is much higher than when I last lived on U.S. soil,” Appelbaum said. “This allows me to work as a journalist freely from daily U.S. government interference. It also ensures that any further attempts to continue this will be forced into the open through [a Mutal Legal Assistance Treaty] and other international processes. The German goverment is less likely to allow the FBI to behave in Germany as they do on U.S. soil.” The Justice Department’s WikiLeaks investigaton is headed by prosecutors in the Eastern District of Virginia. Since 2010, the secretive probe has seen activists affiliated with WikiLeaks compelled to appear before a grand jury and the FBI attempting to infiltrate the group with an informant. Earlier this year, it was revealed that the government had obtained the contents of three core WikiLeaks staffers’ Gmail accounts as part of the investigation.
Paul Merrell

FBI Agents: Comey 'Stood In The Way' Of Clinton Investigation | The Daily Caller - 0 views

  • FBI agents say the bureau is alarmed over Director James Comey deciding not to suggest that the Justice Department prosecute Hillary Clinton over her mishandling of classified information. According to an interview transcript given to The Daily Caller, provided by an intermediary who spoke to two federal agents with the bureau last Friday, agents are frustrated by Comey’s leadership.
  • “This is a textbook case where a grand jury should have convened but was not. That is appalling,” an FBI special agent who has worked public corruption and criminal cases said of the decision. “We talk about it in the office and don’t know how Comey can keep going.” The agent was also surprised that the bureau did not bother to search Clinton’s house during the investigation. “We didn’t search their house. We always search the house. The search should not just have been for private electronics, which contained classified material, but even for printouts of such material,” he said. “There should have been a complete search of their residence,” the agent pointed out. “That the FBI did not seize devices is unbelievable. The FBI even seizes devices that have been set on fire.” Another special agent for the bureau that worked counter-terrorism and criminal cases said he is offended by Comey’s saying: “we” and “I’ve been an investigator.”
  • After graduating from law school, Comey became a law clerk to a U.S. District Judge in Manhattan and later became an associate in a law firm in the city. After becoming a U.S. Attorney in the Southern District of New York, Comey’s career moved through the U.S. Attorney’s Office until he became Deputy Attorney General during the George W. Bush administration. After Bush left office, Comey entered the private sector and became general counsel and Senior Vice President for Lockheed Martin, among other private sector posts. President Barack Obama appointed him to FBI director in 2013 replacing out going-director Robert Mueller. “Comey was never an investigator or special agent. The special agents are trained investigators and they are insulted that Comey included them in ‘collective we’ statements in his testimony to imply that the SAs agreed that there was nothing there to prosecute,” the second agent said. “All the trained investigators agree that there is a lot to prosecuted but he stood in the way.” He added, “The idea that [the Clinton/e-mail case] didn’t go to a grand jury is ridiculous.” According to Washington D.C. attorney Joe DiGenova, more FBI agents will be talking about the problems at bureau and specifically the handling of the Clinton case by Comey when Congress comes back into session and decides to force them to testify by subpoena.
  • ...1 more annotation...
  • DiGenova told WMAL radio’s Drive at Five last week, “People are starting to talk. They’re calling their former friends outside the bureau asking for help. We were asked to day to provide legal representation to people inside the bureau and agreed to do so and to former agents who want to come forward and talk. Comey thought this was going to go away.” He explained, “It’s not. People inside the bureau are furious. They are embarrassed. They feel like they are being led by a hack but more than that that they think he’s a crook. They think he’s fundamentally dishonest. They have no confidence in him. The bureau inside right now is a mess.” He added, “The most important thing of all is that the agents have decided that they are going to talk.”
  •  
    Looks very much as if the Clintons' problems with the FBI are not over, notwithstanding their election defeat. This is a must-read.
Paul Merrell

Julian Assange to be questioned inside embassy as Ecuador agrees to set date | Media | ... - 0 views

  • Julian Assange will be questioned by Swedish prosecutors inside the Ecuadorian embassy in London, in a possible breakthrough to end the impasse over his case. The Ecuadorian attorney general delivered a document agreeing to a request by the Swedish prosecutor to question the founder of WikiLeaks. He is wanted for questioning over a rape allegation, which he denies. If he goes to Sweden he believes he will be taken to the US because of the activities of WikiLeaks. Assange has been living inside the embassy for more than four years and has been granted political asylum by Ecuador.
  • He has offered to be questioned inside the embassy but Swedish prosecutors have only recently agreed. A statement issued in Ecuador said: “In the coming weeks a date will be established for the proceedings to be held at the embassy of Ecuador in the United Kingdom.
  • The statement said the proceedings did not affect the recent opinion of the Working Group on Arbitrary Detentions of the United Nations, which found that Assange was being arbitrarily detained. The working group called for Assange to be released and given compensation for violation of his rights. The Ecuador statement added: “Ecuador’s foreign ministry reiterates its commitment to the asylum granted to Julian Assange in August 2012, and reaffirms that the protection afforded by the Ecuadorian state shall continue while the circumstances persist that led to the granting of asylum, namely fears of political persecution.”
  •  
    Assange justifiably fears that if he submits to extradition to Sweden, that nation would in turn hand him over to the U.S. for prosecution under the Espionage Act. It is known that a grand jury handed down indictments in the case involving a leak of massive numbers of State Department cables by Chelsea (formerly Bradley) Manning. Wikileaks received and published those documents. Soon after, a prosecutor in Sweden began a rape investigation, despite both women involved saying that they were not raped. No rape charges have actually been filed. The British courts later granted Sweden's extradition request, despite there being no charges pending, at which point Assange was granted asylum by Ecuador and has been effectively imprisoned in that nation's London embassy ever since.
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Paul Merrell

Michael Hayden talks to CNN about XKEYSCORE program. - 0 views

  • Does the NSA really operate a vast database that allows its analysts to sift through millions of records showing nearly everything a user does on the Internet, as was recently reported? Yes, and people should stop worrying and learn to love it, according former NSA chief Gen. Michael Hayden. Last week, the Guardian published a series of leaked documents revealing new details about an NSA surveillance program called XKEYSCORE. The newspaper said that the program enabled the agency to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals,” and secret slides dated 2008 showed how people could be deemed a target for searching the Web for “suspicious stuff” or by using encryption. Following the disclosures, Hayden appeared on CNN to discuss the agency’s surveillance programs. The general, who directed the NSA from 1999 through 2005, was remarkably candid in his responses to Erin Burnett’s questions about the Guardian’s XKEYSCORE report. Was there any truth to claims that the NSA is sifting through millions of browsing histories and able to collect virtually everything users do on the Internet? “Yeah,” Hayden said. “And it's really good news.”
  • Not only that, Hayden went further. He revealed that the XKEYSCORE was “a tool that's been developed over the years, and lord knows we were trying to develop similar tools when I was at the National Security Agency.” The XKEYSCORE system, Hayden said, allows analysts to enter a “straight-forward question” into a computer and sift through the “oceans of data” that have been collected as part of foreign intelligence gathering efforts. How this process works was illustrated in the Guardian’s report. Analysts can enter search terms to sift through data and select from a drop-down menu a target’s “foreignness factor,” which is intended to minimize the warrantless surveillance of Americans. However, operating a vast electronic dragnet such as this is far from an exact science, and the NSA’s system of sifting data from the backbone of international Internet networks likely sometimes involves gobbling up information on Americans’ communications and online activity—whether it is done wittingly or not. Indeed, the NSA reportedly only needs to have 51 percent certainty that it is targeting a foreigner. And as leaked secret rules for the surveillance have shown, even if the NSA does “inadvertently” gather Americans’ communications, it can hold on to them if they are deemed valuable for vague “foreign intelligence” purposes or if the communications show evidence of a crime that has occurred or may occur in the future.
  • In the CNN interview, Hayden described XKEYSCORE as “really quite an achievement” and said that it enabled NSA spies to find the needle in the haystack. But his ardent defense of the system is unlikely to reassure civil liberties advocates. Having Hayden’s support is a rather dubious stamp of approval, particularly because he was responsible for leading the NSA’s illegal warrantless wiretapping program, which was initiated post-9/11 and exposed by the New York Times in 2005. Hayden later went on to lead the CIA from 2006 through 2009, where he oversaw the use of the waterboarding torture technique and the operation of a controversial black-site prison program that was eventually dismantled by President Obama. The former NSA chief retired in 2009, but he has since become a regular media commentator, using a recent column at CNN to blast Snowden for leaking the secret NSA documents and implying that he’d like to see the Guardian journalist Glenn Greenwald prosecuted as a “co-conspirator” for his role reporting the surveillance scoops.
  •  
    Let's see, the entire U.S. military has been forbidden from reading The Guardian because the documents Edward Snowden leaked are still classified. But a former NSA chief can confirm their accuracy on CNN?  Surely, even as I write a grand jury is busy indicting him on Espionage Act charges? No? Smells like hypocrisy to me. 
Paul Merrell

FBI Now Holding Up Michael Horowitz' Investigation into the DEA | emptywheel - 0 views

  • Man, at some point Congress is going to have to declare the FBI legally contemptuous and throw them in jail. They continue to refuse to cooperate with DOJ’s Inspector General, as they have been for basically 5 years. But in Michael Horowitz’ latest complaint to Congress, he adds a new spin: FBI is not only obstructing his investigation of the FBI’s management impaired surveillance, now FBI is obstructing his investigation of DEA’s management impaired surveillance. I first reported on DOJ IG’s investigation into DEA’s dragnet databases last April. At that point, the only dragnet we knew about was Hemisphere, which DEA uses to obtain years of phone records as well as location data and other details, before it them parallel constructs that data out of a defendant’s reach.
  • But since then, we’ve learned of what the government claims to be another database — that used to identify Shantia Hassanshahi in an Iranian sanctions case. After some delay, the government revealed that this was another dragnet, including just international calls. It claims that this database was suspended in September 2013 (around the time Hemisphere became public) and that it is no longer obtaining bulk records for it. According to the latest installment of Michael Horowitz’ complaints about FBI obstruction, he tried to obtain records on the DEA databases on November 20, 2014 (of note, during the period when the government was still refusing to tell even Judge Rudolph Contreras what the database implicating Hassanshahi was). FBI slow-walked production, but promised to provide everything to Horowitz by February 13, 2015. FBI has decided it has to keep reviewing the emails in question to see if there is grand jury, Title III electronic surveillance, and Fair Credit Reporting Act materials, which are the same categories of stuff FBI has refused in the past. So Horowitz is pointing to the language tied to DOJ’s appropriations for FY 2015 which (basically) defunded FBI obstruction. Only FBI continues to obstruct.
  • There’s one more question about this. As noted, this investigation is supposed to be about DEA’s databases. We’ve already seen that FBI uses Hemisphere (when I asked FBI for comment in advance of this February 4, 2014 article on FBI obstinance, Hemisphere was the one thing they refused all comment on). And obviously, FBI access another DEA database to go after Hassanshahi. So that may be the only reason why Horowitz needs the FBI’s cooperation to investigate the DEA’s dragnets. Plus, assuming FBI is parallel constructing these dragnets just like DEA is, I can understand why they’d want to withhold grand jury information, which would make that clear. Still, I can’t help but wonder — as I have in the past — whether these dragnets are all connected, a constantly moving shell game. That might explain why FBI is so intent on obstructing Horowitz again.
  •  
    Marcy Wheeler's specuiulation that various government databases simply move to another agency when they're brought to light is not without precedent. When Congress shut down DARPA's Total Information Awareness program, most of its software programs and databases were just moved to NSA. 
Paul Merrell

Weekly Update: JW Sues for Unmasking Targeting Trump Team - 0 views

  • Much Needed New Scrutiny of the Clinton Foundation   Will there ever be a serious investigation and prosecution of the Clinton cash machine? Maybe. Micah Morrison, our chief investigative reporter, has an important update in his latest Investigative Bulletin:   Rumors have been floating up from Little Rock for months now of a new investigation into the Clinton Foundation. John Solomon advanced the story recently in a January report for The Hill. FBI agents in the Arkansas capital, he wrote, “have taken the lead” in a new Justice Department inquiry “into whether the Clinton Foundation engaged in any pay-to-play politics or other illegal activities while Hillary Clinton served as secretary of state.” Solomon reports that the probe “may also examine whether any tax-exempt assets were converted for personal or political use and whether the foundation complied with applicable tax laws.”   Main Justice also is “re-examining whether there are any unresolved issues from the closed case into Clinton’s transmission of classified information through her personal email server,” Solomon notes.   Solomon is not alone. The Wall Street Journal is tracking the story. And earlier this month, investigative journalist Peter Schweizer cryptically told SiriusXM radio that federal authorities should “convene a grand jury” in Little Rock “and let the American people look at the evidence” about the Clinton Foundation.   Judicial Watch continues to turn up new evidence of Clinton pay-to-play and mishandling of classified information. In recent months, through FOIA litigation, Judicial Watch has forced the release of more than 2,600 emails and documents from Mrs. Clinton and her associates, with more to come. The emails include evidence of Clinton Foundation donors such XL Keystone lobbyist Gordon Griffin, futures brokerage firm CME Group chairman Terrence Duffy, and an associate of Shangri La Entertainment mogul Steve Bing seeking special favors from the State Department. Read more about Judicial Watch’s pay-to-play disclosures here.   Judicial Watch also revealed many previously unreported incidents of mishandling of classified information. Mrs. Clinton and her former State Department deputy chief of staff, Huma Abedin, sent and received classified information through unsecure channels. The emails and documents involved sensitive information about President Obama, the Middle East, Africa, Afghanistan, Mexico, Burma, India, intelligence-related operations and world leaders. For documents and details from Judicial Watch on the mishandling of classified information, see here, here, here and here.   Smelling a rat in Arkansas when it comes to the Clintons of course is nothing new, and the former First Couple are masters of the gray areas around pay-to-play. But mishandling of classified information is a serious matter. And the tax angle is intriguing, even if you’re not Al Capone. The tenacious financial expert Charles Ortel, who has been digging deep into Clinton finances for years, told us back in 2015 that there are “epic problems” with the entire Clinton Foundation edifice, which traces its origins back to Arkansas. He noted that independent accounting firms may have been “duped by false and materially misleading representations” made by Clinton charitable entities. Down in Arkansas, law enforcement may be finally catching up with Ortel’s insights.
Paul Merrell

C.I.A. Officer Is Found Guilty in Leak Tied to Times Reporter - NYTimes.com - 0 views

  • Jeffrey A. Sterling, a former Central Intelligence Agency officer, was convicted of espionage Monday on charges that he told a reporter for The New York Times about a secret operation to disrupt Iran’s nuclear program.The conviction is a significant victory for the Obama administration, which has conducted an unprecedented crackdown on officials who speak to journalists about security matters without the administration’s approval. Prosecutors prevailed after a yearslong fight in which the reporter, James Risen, refused to identify his sources.
  • On the third day of deliberations, the jury in federal court in Alexandria, Va., convicted Mr. Sterling on nine felony counts. Mr. Sterling, who worked for the C.I.A. from 1993 to 2002 and now lives in O’Fallon, Mo., faces a maximum possible sentence of decades in prison, though the actual sentence is likely to be far shorter. Judge Leonie M. Brinkema of Federal District Court, who presided over the weeklong trial, allowed Mr. Sterling to remain free on bond and set sentencing for April 24.
  • The Justice Department had no direct proof that Mr. Sterling, who managed the Iranian operation, provided the information to Mr. Risen, but prosecutors stitched together a strong circumstantial case.
  • ...3 more annotations...
  • The trial was part Washington spectacle, part cloak and dagger. Former Secretary of State Condoleezza Rice testified, as did C.I.A. operatives who gave only their first names and last initials, with their faces shielded behind seven-foot-high partitions. A scientist was referred to only by his code name, Merlin. His wife was Mrs. Merlin.Officials revealed their preferred strategies for persuading reporters not to run sensitive stories. Jurors learned that, at the C.I.A.’s office in New York, employees could easily walk out with classified documents and never be searched.
  • Mr. Sterling is the latest in a string of former officials and contractors the Obama administration has charged with discussing national security matters with reporters. Under all previous presidents combined, three people had faced such prosecutions. Under President Obama, there have been eight cases, and journalists have complained that the crackdown has discouraged officials from discussing even unclassified security matters.
  • While the administration has defended the crackdown, Mr. Holder said he believed it went too far at times when it targeted journalists. Under Mr. Holder, prosecutors seized phone records from The Associated Press, labeled one Fox News reporter a potential criminal co-conspirator for inquiring about classified information and tried to force another to testify before a grand jury.
  •  
    "Mr. Holder said he believed it went too far at times when it targeted journalists." What Attorney-General Holder actually meant was that he believed it went too far at times when it targeted journalists *who work for major publishers."* Mr. Holder has allowed prosecutions of journalists who do not work for major publishing firms to proceed, e.g., Barrett Brown. 
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

FBI sharply increases use of Patriot Act provision to collect US citizens' records - Op... - 0 views

  • The FBI has dramatically increased its use of a controversial provision of the Patriot Act to secretly obtain a vast store of business records of U.S. citizens under President Barack Obama, according to recent Justice Department reports to Congress. The bureau filed 212 requests for such data to a national security court last year – a 1,000-percent increase from the number of such requests four years earlier, the reports show. Follow @openchannelblog The FBI’s increased use of the Patriot Act’s “business records” provision — and the wide ranging scope of its requests -- is getting new scrutiny in light of last week’s disclosure that that the provision was used to obtain a top-secret national security order requiring telecommunications companies to turn over records of millions of telephone calls. Advertise | AdChoices Taken together, experts say, those revelations show the government has broadly interpreted the Patriot Act provision as enabling it to collect data not just on specific individuals, but on millions of Americans with no suspected terrorist connections. And it shows that the Foreign Intelligence Surveillance Court  accepted that broad interpretation of the law.
  • “That they were using this (provision) to do mass collection of data is definitely the biggest surprise,” said Robert Chesney, a top national security lawyer at the University of Texas Law School. “Most people who followed this closely were not aware they were doing this.  We’ve gone from producing records for a particular investigation to the production of all records for a massive pre-collection database. It’s incredibly sweeping.”  
  • But little-noticed statements by FBI Director Robert Mueller in recent years – as well as interviews with former senior law enforcement officials – hint at what Chesney calls a largely unnoticed “sea change” in the way the U.S. government collects data for terrorism and other national security investigations.
  • ...5 more annotations...
  • The Patriot Act provision, known as Section 215, allows the FBI to require the production of business records and any other “tangible things” -- including “books, records, papers, documents and other items,” for an authorized terrorism or foreign intelligence investigation. The Patriot Act was a broad expansion of law enforcement powers enacted by Congress with overwhelming bipartisan support in the aftermath of the Sept. 11, 2001, terrorist attacks. In addition to Section 215, other provisions expanded the FBI’s power to issue so-called “national security letters,” requiring individuals and business to turn over a more limited set of records without any court order at all.  Advertise | AdChoices In contrast to standard grand jury subpoenas, material obtained under both Section 215 orders and national security letters must be turned over under so-called “gag orders” that forbid the business or institution that receives the order from notifying its customers or publicly referring to the matter.
  • Saying they wanted to put an end to “secret law,  eight U.S. senators — led by Sens. Jeff Merkley, D-Ore., and Mike Lee, R-Utah — on Tuesday introduced a bill to require the Justice Department to declassify national security court decisions that have permitted the use of the “business records” provision for such purposes.
  • In 2010, the number of requests jumped to 205 (all again granted, with 176 modified.) In the latest report filed on April 30, the department reported there had been 212 such requests in 2012 – all approved by the court, but 200 of them modified.These sharp increase in the use of Section 215 has drawn little attention until now because the number of national security letters (NSLs) issued by the bureau has been so much greater -- 15,229 in 2012. But FBI Director Mueller, in little-noticed written responses to Congress two years ago, explained that the bureau was encountering resistance from telecommunications companies in turning over “electronic communication transaction” records in response to national security letters.“Beginning in late 2009, certain electronic communications service providers no longer honored NSLs to obtain” records because of what their lawyers cited as “an ambiguity” in the law. (What Mueller didn’t say was this came at a time when all the major telecommunications companies were still facing lawsuits over their cooperation with the government on surveillance programs.) As a result, Mueller said, the FBI had switched over to demanding the same data under Section 215. “This change accounts for a significant increase in the volume of business records requests,” Mueller wrote.
  • From the earliest days of the Patriot Act, Section 215 was among the most hotly disputed of its provisions. Critics charged the language – “tangible things” -- was so broad that it would even permit the FBI to obtain library and bookstore records to inspect what citizens were reading.Ashcroft confronted criticismLargely to tamp down those concerns, then-Attorney General John Ashcroft declassified information about the FBI’s use of the provision in September 2003, saying in a statement that “the number of times Section 215 has been used to date is zero.” Ashcroft added that he was releasing the information “to counter the troubling amount of public distortion and misinformation” about Section 215. But in the years since, the FBI’s use of Section 215 quietly exploded, with virtually no public notice or debate. In 2009, as part of an annual report to Congress, the Justice Department reported there had been 21 applications for business records to the Foreign Intelligence Surveillance Court (FISC) under Section 215 – all of which were granted, though nine were modified by the court. (The reports do not explain how or why the orders were modified.) 
  • The motion also asks the court to consider the constitutionality of the “gag order” written into Section 215.“There should be no room for secret law,” said Jameel Jaffer, the ACLU’s deputy legal director, adding that disclosure of the FISC rulings is essential if the debate Obama called for is to take place. “The public has a right to know what limits apply to the government’s surveillance authority, and what safeguards are in place to protect individual privacy.” 
Gary Edwards

"High Crimes and Misdemeanors" - Tea Party Command Center - 0 views

  • high crimes and misdemeanors”
  • Officials accused of “high crimes and misdemeanors” were accused of offenses as varied as misappropriating government funds, appointing unfit subordinates, not prosecuting cases, not spending money allocated by Parliament, promoting themselves ahead of more deserving candidates, threatening a grand jury, disobeying an order from Parliament, arresting a man to keep him from running for Parliament, losing a ship by neglecting to moor it, helping “suppress petitions to the King to call a Parliament,” granting warrants without cause, and bribery. Some of these charges were crimes. Others were not. The one common denominator in all these accusations was that the official had somehow abused the power of his office and was unfit to serve.
  • Patriots plan for resisting the Globalist agenda: Develop Secure Community Co-ops (Interactive Neighborhood Watch on steroids).  Groups should be from about 5 to 15 people in the same general area, neighborhood.  All members should be conservative/responsible adults.Members should work at fortifying local, county and state govts. as well as joining Shrf. Reserve Forces (as long as the shrf. is an oathkeeper), Constitutional Sheriffs Assoc./ USCDA, State Militias, Constitutional Militias, etc.  Also,  should be involved in TP, 9-12, John Birch Soc., etc.SCC's should have a liason with other like-minded grps. in order to give/obtain support when needed.The states should and hopefully will be the first line of defense against an overreaching tyrannical govt.(Don't count on it if you are living in a Blue State)  Next, it would fall on the counties and local communities, working in concert with the various State Militia units, Co. Shrfs' Depts., Constitutional and SCC elements.  After that,  if needed,  Bug Out procedures should be implemented.  Hopefully, to safe areas.
  • ...3 more annotations...
  • The Constitution defines treason in Article 3, Section 3, Clause 1: Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.
  • In all the articles of impeachment that the House has drawn, no official has been charged with treason
  • What are “high crimes and misdemeanors”?
  •  
    "The U.S. Constitution provides impeachment as the method for removing the president, vice president, federal judges, and other federal officials from office. The impeachment process begins in the House of Representatives and follows these steps: The House Judiciary Committee holds hearings and, if necessary, prepares articles of impeachment. These are the charges against the official. If a majority of the committee votes to approve the articles, the whole House debates and votes on them. If a majority of the House votes to impeach the official on any article, then the official must then stand trial in the Senate. For the official to be removed from office, two-thirds of the Senate must vote to convict the official. Upon conviction, the official is automatically removed from office and, if the Senate so decides, may be forbidden from holding governmental office again. The impeachment process is political in nature, not criminal. Congress has no power to impose criminal penalties on impeached officials. But criminal courts may try and punish officials if they have committed crimes. The Constitution sets specific grounds for impeachment. They are "treason, bribery, and other high crimes and misdemeanors." To be impeached and removed from office, the House and Senate must find that the official committed one of these acts. The Constitution defines treason in Article 3, Section 3, Clause 1: Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court."
Paul Merrell

Lifting the 24 Hour Siege: Julian Assange, London's Metropolitan Police and Continued D... - 0 views

  • While things tend to get murky, sometimes by design, regarding the police presence outside the Ecuadorean embassy in London, the announcement that the city’s Metropolitan Police would be lifting their twenty-four hour surveillance did surprise some. This was hardly to suggest that the police forces had lost interest in capturing Julian Assange.  What mattered here was that the costs in guarding Assange from a literal flight of fancy had simply become disproportionate, requiring a change of tact.  Over £12m in costs had been incurred since he skipped bail to avoid his Swedish sojourn, and irrespective of which side of the Assange side one was on, anger was mounting at a very conspicuously bloated project. The statement from the Metropolitan Police was cool in its language.  “Like all public services, MPS resources are finite.  With so many different criminal, and other, threats to the city it protects, the current deployment of officers is no longer believed proportionate” (The Guardian, Oct 12). The siege, according to WikiLeaks spokesman Kristinn Hrafnsson, had not been lifted so much as reconstituted.  “My interpretation is that it has not been lifted. They are calling off the uniformed presence but escalating the covert operation and will arrest him if he steps outside off the embassy.”  Costs, in other words, were going to be moved off the books to un-uniformed personnel.
  • Having been granted political asylum for fears that he might be carted off to the US via Sweden to face the findings of an empanelled grand jury, he remains confined to the cramped quarters of the embassy.  Nor can he rely on new laws in the form of the Anti Social Behaviour, Crime and Policing Act 2014 that make an “accusation” – in this case, claims of sexual assault on two Swedish nationals in Sweden – insufficient to require extradition.  As the laws were passed after the fact, precisely motivated by the Assange imbroglio, the foreign and commonwealth office has deemed it inapplicable retrospectively.  Assange, as ever, continues to be the legal exception, a singular target of juridical manipulation. In the meantime, the UN working group on arbitrary detention (WGAD) has been considering Assange’s case, and it likely to find in his favour given its previous rulings of a deprivation of liberty when a person is forced to choose between confinement or the forfeiture of a fundamental right such as asylum.[1] It is also a principle that holds for the European Court of Human Rights and the UN High Commissioner for Refugees (UNHCR).  The latter defines detention as confinement “within a narrowly bounded or restricted location, including prisons, closed camps, detention facilities or airport transit zones, where freedom of movement is substantially curtailed, and where the only opportunity to leave this limited area is to leave the territory.”
  • [2] Submission to the Working Group on Arbitrary Detention by Mr. Julian Assange, available at: https://justice4assange.com/IMG/pdf/assange-wgad.pdf
Paul Merrell

Clintons Are Under Multiple FBI Investigations as Agents Are Stymied - 0 views

  • Current and former FBI officials have launched a media counter-offensive to engage head to head with the Clinton media machine and to throw off the shackles the Loretta Lynch Justice Department has used to stymie their multiple investigations into the Clinton pay-to-play network. Over the past weekend, former FBI Assistant Director and current CNN Senior Law Enforcement Analyst Tom Fuentes told viewers that “the FBI has an intensive investigation ongoing into the Clinton Foundation.” He said he had received this information from “senior officials” at the FBI, “several of them, in and out of the Bureau.” (See video clip from CNN below.) That information was further supported by an in-depth article last evening in the Wall Street Journal by Devlin Barrett. According to Barrett, the “probe of the foundation began more than a year ago to determine whether financial crimes or influence peddling occurred related to the charity.” Barrett’s article suggests that the Justice Department, which oversees the FBI, has attempted to circumvent the investigation. The new revelations lead to the appearance of wrongdoing on the part of U.S. Attorney General Loretta Lynch for secretly meeting with Bill Clinton on her plane on the tarmac of Phoenix Sky Harbor International Airport on the evening of June 28 of this year. Not only was Bill Clinton’s wife under an FBI investigation at the time over her use of a private email server in the basement of her New York home over which Top Secret material was transmitted while she was Secretary of State but his own charitable foundation was also under investigation, a fact that was unknown at the time to the public and the media.
  • The reports leaking out of the FBI over the weekend came on the heels of FBI Director James Comey sending a letter to members of Congress on Friday acknowledging that the investigation into the Hillary Clinton email server was not closed as he had previously testified to Congress, but had been reopened as a result of “pertinent” emails turning up. According to multiple media sources, those emails were found on the laptop of Anthony Weiner, estranged husband of Hillary Clinton’s longtime aide, Huma Abedin. Weiner was forced to resign from Congress in 2011 over a sexting scandal with more sexting scandals to follow. Early this month, on October 3, the FBI raided Weiner’s apartment in New York with a search warrant in hand and seized multiple electronic devices. At least one of those devices had been used by both Weiner and Abedin to send email messages. The search warrant had been obtained following a detailed report that had appeared in the Daily Mail newspaper in the U.K. in September, showing sordid, sexual emails that Weiner had allegedly sent to a 15-year old girl in North Carolina. According to the content of the published emails, Weiner was aware that the girl was underage. While examining the hard drive of a laptop seized from Weiner, the FBI found metadata showing that thousands of the emails were exchanged between the private server located in Hillary Clinton’s basement in Chappaqua, New York. Since the FBI had only a search warrant to examine emails and documents related to the Weiner matter, it was not able to read the other emails but simply tallied up the metadata linked to the private server in Chappaqua to show how many potentially new emails might be in the trove on the laptop. (It is also possible that the FBI agents could have used a program to compare subject headings against those emails previously turned over by Abedin to make their case that Abedin had perjured herself when she testified to them that she had turned over all of her work-related emails from her time as Deputy Chief of Staff for Operations when Hillary Clinton served as Secretary of State.)
  • The FBI officials briefed FBI Director James Comey last Thursday on the new trove of emails and he went public with his letter to Congress the next day – leading the Clinton camp to immediately launch a media assault on his motives. As if all of this wasn’t enough for the public to digest over the weekend, yesterday morning James Kallstrom, the former Assistant Director in Charge of the FBI’s New York Division and 25-year veteran of the FBI, went on the John Catsimatidis radio program to call the Clintons a “crime family.” (You can hear the full program here.) Kallstrom’s comments were further amplified when the New York Daily News reported on his criticisms that the FBI had been hamstrung from conducting a real investigation. The Daily News quoted Kallstrom from the radio program as follows: “ ‘This investigation was never a real investigation, they never had grand jury empaneled…This investigation was without the ability to serve subpoenas, serve search warrants, and obtain evidence … It was just ludicrous.’ ” On Wednesday of last week, just two days before FBI Director Comey issued his public letter to Congress, WikiLeaks released a devastating memo from Douglas Band, at the time a key figure at the Clinton Foundation and President of his own corporate consulting firm, Teneo. The memo was rife with suggestions of pay-to-play and personal enrichment schemes at the Clinton Foundation. The same day, Washington Post reporters Rosalind Helderman and Tom Hamburger reported the story, including the following details:
  • ...1 more annotation...
  • “The memo, made public Wednesday by the anti-secrecy group WikiLeaks, lays out the aggressive strategy behind lining up the consulting contracts and paid speaking engagements for Bill Clinton that added tens of millions of dollars to the family’s fortune, including during the years that Hillary Clinton led the State Department. It describes how Band helped run what he called ‘Bill Clinton Inc.,’ obtaining ‘in-kind services for the President and his family — for personal travel, hospitality, vacation and the like.’… Band wrote that Teneo partners had raised in excess of $8 million for the foundation and $3 million in paid speaking fees for Bill Clinton. He said he had secured contracts for the former president that would pay out $66 million over the subsequent nine years if the deals remained in place.” The memo was likely the final straw for the FBI agents and officials who had been thwarted by the Justice Department in mounting an aggressive investigation of the Clinton Foundation using the full FBI arsenal typically available like subpoenas, witness interviews and wiretaps. Given the weekend leaks, it now appears that the FBI understands that the only hope for a real investigation is to shine some much needed sunlight on how Loretta Lynch’s Justice Department cowers before politically powerful people.
Gary Edwards

Political Editors: Dick Morris Corrects the Record on Hillary Clinton - The Patriot Post - 0 views

  • Then Bill discusses Hillary’s legal career at the Rose Law firm. He doesn’t mention that she made partner when he was elected governor and was only hired when he got elected as attorney general. "He makes as if it was a public service job — it wasn’t. Her main job was to get state business, and she got tens-of-millions of dollars of state business, then hid her participation and the fees by taking an extra share of non-state business to compensate for the fees on state business that she brought in. Her other job was to call the state banking commissioner any time one of her banks got into trouble to get them off.
  • "Bill speaks at length how Hillary was a mother, juggling career and family, taking Chelsea to soccer games and stuff — that’s non-sense. Hillary was a mother but Chelsea in the Arkansas governor’s mansion had a staff of nannies and agents to drive her around and people to be with her, and Hillary didn’t have to bother with any of that. All of that was paid for by the state. "He says she became the warrior in chief over the family finances and that was true, and the result is she learned how to steal. "She accepted a $100,000 bribe from the poultry industry in return for Bill going easy on regulating them, despite new standards. Jim Blair, the poultry lobbyist, gave her $1,000 to invest in the Futures Market and lined up seven to eight other investors and their winnings were all deposited into Hillary’s account. She made $100,000 in a year and she was out. That essentially was a bribe.
  • ”[She did] a phony real-estate deal for Jim McDougal and the Madison Bank to deceive the federal regulators by pretending someone else was buying the property. She was called before a grand jury in 1995 about that but, conveniently, the billing records were lost, couldn’t be found and there wasn’t proof that she worked on it.
  • ...5 more annotations...
  • “Bill talks about her work on the health care task force but doesn’t say the reason it didn’t pass was the task force was discredited because the meetings were all held in secret. A federal judge forced them open and fined the task force several hundred thousand dollars because of their secrecy. "He says that after the health care bill failed in 1994, Hillary went to work on adopting each piece of it piecemeal — mainly health insurance for children. "That is completely the opposite of the truth. The fact is when that bill failed, I called Hillary and I suggested that she support a proposal by Republican Bob Dole that we cover children, and she said, ‘We can’t just cover one part of this. You have to change everything or change nothing.’ Then in 1997 when I repeated that advice to Bill Clinton, we worked together to pass the Children’s Health Insurance Program. I found a lot of the money for that in the tobacco settlement that my friend Dick Scruggs was negotiating.
  • "Then Bill extols her record in the U.S. Senate. In fact, she did practically nothing. There were seven or eight bills that she introduced that passed; almost all of were symbolic — renaming a courthouse, congratulating a high school team on winning the championship. There was only one vaguely substantive bill, and that had a lot of co-sponsors of whom Hillary was just one.
  • "Then he goes to her record in the State Department and manages to tell that story without mentioning the word Benghazi, without mentioning her secret emails, without mentioning he was getting tens of millions — $220 million in speaking fees in return for favorable actions by the State Department.
  • "Also totally lacking in the speech was anything about the war on terror — terror is a word you don’t hear at the Democratic Convention. "Bill says that Hillary passed tough sanctions on Iran for their nuclear program. The opposite is true. "Every time a tough sanction bill was introduced by Senators Menendez or Kirk, Hillary would send Deputy Secretary Wendy Sherman to Capital Hill to testify against it and urge it not to pass, and it was over Hillary’s objections that those sanctions were put into place.
  • ”[Liberal columnist] Maureen Dowd called the speech by Bill Clinton “air brushed.” “It was a hell of a lot more than that — it was fiction. (Also see Morris’s comments after Clinton’s DNC acceptance speech. "It’s strategy and message will be interdicted by reality at every turn. … She basically has no message. … Her entire campaign is, ‘I’m a woman and I am running against Donald Trump. … She bean her speech by saying let’s compromise and work together. Is there any woman in the world less likely to compromise?”)
  •  
    "Dick Morris is a nationally recognized political campaign adviser, analyst and author. He was the senior political adviser to Bill Clinton before and after his occupation of the White House. He was campaign manager of Clinton's 1996 re-election, and the architect of his successful "triangulation" rhetorical ruse. Clinton's communications director George Stephanopoulos said of Morris, "No single person had more power over [Bill Clinton]." This week, in a message entitled "What Bill Left Out, Morris corrected the record regarding Clinton's glowing remarks about Hillary Clinton, her personal attributes and professional achievements. Morris's insights into the Clintons are priceless. What follows is a transcript of Morris's comments: "Bill Clinton talked at length about Hillary's idealistic work in college and law school, but he omits that she was defending the Black Panthers who killed security guards; they were on trial in New Haven. She monitored the trial while she was in law school to find evidence that could be grounds for reversal in the event they were convicted. "That summer she went to work for the True-Haft (SP) law firm in CA, headed by True Haft who is the head of the CA Communist Party and that's when she got involved with Saul Alinsky, who became something of a mentor for the rest of her life. "Then Bill says that she went off to Massachusetts and he went to Arkansas, and eventually Hillary followed her heart to join him in Arkansas. He omits that she went to work for the Watergate Committee and was fired from that job for taking home evidence and hiding documents that they needed in the impeachment inquiry. Then she took the DC Bar exam and flunked it, she went to Arkansas because that is the only bar exam she could pass. "He talked about how in the 1970's she took all kinds of pro-bono cases to defend women and children. In her memoirs, she cites one which was a custody case and that's it. In fact, in 1975 she represen
Paul Merrell

Wyden Statement at Senate Intelligence Committee's Open Hearing | Press Releases | U.S.... - 0 views

  • U.S. Senator Ron Wyden (D-Ore.) delivered the following statement prior to questioning senior Intelligence Community officials during the Senate Intelligence Committee’s open hearing. Wyden is a senior member of the Intelligence committee. “The men and women of America’s intelligence agencies are overwhelmingly dedicated professionals and they deserve to have leadership that is trusted by the American people. Unfortunately, that trust has been seriously undermined by senior officials’ reckless reliance on secret interpretations of the law and battered by years of misleading and deceptive statements that senior officials made to the American people. These statements did not protect sources and methods that were useful in fighting terror. Instead they hid bad policy choices and violations of the liberties of the American people. For example, the director of the NSA said publicly that the NSA doesn’t hold data on U.S. citizens. That was obviously untrue.  Justice Department officials testified that section 215 of the Patriot Act is analogous to grand jury subpoena authority. And that deceptive statement was made on multiple occasions. Officials also suggested that the NSA doesn’t have the authority to read Americans’ emails without a warrant but the FISA court opinions declassified last August showed that wasn’t true either.
  • The statement and subsequent questions may be viewed below or here:
  •  
    Ron Wyden comes out swinging at a Senate hearing, giving 3 examples of lies about digital surveillance told to Congress by intelligence officials and DoJ. Then he presses DNI Clapper, CIA head Brennan, and FBI head Comey to provide by dates certain written public answers to a series of questions that he had previously asked in writing but never received answers on. All three said they would provide the answers, Clapper within 30 days and the other two within 7 days.  The questions themselves are extremely important, about the government's interpretation of legal authorities to conduct warrantless searches and in the case of the CIA, whether it is subject to the Computer Fraud and Abuse Act. That Act provides for criminal penalties and civil damages for accessing a "protected computer" (essentially any computer connected to the internet, whether in the U.S. or abroad) or activating any command or installing any malware on a protected computer. See generally, http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act That question suggests that Wyden and his staff are boring into issues involving the government breaking into computers to access private data. Another question asked whether the government claimed the authority to access private data stored in the cloud without a warrant.  This is a short video well worth the watching time.
1 - 20 of 27 Next ›
Showing 20 items per page