Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged homeland

Rss Feed Group items tagged

Gary Edwards

Feds confiscate investigative reporter's confidential files during raid | The Daily Caller - 3 views

  • A veteran Washington D.C. investigative journalist says the Department of Homeland Security confiscated a stack of her confidential files during a raid of her home in August — leading her to fear that a number of her sources inside the federal government have now been exposed. In an interview with The Daily Caller, journalist Audrey Hudson revealed that the Department of Homeland Security and Maryland State Police were involved in a predawn raid of her Shady Side, Md. home on Aug. 6. Hudson is a former Washington Times reporter and current freelance reporter. A search warrant obtained by TheDC indicates that the August raid allowed law enforcement to search for firearms inside her home.
  • But without Hudson’s knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said. Outraged over the seizure, Hudson is now speaking out. She said no subpoena for the notes was presented during the raid and argues the confiscation was outside of the search warrant’s parameter. “They took my notes without my knowledge and without legal authority to do so,” Hudson said this week. “The search warrant they presented said nothing about walking out of here with a single sheet of paper.”
  • After the search began, Hudson said she was asked by an investigator with the Coast Guard Investigative Service if she was the same Audrey Hudson who had written a series of critical stories about air marshals for The Washington Times over the last decade. The Coast Guard operates under the Department of Homeland Security.
  •  
    If reality is as stated, the reporter has a pretty strong civil rights case against the government officials who knowingly participated in the theft and retention of the reporter's notes, two distinct conspiracies. Under the 4th Amendment, officers executing a search and seizure warrant may lawfully seize the items particularly described in the warrant and any other evidence of crime that is in plain view during the search. It's a big push of credibility to argue that reading documents stored in a bag in search for a gun falls within the "plain view" doctrine. The officer could instead just reach his hand into the bag and feel around for a gun. Quite a few extra steps involved in removing the documents and reading them simply to determine whether the bag contains a gun. Add in the facts that: [i] the supposed recognition of government documents argument does not explain why the officers seized personal handwritten notes too; and [ii] the evidence that the officer who discovered the docs had learned that the reporter was one who had called the conduct of his agency into question, and it comes out smelling a lot more like an attempt to discover the reporters' sources than a legitimate search for guns when the bag was searched.   Only one side heard from so far, of course. But this sounds more like low-level government officials who were ignorant of their legal obligations than a White House-driven scandal. But I wouldn't want to be the government lawyer who authorized the retention of the seized notes and other documents. They should have been returned without retaining copies the instant the lawyer learned of the circumstances of their seizure. There's not only a 4th Amendment liberty interest but also a 1st Amendment freecdom to communicate anonymously right protecting those documents and notes. 
  • ...1 more comment...
  •  
    I listened to an interview with Audrey Hudson last night. It seems to me the key fact is in this clip; "But without Hudson's knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said." Audrey had written a series of articles describing how the Homeland Security and Transportation agency had been lying about air marshalls and the post 911 program to secure passenger flights. The documents that were stolen listed her sources - the whistle blowers inside the Homeland Security administration who leaked information about the lies and the many problems with the program that the Obama administration was covering up. This sounds to me like another example of Obama hunting down and persecuting whistleblowers. A direct violation of the 1989 - 2007 Whistleblower Protection Act. Not surprisingly, Ms Hudson had not tried to contact any of her whistleblowing sources for fear that the NSA would be watching and that this persecution would happen. Interestingly, the warrant was to seize a "potato launcher". No kidding! It seems Ms. Hudson's husband had, at one time been a licensed arms dealer. He lost that license having sold a gun with faulty paperwork. This event had occurred years earlier, and Mr. Hudson had long since moved on and was currently working for the Coast Guard as an outside contractor/consultant. So they seized the toy "potato launcher", as described in the warrant. But they also ransacked the home looking for the key documents that listed Ms Hudson's inside Homeland Security sources behind her air marshal scandal articles. These documents were the only items seized - other than the "potato launcher" that was the only item listed in the warrant. Seems we've been here before. From wikipedia, the story of Friedrich Gustav Emil Martin Niemöller: ........................... Arrested on 1 July 1937, N
  •  
    "But without Hudson's knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said."
  •  
    What troubles me the most about this event, assuming the truth of what's reported, is how well known the limitations on execution of a search warrant are within the law enforcement community. If it happened as described, it seems very unlikely that the officer who grabbed the documents did not know he was violating the 4th Amendment. Ditto for the lawyer or other official(s) who learned of what went down shortly thereafter, but kept the documents anyway. There's an arrogance that goes with government and corporate officials who don't have to personally pay damage awards. With no personal monetary liability (in reality, since the government or corporation picks up the tab), it becomes a matter of personal ethics and whether the misbehavior will anger or please the boss. If the ethics are weak, that becomes a pretty simple choice.
Gary Edwards

Obama's Terrorism Claim Hides an Inconvenient Truth - 0 views

  •  
    "On Tuesday, President Barack Obama stated that "Over [the] last eight years, no foreign terrorist organization has successfully planned and executed an attack on our homeland." Talk about something actually deserving of being labeled as "fake news." Obama's statement obscures the reality that the U.S. has faced 66 Islamist terrorist plots against the U.S. homeland during Obama's time in office, 13 of which were successful. When President George W. Bush left office, the U.S. had faced 28 Islamist plots after 9/11, only one of which was successful. Now there have been 93 Islamist plots since 9/11, and 14 successful attacks. Obama's statement is technically accurate since none of these attacks were planned and directed from abroad. Instead, the vast majority of the terror plots and all of the successful attacks since 9/11 have involved homegrown terrorists-that is, terrorists who radicalized and plotted here in the U.S. While preventing such foreign orchestrated plots is vital, it is no longer enough. The threat has morphed and the U.S. must now do more to counter homegrown and lone wolf Islamist terrorists. Obama's comment obscures the truth that in his eight years in office, as shown by the sharp increase in the number of Islamist plots and successful attacks, the homeland has been less safe. Claiming victory while the U.S. is in the most active period of terrorist activity since 9/11 is not only pushing a false narrative, but it risks diverting our attention from what needs to be done to defend the U.S. homeland."
Paul Merrell

2014 Press Release - NSA Announces New Civil Liberties and Privacy Officer" - 0 views

  • GEN Keith Alexander - Commander, U.S. Cyber Command/Director, NSA/Chief, CSS - announced today that well-known privacy expert Rebecca Richards will serve as the National Security Agency's new Civil Liberties and Privacy Officer. She most recently worked as the Senior Director for Privacy Compliance at the Department of Homeland Security.
  • Selected to lead the new NSA Civil Liberties and Privacy Office at the agency's Fort Meade headquarters, Ms. Richards' primary job will be to provide expert advice to the Director and oversight of NSA's civil liberties and privacy related activities. She will also develop measures to further strengthen NSA's privacy protections.
  •  
    Softball Interview here. . I wasn't really expecting Obama to reach out to the ACLU and EFF for a good civil liberties lawyer recommendation, but this appointment is lame, the former Director of Privacy for Dept. of Homeland Security, those wonderful folk who keep the homeland safe from terra-ists. The airport gropers, secret no-fly listers, and masters of border protection, where all Constitutional privacy rights do not apply, per the Supreme Court., the coordinators of our glorious "fusion centers," the provisioners of funding for armored cars and surveillance equipment for local police, etc. A sample from her interview linked above that I transcribed (omitting all the umhs and ahs): "When you think about NSA, privacy there for them was privacy of its employees, about contractors, about the average person walking down the street - it was not as concentrated on, this is the big collection that we're getting through these means, and so what this job does is that it brings it up under direct reports to the director of NSA and it is just as a focal point, to bring all of those and -- I walked in the building and people were already asking questions so ..." Heaven help us; has this lassie's brain yet matured to the point of completing her first sentence? This is the lady who is going to keep Admiral Rogers on the straight and narrow path of respecting our civil liberties? I suspect not.  I may return to this inarticulate and non-assertive young lady in later posts. Let it suffice for now to observe that the Dept. of Homeland Security, whose raison d'etre is a virtually non-existent terrorist threat manufactured by the politics of fear, has not exactly been a champion of the People's civil liberties. Moreover, I've had recent occasion to dig rather deeply into exactly what it is that Privacy Officers do and don't do. Telling heads of agencies that they cannot lawfully do what they want to do is no
Paul Merrell

Tomgram: Todd Miller, The Creation of a Border Security State | TomDispatch - 0 views

  • Sometimes you really do need a map if you want to know where you are.  In 2008, the ACLU issued just such a map of this country and it’s like nothing ever seen before.  Titled “the Constitution-Free Zone of the United States,” it traces our country’s borders.  Maybe you’re already tuning out.  After all, you probably don’t think you live on or near such a border.  Well, think again.  As it happens, in our brave, new, post-9/11 world, as long as we’re talking “homeland security” or “war on terror,” anything can be redefined.  So why not a border? Our borders have, conveniently enough, long been Constitution-free zones where more or less anything goes, including warrantless searches of various sorts.  In the twenty-first century, however, the border itself, north as well as south, has not only been increasingly up-armored, but redefined as a 100-mile-wide strip around the United States (and Alaska).  In other words -- check that map again -- our “borders” now cover an expanse in which nearly 200 million Americans, or two-thirds of the U.S. population, live.  Included are nine of the 10 largest metropolitan areas.  If you live in Florida, Maine, or Michigan, for example, no matter how far inland you may be, you are “on the border.”
  • Imagine that.  And then imagine what it means.  U.S. Customs and Border Protection, as Todd Miller points out today, is not only the largest law enforcement agency in the country you know next to nothing about, but the largest, flat and simple.  Now, its agents can act as if the Constitution has been put to bed up to 100 miles inland anywhere.  This, in turn, means -- as the ACLU has written -- that at new checkpoints and elsewhere in areas no American would once have considered borderlands, you can be stopped, interrogated, and searched “on an everyday basis with absolutely no suspicion of wrongdoing.” Under the circumstances, it’s startling that, since the ACLU made its case back in 2008, this new American reality has gotten remarkably little attention.  So it’s lucky that TomDispatch regular Miller's invaluable and gripping book, Border Patrol Nation: Dispatches from the Front Lines of Homeland Security, has just been published.  It’s an eye opener, and it’s about time that “border” issues stopped being left to those on the old-fashioned version of the border and immigration mavens.  It’s a subject that, by definition, now concerns at least two-thirds of us in a big way.
  • Border Security Expo 2014 catches in one confined space the expansiveness of a “booming” border market. If you include “cross-border terrorism, cyber crime, piracy, [the] drug trade, human trafficking, internal dissent, and separatist movements,” all “driving factor[s] for the homeland security market,” by 2018 it could reach $544 billion globally. It is here that U.S. Homeland Security officials, local law enforcement, and border forces from all over the world talk contracts with private industry representatives, exhibit their techno-optimism, and begin to hammer out a future of ever more hardened, up-armored national and international boundaries. The global video surveillance market alone is expected to be a $40 billion industry by 2020, almost three times its $13.5 billion value in 2013. According to projections, 2020 border surveillance cameras will be capturing 3.4 trillion video hours globally. In case you were wondering, that’s more than 340 million years of video footage if you were watching 24 hours a day.
  • ...3 more annotations...
  • It is in the U.S. borderlands that, as anthropologist Josiah Heyman once wrote, the U.S. government’s modern expertise in creating and tracking "a marked population” was first developed and practiced. It involved, he wrote prophetically, “the birth and development of a... means of domination, born of the mating between moral panics about foreigners and drugs, and a well-funded and expert bureaucracy.” You may not be able to watch them at the Border Security Expo, but in those borderlands -- make no bones about it -- the Department of Homeland Security, with its tripartite missions of drug interdiction, immigration enforcement, and the war on terror, is watching you, whoever you are. And make no bones about this either: our borders are widening and the zones in which the watchers are increasingly free to do whatever they want are growing.
  • In March, U.S. Customs and Border Protection (CBP) awarded a $145 million contract to that Israeli company through its U.S. division. Elbit Systems prides itself on having spent “10+ years securing the world’s most challenging borders,” above all deploying similar “border protection systems” to the separation wall between Israel and Palestine. It is now poised to enter U.S. indigenous lands.
  • Now, thanks to the Elbit Systems contract, a new kind of border will continue to be added to this layering.  Imagine part of the futuristic Phoenix exhibition hall leaving Border Expo with the goal of incorporating itself into the lands of a people who were living here before there was a “New World,” no less a United States or a Border Patrol. Though this is increasingly the reality from Brownsville, Texas, to San Diego, California, on Tohono O’odham land a post-9/11 war posture shades uncomfortably into the leftovers from a nineteenth century Indian war.  Think of it as the place where the homeland security state meets its older compatriot, Manifest Destiny.
Gary Edwards

Senate Democrats Pushed for IRS Tea Party Snooping Before Criticizing It - Brian Walsh ... - 0 views

  •  
    Democrats caught red handed pushing the IRS to audit, harass and delay efforts to establish Constitutional Patriot and Jewish Homeland non profit groups.   The Democrats political efforts behind the IRS's blatant violation of these American citizens 4th Amendment Right to organize and assemble dates back to the 2009 Supreme Court decision known as "Citizens United". In "Citizens Untied", the court ruled that corporations are people, and thus are entitled to 1st Amendment Rights.  Including full participation and monetary contributions in political campaigns. this ruling was further confirmed when the Supreme Court overturned a century old Montana Law prohibiting corporate spending in that State's elections.   The "Citizens United" ruling so upset Obama and the Socialist Party that he publicly scolded the Supreme Court justices during a State of the Union address.  The Progressives rightfully feared that corporations would ppour "unregulated independent expenditures" into newly formed Tea Party Patriot based non profits.  Unable to overturn Citizens United, the Dems called on the IRS and a host of other government bureaucracies to block, harass and slow down the funding of their political opposition. this article exposes the same Dem clowns who are now crying foul as the same tyrants who kicked off the IRS led effort to slow down the Tea Party Patriot opposition movement.   How the Jewish Homeland groups got into the IRS gun sights is still a mystery, but one thing is known:  With the election of Obama in 2008, the IRS moved from targeting non profit Muslim Groups as possible terrorist funding organizations, to targeting Tea Party Patriot movements.  Maybe that's also when they took on Jewish Homeland groups?  excerpt: "With Washington gripped by a trio of exploding scandals this week - from Benghazi to government spying on news outlets to thug tactics by the Internal Revenue Service - Senate Democrats seem to be hoping that if they just yell lou
Paul Merrell

Homeland Security Approves Their Right To Search and Seize Your Electronics Without Sus... - 0 views

  • Suddenly, she found herself in serious trouble. The inspection officer found the bills and accused her of “lying to a federal officer.” They held her for two hours as she was interrogated about the details of her life.  The officer ordered her to turn her phone on, and then proceeded to read her e-mails, texts, and Facebook messages without her permission.  She was shocked. Eventually, Gaczkowska was released, but she wondered if this was a common practice. As it turns out – it is; thousands of people every year face a similar situation.  Our government agencies have allowed themselves the right to search and seize your electronic devices with stunning impunity. Just two weeks ago, the Department of Homeland Security quietly released a strangely worded document reaffirming their own right to search and seize your electronics without suspicion or cause, anywhere along the United States border (which they define as 100 miles in from the border – an area twice as long as Rhode Island).  In reality, this is nothing new, Homeland Security been doing this since at least 2009; That’s when Secretary Napolitano put her stamp on the Bush-era practice, and promised an impact assessment within 120 days.  Over two years later, it’s finally here, and it is nothing more than a poorly written press release.
  • Having a government official force their way into your laptop is fundamentally different from having them inspect your suitcase.  Our hard drives contain personal correspondence, intimate details, deep logs of our activities, and sensitive financial or medical information.  Yet we still give this less legal privacy protection than a sealed envelope with a stamp on it.
  • The Fourth Amendment of the Constitution already provides us with protection against unreasonable search and seizures for people in their “persons, houses, papers, and effects” – is it time that we add “data” to this list? The way in which we go about answering this question will have enormous ramifications for our entire legal system. Courts around the country are struggling to decide how to balance security with privacy.  From school to the workplace, this question is popping up in different ways almost every day.
Paul Merrell

U.S. gives big, secret push to Internet surveillance - CNET - 0 views

  • Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws. The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12. "The Justice Department is helping private companies evade federal wiretap laws," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, which obtained over 1,000 pages of internal government documents and provided them to CNET this week. "Alarm bells should be going off." Those documents show the National Security Agency and the Defense Department were deeply involved in pressing for the secret legal authorization, with NSA director Keith Alexander participating in some of the discussions personally. Despite initial reservations, including from industry participants, Justice Department attorneys eventually signed off on the project.
  • The Justice Department agreed to grant legal immunity to the participating network providers in the form of what participants in the confidential discussions refer to as "2511 letters," a reference to the Wiretap Act codified at 18 USC 2511 in the federal statute books. The Wiretap Act limits the ability of Internet providers to eavesdrop on network traffic except when monitoring is a "necessary incident" to providing the service or it takes place with a user's "lawful consent." An industry representative told CNET the 2511 letters provided legal immunity to the providers by agreeing not to prosecute for criminal violations of the Wiretap Act. It's not clear how many 2511 letters were issued by the Justice Department. In 2011, Deputy Secretary of Defense William Lynn publicly disclosed the existence of the original project, called the DIB Cyber Pilot, which used login banners to inform network users that monitoring was taking place. In May 2012, the pilot was turned into an ongoing program -- broader but still voluntary -- by the name of Joint Cybersecurity Services Pilot, with the Department of Homeland Security becoming involved for the first time. It was renamed again to Enhanced Cybersecurity Services program in January, and is currently being expanded to all types of companies operating critical infrastructure.
  • Another e-mail message from a Justice Department attorney wondered: "Will the program cover all parts of the company network -- including say day care centers (as mentioned as a question in a [deputies committee meeting]) and what are the policy implications of this?" The deputies committee includes the deputy secretary of defense, the deputy director of national intelligence, the deputy attorney general, and the vice chairman of the Joint Chiefs of Staff. "These agencies are clearly seeking authority to receive a large amount of information, including personal information, from private Internet networks," says EPIC staff attorney Amie Stepanovich, who filed a lawsuit against Homeland Security in March 2012 seeking documents relating to the program under the Freedom of Information Act. "If this program was broadly deployed, it would raise serious questions about government cybersecurity practices." In January, the Department of Homeland Security's privacy office published a privacy analysis (PDF) of the program saying that users of the networks of companies participating in the program will see "an electronic login banner [saying] information and data on the network may be monitored or disclosed to third parties, and/or that the network users' communications on the network are not private."
  • ...2 more annotations...
  • Paul Rosenzweig, a former Homeland Security official and founder of Red Branch Consulting, compared the NSA and DOD asking the Justice Department for 2511 letters to the CIA asking the Justice Department for the so-called torture memos a decade ago. (They were written by Justice Department official John Yoo, who reached the controversial conclusion that waterboarding was not torture.) "If you think of it poorly, it's a CYA function," Rosenzweig says. "If you think well of it, it's an effort to secure advance authorization for an action that may not be clearly legal." A report (PDF) published last month by the Congressional Research Service, a non-partisan arm of Congress, says the executive branch likely does not have the legal authority to authorize more widespread monitoring of communications unless Congress rewrites the law. "Such an executive action would contravene current federal laws protecting electronic communications," the report says.
  • An internal Defense Department presentation cites as possible legal authority a classified presidential directive called NSPD 54 that President Bush signed in January 2008. Obama's own executive order , signed in February 2013, says Homeland Security must establish procedures to expand the data-sharing program "to all critical infrastructure sectors" by mid-June. Those are defined as any companies providing services that, if disrupted, would harm national economic security or "national public health or safety."
  •  
    Article is from April 2013, before the Snowden disclosures. 
Gary Edwards

» EXCLUSIVE: Snowden Level Documents Reveal Stealth DHS Spy Grid Alex Jones' ... - 0 views

  • “The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”
  •  
    It just keeps getting better ............... excerpt: "The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions. Labeled by their intersection location such as "1st&University" and "2nd& Seneca," the multiple network devices are easily detected in Seattle's downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return. "How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?" asked Seattle newspaper The Stranger. According to reports from Kiro 7 News, the mesh network devices can capture a mobile user's IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited. So far Seattle police have been tight-lipped about the network's roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement. According to The Stranger's investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy. Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagr
Paul Merrell

Obama equates Israel's creation to African-Americans gaining right to vote - 0 views

  •      President Obama gave another interview to Jeffrey Goldberg, at the Atlantic.
  • And this about anti-Semitism and anti-Zionism. If you don’t think Israel has a right to exist as a homeland for the Jewish people, you’re anti-Semitic. Goldberg: I know that you’ve talked about this with Jewish organizations, with some of your Jewish friends—how you define the differences and the similarities between these two concepts. Obama: You know, I think a good baseline is: Do you think that Israel has a right to exist as a homeland for the Jewish people, and are you aware of the particular circumstances of Jewish history that might prompt that need and desire? And if your answer is no, if your notion is somehow that that history doesn’t matter, then that’s a problem, in my mind. If, on the other hand, you acknowledge the justness of the Jewish homeland, you acknowledge the active presence of anti-Semitism—that it’s not just something in the past, but it is current—if you acknowledge that there are people and nations that, if convenient, would do the Jewish people harm because of a warped ideology. If you acknowledge those things, then you should be able to align yourself with Israel where its security is at stake, you should be able to align yourself with Israel when it comes to making sure that it is not held to a double standard in international fora, you should align yourself with Israel when it comes to making sure that it is not isolated.
  • But you should be able to say to Israel, we disagree with you on this particular policy. We disagree with you on settlements. We think that checkpoints are a genuine problem. We disagree with you on a Jewish-nationalist law that would potentially undermine the rights of Arab citizens. And to me, that is entirely consistent with being supportive of the State of Israel and the Jewish people. Now for someone in Israel, including the prime minister, to disagree with those policy positions—that’s OK too. And we can have a debate, and we can have an argument. But you can’t equate people of good will who are concerned about those issues with somebody who is hostile towards Israel. And you know, I actually believe that most American Jews, most Jews around the world, and most Jews in Israel recognize as much. And that’s part of the reason why I do still have broad-based support among American Jews. It’s not because they dislike Israel, it’s not because they aren’t worried about Iran having a nuclear weapon or what Hezbollah is doing in Lebanon. It’s because I think they recognize, having looked at my history and having seen the actions of my administration, that I’ve got Israel’s back, but there are values that I share with them that may be at stake if we’re not able to find a better path forward than what feels like a potential dead-end right now.
  • ...1 more annotation...
  • The president also equated the foundation of Israel with the civil rights movement in the U.S. [T]o me, being pro-Israel and pro-Jewish is part and parcel with the values that I’ve been fighting for since I was politically conscious and started getting involved in politics. There’s a direct line between supporting the right of the Jewish people to have a homeland and to feel safe and free of discrimination and persecution, and the right of African Americans to vote and have equal protection under the law. These things are indivisible in my mind. But what is also true, by extension, is that I have to show that same kind of regard to other peoples. And I think it is true to Israel’s traditions and its values—its founding principles—that it has to care about those Palestinian kids. Says Donald Johnson, who tipped me to this: “I  understand the long history of antisemitism as an argument for having a Jewish state, but why can’t people be honest about the price paid by the Palestinians? I know the answer.”
  •  
    Oh, I didn't know that: The American civil rights movement created paramilitary forces and overthrew the U.S. government, driving nearly all of the white people into one corner of the country, then set up their own national democratic goverrnment in the remainder, granted citizenship to any black people who wanted to emmigrate to the United Black States of America but denied all others citizenship, and enacted 51 laws that granted more rights to black citizens than their remaining few token whites, etc.  Horse feathers. Obama just shamed the American civil rights movement and he deserves to be tarred and feathered for it. 
Paul Merrell

Legislative Cyber Threats: CISA's Not The Only One | Just Security - 0 views

  • If anyone in the United States Senate had any doubts that the proposed Cyber Information Sharing Act (CISA) was universally hated by a range of civil society groups, a literal blizzard of faxes should’ve cleared up the issue by now. What’s not getting attention is a CISA “alternative” introduced last week by Sens. Mark Warner (D-Va) and Susan Collins (R-Me). Dubbed the “FISMA Reform Act,” the authors make the following claims about the bill:  This legislation would allow the Secretary of Homeland Security to operate intrusion detection and prevention capabilities on all federal agencies on the .gov domain. The bipartisan bill would also direct the Secretary of Homeland Security to conduct risk assessments of any network within the government domain. The bill would allow the Secretary of Homeland Security to operate defensive countermeasures on these networks once a cyber threat has been detected. The legislation would strengthen and streamline the authority Congress gave to DHS last year to issue binding operational directives to federal agencies, especially to respond to substantial cyber security threats in emergency circumstances.
  • The bill would require the Office of Management and Budget to report to Congress annually on the extent to which OMB has exercised its existing authority to enforce government wide cyber security standards. On the surface, it actually sounds like a rational response to the disastrous OPM hack. Unfortunately, the Warner-Collins bill has some vague or problematic language and non-existent definitions that make it potentially just as dangerous for data security and privacy as CISA. The bill would allow the Secretary of Homeland Security to carry out cyber security activities “in conjunction with other agencies and the private sector” [for] “assessing and fostering the development of information security technologies and capabilities for use across multiple agencies.” While the phrase “information sharing” is not present in this subsection, “security technologies and capabilities” is more than broad — and vague — enough to allow it.
  • The bill would also allow the secretary to “acquire, intercept, retain, use, and disclose communications and other system traffic that are transiting to or from or stored on agency information systems and deploy countermeasures with regard to the communications and system traffic.”
  • ...2 more annotations...
  • The bill also allows the head of a federal agency or department “to disclose to the Secretary or a private entity providing assistance to the Secretary…information traveling to or from or stored on an agency information system, notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary.” (Emphasis added.) So confidential, proprietary or other information otherwise precluded from disclosure under laws like HIPAA or the Privacy Act get waived if the Secretary of DHS or an agency head feel that your email needs to be shared with a government contracted outfit like the Hacking Team for analysis. And the bill explicitly provides for just this kind of cyber threat analysis outsourcing:
  • (3) PRIVATE ENTITIES. — The Secretary may enter into contracts or other agreements, or otherwise request and obtain the assistance of, private entities that provide electronic communication or information security services to acquire, intercept, retain, use, and disclose communications and other system traffic in accordance with this subsection. The bill further states that the content of your communications, will be retained only if the communication is associated with a known or reasonably suspected information security threat, and communications and system traffic will not be subject to the operation of a countermeasure unless associated with the threats. (Emphasis added.) “Reasonably suspected” is about as squishy a definition as one can find.
  •  
    "The bill also allows the head of a federal agency or department "to disclose to the Secretary or a private entity providing assistance to the Secretary…information traveling to or from or stored on an agency information system, notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary."" Let's see: if your information is intercepted by the NSA and stored on its "information system" in Bluffdale, Utah, then it can be disclosed to the Secretary of DHS or any private entity providing him/her with assistance, "notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary." And if NSA just happens to be intercepting every digital bit of data generated or received in the entire world, including the U.S., then it's all in play, "notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary.". Sheesh! Our government voyeurs never stop trying to get more nude pix and videos to view.  
Paul Merrell

Feds operated yet another secret metadata database until 2013 | Ars Technica - 0 views

  • In a new court filing, the Department of Justice revealed that it kept a secret database of telephone metadata—with one party in the United States and another abroad—that ended in 2013. The three-page partially-redacted affidavit from a top Drug Enforcement Agency (DEA) official, which was filed Thursday, explained that the database was authorized under a particular federal drug trafficking statute. The law allows the government to use "administrative subpoenas" to obtain business records and other "tangible things." The affidavit does not specify which countries records were included, but specifically does mention Iran. This database program appears to be wholly separate from the National Security Agency’s metadata program revealed by Edward Snowden, but it targets similar materials and is collected by a different agency. The Wall Street Journal, citing anonymous sources, reported Friday that this newly-revealed program began in the 1990s and was shut down in August 2013.
  • The criminal case involves an Iranian-American man named Shantia Hassanshahi, who is accused of violating the American trade embargo against Iran. His lawyer, Mir Saied Kashani, told Ars that the government has clearly abused its authority. "They’ve converted this from a war on drugs to a war on privacy," he said. "[Hassanshahi] is not accused of any drug crime but they used this drug enforcement information to gather information against him, that's contrary to the law, and we will revisit that. We will bring motions in the court and we will appeal if necessary." Neither the DEA nor the Department of Justice immediately responded to Ars' query as to whether this program is continuing under a different authority.
  • The story begins in 2011, when a Department of Homeland Security (DHS) agent received a tip about someone who might be in violation of American sanctions against Iran. The source provided an e-mail from an Iranian businessman, Manoucher Sheiki, who was involved in acquiring power grid equipment. A second Homeland Security agent, Joshua Akronowitz, wrote in a 2013 affidavit that he searched Sheiki’s Iranian phone number in this database, but declined to explain exactly what kind of database it was. Akronowitz found that the Iranian number came up exactly one time in the database, and was linked to an 818 number, based in Los Angeles County. That number turned out to be the Google Voice number of Hassanshahi. DHS then subpoenaed Google, and got Hassanshahi’s call log and later, metadata on his Gmail account. By early 2012, the agency found out that he was set to return to Los Angeles from Iran. At LAX Airport, customs agents seized his phone, laptop, thumb drives, camcorder, and SIM cards and sent them to Homeland Security. Last year, Kashani, Hassanshahi’s lawyer, argued that this evidence should be suppressed on account that it was the "fruit of the poisonous tree"—obtained via illicit means. In support of his arguments, Kashani cited an important ongoing NSA-related lawsuit, Klayman v. Obama, which remains the only instance where a judge has order the NSA metadata program to be shut down—that order was stayed pending an appeal. (Earlier this month, Ars explored Klayman and other pending notable surveillance cases.)
  • ...3 more annotations...
  • In a December 2014 opinion in the Hassanshahi case, US District Judge Rudolph Contreras allowed the evidence, but also required that the government provide a "declaration summarizing the contours of the law enforcement database used by Homeland Security Investigations to discover Hassanshahi’s phone number, including any limitations on how and when the database may be used." To comply with the judge’s order, Robert Patterson, the assistant special agent in charge of the DEA, wrote in the Thursday filing: As noted, this database was a federal law enforcement database. It could be used to query a telephone number where federal law enforcement officials had a reasonable articulable suspicion that the telephone number at issue was related to an ongoing federal criminal investigation. The Iranian number was determined to meet this standard based on specific information indicating that the Iranian number was being used for the purpose of importing technological goods to Iran in violation of United States law. Previously, the government had not revealed exactly how it began its investigation of Hassanshahi, and only referred cryptically to "[DHS]-accessible law enforcement databases," in Akronowitz’ 2013 and  2014 affidavits.
  • Similarly, other privacy-minded legal experts questioned the government’s tactics in this new revelation. "We just don’t know about the scope of these things, and that’s what’s disturbing," Andrew Crocker, a legal fellow at the Electronic Frontier Foundation, told Ars. His colleague, Hanni Fakhoury, an EFF attorney who used to be a federal public defender, added that he was "not surprised." "Bulk surveillance technologies and the dangerous legal theories that are used to support them trickle down, and here's a prime example of that," he wrote by e-mail. "The DEA's mandate is of course important but not at the level of national security where as you know there are serious legal questions about the propriety of this collection of phone metadata. And if the DEA has a program like this, it wouldn't surprise me if other agencies do too for other sorts of records the government has claimed it can collect with a subpoena (like bank records)."
  • Patrick Toomey, an attorney with the American Civil Liberties Union, chimed in to say that this indeed was a clear example of government overreach. "This disclosure underscores how the government has expanded its use of bulk collection far beyond the NSA and the national-security context, to rely on mass surveillance in ordinary criminal investigations," he said by e-mail. "It’s now clear that multiple government agencies have tracked the calls that Americans make to their parents and relatives, friends, and business associates overseas, all without any suspicion of wrongdoing," Toomey continued. "The DEA program shows yet again how strained and untenable legal theories have been used to secretly justify the surveillance of millions of innocent Americans using laws that were never written for that purpose."
  •  
    The authorizing statute clearly limits the scope of the administrative subpoena authority to drug related criminal investigations. "In any investigation relating to his functions under this subchapter with respect to controlled substances, listed chemicals, tableting machines, or encapsulating machines, the Attorney General may subpena witnesses, compel the attendance and testimony of witnesses, and require the production of any records (including books, papers, documents, and other tangible things which constitute or contain evidence) which the Attorney General finds relevant or material to the investigation."
Gary Edwards

The Sides Are Forming For The Coming Civil War. | Militia News - 1 views

  • America is in the choosing sides phase of the coming civil war. To use a college recruiting phrase, it is accurate to state that the letters of intent to join one side or another have mostly been signed and the commitments offered. However, there is one big uncommitted piece, but very soon the sides will be drawn.
  • The Chess Pieces of Civil War What is going on today in America all about choosing sides. There are clear lines being formed in the United States. The recruiting pool consists of the Department of Homeland Security, the American military, local law enforcement, the Russian troops pouring into the United States, the trickle of Chinese troops coming into the country through Hawaii and, of course, the poor, the middle class and elite. This is the recruiting pool which will form the chess pieces of the coming American Civil War. Even if all parties in this country wanted the country to continue, even in its present mortally wounded state, it would be foolish to believe that it could continue for much longer.
  • Barring a false flag event, US martial law will have a trigger event, which will lead to martial law, that will be financial and it will naturally occur as we are already on a collision course with destiny.
  • ...18 more annotations...
  • The net result of these staggering numbers can only end one way, and that is with a financial collapse, followed by a bank holiday, rioting in the streets and the full roll out of martial law. These financial numbers guarantee that the party cannot continue much longer. Since America, in her present form, cannot continue much longer without experiencing a cataclysmic shift, we would be wise to realize what resources are going to be the impetus for civil war. When you play the board game, Monopoly, the properties on Boardwalk are among the most coveted. It is no different in real life. The biggest prize of the coming conflict is real estate. Homes, office buildings and shopping malls are the most coveted prize. The MERS mortgage fraud continues unabated as millions of homes have been confiscated through mortgage fraud. When the dollar is worthless and is awaiting its replacement (e.g. the Amero or the Worldo), real estate will be more valuable than gold.
  • Other big game that is being hunted by both sides in the coming civil war will be bank accounts, which must be looted before the dormant computer digits we call money can be converted into hard assets. That is why my advice is, and has been, convert your cash into tangible assets which can enhance your survivability in the upcoming crash.
  • Also, your pensions, your 401K’s and your various entitlement programs are also at risk as evidenced by Secretary of Treasury Jack Lew’s “borrowing” from various Federal retirement accounts in order to increase the debt ceiling fight that will resurface in Congress, again, early next year.
  • Again, my advice is to convert your assets in tangible items which will aid in getting you through some very dark days coming up in the near future.
  • Before the cognitive dissonance crowd rears their ugly heads and accuses me of fear mongering, ask yourself what the elite did prior to the crash of the economy in 1929. For example, Joseph Kennedy took his money out of the stock market the day BEFORE it crashed. Vanderbilt, Rockefeller, Westinghouse, et al., all took their money out just prior to the crash, leaving the ignorant masses unaware of what was coming. Don’t make the same mistake.
  • I have news for you, there are Federal officials in every town, city and county in America. If one violates HR 347, they will be immediately arrested and charged with a felony.
  • The NDAA constitutes another big fence being built around the people in which all due process will soon be gone. The NDAA will allow the administration the “legal” right to secretly remove any burgeoning leadership of citizen opposition forces.
  • There are three paramount numbers that every American should be paying attention to and they are (1) national deficit ($17 trillion dollars), (2) the unfunded liabilities debt ($238 trillion dollars), and (3) the derivatives/futures debt (one quadrillion dollars which is 16 times the entire wealth of the planet.
  • In short, this spells the potential enslavement of the American people.
  • For those of you who still have your blinders on, research the NDAA and EO 13603 and then when you realize that I am correct in my interpretation, ask yourself one question; If the powers that be were not going to seize every important asset, then why would the government give itself the power to do just that?
  • And while you are at it, remember the Clean Water Act gives the EPA to control all private property as well as the precious resources of all water. And then of course, the FDA and the conflicts with local farmers is escalating.
  • And if this is not enough to convince the sheep of this country that the storm clouds are overhead, then take a look at HR 347 which outlaws protesting and takes away the First Amendment. This unconstitutional legislation makes it illegal to criticize the President and the government, as a whole, in the presence of Federal officials.
  • The second provision which will allow this country to quickly transition to martial law is Executive Order (EO) 13603 which allows the President to take control over any resource, property and even human labor within the United States. This EO gives the President unlimited authority including the ability to initiate a civilian draft as well as a military draft.
  • I just saw the Hunger Games sequel, Catching Fire, and this is eerily similar to what I saw in the movies in that the people are being provoked to revolution.
  • in the TV show, Revolution, the most evil entity in the series is the re-emergence of the United States government and the heroes of the show are rebelling against the abuse.
  • It seems like everywhere we turn in the media, the people are being encouraged to rise up now and challenge authority. I am sure the establishment would rather confront a small group of dissidents and squelch the rebellion now, before the numbers can become significant and overwhelming to the establishment and this theme is being carried out in the media.
  • The final action will consist of gun confiscation and one side of the coming conflict is attempting to position themselves to do that in the near future and that would be the DHS, the Russians and the Chinese.
  • I cannot think of another legitimate reason which would describe why they are here.
  •  
    While I'd be the first to agree that the degree of fiscal mismanagement of this nation's economy is beyond insane and have to admit that I see very little to admire in Barack Obama's presidency, the meme about Executive Order 13603 authorizing confiscation of any property and enslavement of the American public needs to be put to rest. See http://www.archives.gov/federal-register/executive-orders/2012.html#13603 E.O. 13603 is not much more than an updating of similar executive orders issued by prior presidents beginning with Dwight Eisenhower. In fact, in skimming it a few minutes ago, I didn't see anything drastically different from some of the prior related orders. E.g., it reflects that a bunch of agencies that were formerly either independent or under other departments are now under the newish Department of Homeland Security, whose Secretary now gets the authority formerly delegated to other department and agency heads. If blame must be cast, it belongs on the Congress that enacted the Defense Production Act of 1950, 50 U.S.C. 2061, et seq. The executive order does no more than obey that Act's instructions. For example there is a section authorizing pre-emption of manufacturing capacity of critical industries over any existing civilian contracts in the event of a national emergency, but that language is in the statute as well. But that power hasn't had much traction since Harry Truman tried to nationalize the steel industry to break a nationwide strike. The Supreme Court swatted down that effort as an abuse of a power that would be lawful in a true emergency, like another major. But even that semi-radical "survival" power is ameliorated by other provisions of the statute and the order that authorize loan guarantees for companies' construction and maintenance of critical productive capacity. Much of that has been implemented over the years as outright grants. So for example, many chemical manufacturing plants were built with Defense Production Act funds, with
Paul Merrell

Data-sharing among US law agencies amounts to 'organised chaos' - report | World news |... - 0 views

  • The sharing of crucial intelligence about counter-terrorism between the FBI, the Department of Homeland Security and local police departments takes place through a patchwork process that amounts to “organized chaos”, according to a new report. The report, released Tuesday by the Brennan Center for Justice, a public-policy institute at New York University law school that has a track record of being skeptical of government surveillance, found inconsistent rules, inadequate oversight, apparent wastefulness and insufficient regard for civil liberties nationwide. “This poorly organized system not only wastes time and resources; it also risks masking reliable intelligence that could be crucial to an investigation,” the report says, warning that a “din of data” is overwhelming law enforcement.
  • The Brennan Center report examined 16 major police departments across the US, along with 19 affiliated “fusion centers” – controversial data-sharing pools between federal, state and local agencies – and 14 of the FBI’s joint terrorism task force partnerships with police.
  • Despite efforts by the Department of Homeland Security, most of the fusion centers operate with “minimal oversight, or no oversight whatsoever”, the report found. Out of 19 centers reviewed, only five require independent audits of retained data.
  • ...3 more annotations...
  • Fusion centers have been the subject of criticism from both civil libertarians and powerful elected officials. A 2012 investigation by the bipartisan Senate permanent subcommittee on investigations of more than 80,000 fusion center documents could not find any contribution the centers had made to “disrupt[ing] an active terrorist plot”. DHS disputes the results of that investigation, as do several legislators on committees overseeing the department. Senator Tom Coburn, an Oklahoman who serves as the top Republican on the Senate government reform and homeland security committee, has emerged as a leading legislative critic of fusion centers and joint terrorism task forces, for many of the same reasons detailed in the Brennan Center report. After a government inquiry indicated many federal data-sharing efforts were duplicative, Coburn issued a statement in April calling them “a vital component of national security”, but adding, “that is not an excuse to waste taxpayer funds”.
  • And all that information is on top of the fruits of the NSA’s vast data collection efforts, which are not entirely off limits to federal law enforcement. The controversial bulk collection of Americans’ phone data has been repeatedly described by the NSA as a tool to aid the FBI in detecting domestic terrorism activity. NSA deputy director John C Inglis recently stated that the FBI cannot search directly through the NSA’s data troves, but the agency shares telephone metadata with the bureau following searches through its databases based on “reasonable articulable suspicion” of connections to specific terrorist organizations.
  • The Brennan Center report did not specifically analyze law enforcement tower dumps, but Price called the reports of them alarming. “This is another indication of the vast trove of information that state and local police are collecting about law abiding Americans,” Price said. “To date, that information does not appear to be particularly useful in preventing terror attacks.”
  •  
    The ongoing federalization of state and local law enforcement continues unabated. Today's "fusion centers" have antecedents in the regional "intelligence centers" begun under the guise of Reagan's War on Drugs™, but shifted into a much higher gear under the guise of Bush II's War on Terror™.
Paul Merrell

Hillary Clinton: we need to talk sensibly about spying | World news | The Guardian - 0 views

  • Hillary Clinton has called for a "sensible adult conversation", to be held in a transparent way, about the boundaries of state surveillance highlighted by the leaking of secret NSA files by the whistleblower Edward Snowden.In a boost to Nick Clegg, the British deputy prime minister, who is planning to start conversations within government about the oversight of Britain's intelligence agencies, the former US secretary of state said it would be wrong to shut down a debate.Clinton, who is seen as a frontrunner for the 2016 US presidential election, said at Chatham House in London: "This is a very important question. On the intelligence issue, we are democracies thank goodness, both the US and the UK."We need to have a sensible adult conversation about what is necessary to be done, and how to do it, in a way that is as transparent as it can be, with as much oversight and citizens' understanding as there can be."
  • In her remarks, Clinton did not comment on the UK's oversight arrangements. But she indicated she was wholly supportive of the approach adopted by Barack Obama who – in contrast to Downing Street – has said he welcomes a debate on surveillance in the wake of the NSA leaks.Answering a question from the Guardian at Chatham House, she said the discussion had to take place within a framework that addressed issues of privacy and protection of citizens because some surveillance programmes remained a "really critical ingredient in our homeland security."Clinton, who is considering whether to make her second challenge for the Democratic presidential nomination, added: "It would be going down a wrong path if we were to reject the importance of the debate, and the kinds of intelligence activities that genuinely keep us safe."So how do we sort all of this out? This is a problem that is well over a decade old, where these capacities have corresponded with increasing outreach to consumers on the business side and increasing concern about security on the government side. People need to be better informed."
  •  
    Some surveillance programmes remained a "really critical ingredient in our homeland security." So the politics of fear and faux terrorism is more important to Hillary than civil liberties. There is only one political party in the U.S., the War Party.
Paul Merrell

The Fake Terror Threat Used To Justify Bombing Syria - The Intercept - 0 views

  • As the Obama Administration prepared to bomb Syria without congressional or U.N. authorization, it faced two problems. The first was the difficulty of sustaining public support for a new years-long war against ISIS, a group that clearly posed no imminent threat to the “homeland.” A second was the lack of legal justification for launching a new bombing campaign with no viable claim of self-defense or U.N. approval. The solution to both problems was found in the wholesale concoction of a brand new terror threat that was branded “The Khorasan Group.” After spending weeks depicting ISIS as an unprecedented threat — too radical even for Al Qaeda! — administration officials suddenly began spoon-feeding their favorite media organizations and national security journalists tales of a secret group that was even scarier and more threatening than ISIS, one that posed a direct and immediate threat to the American Homeland. Seemingly out of nowhere, a new terror group was created in media lore.
Paul Merrell

ISIS: Potentially 'Thousands' of Online Followers Inside US Homeland, FBI Chief Warns -... - 0 views

  • There may be as many as thousands of people inside the United States consuming online “poison” from ISIS alone, and, “I know there are other Elton Simpsons out there,” FBI director James Comey warned today, referring to one of the men who opened fire outside of an event in Texas earlier this week celebrating artists’ portrayals of the Prophet Mohammad. “We have a very hard task” in trying to identify and stop anyone inspired to launch an attack inside the U.S. homeland, Comey told ABC News’ Pierre Thomas and a small group of reporters. Such efforts have become particularly challenging because ISIS has reconfigured and redefined terrorist recruitment, according to Comey. In fact, while the FBI is trying to find that so-called needle in a haystack, “increasingly the needles are invisible to us,” he said.
  • As recently as two years ago, someone in the United States who wanted to consume “radical poisonous propaganda” would have to seek that out on the Internet, most likely on a jihadist web forum. So the FBI focused its investigative efforts on those jihadist web forums, Comey said. But “that has changed dramatically, especially with [ISIS] and their use of social media,” where on phones in people’s pockets they ask Americans and other foreigners “to travel to the so-called caliphate to fight” but simultaneously say, “If you can’t travel, kill where you are,” according to Comey.
  • “It’s almost as if there is a devil sitting on the shoulder saying, ‘Kill, kill, kill, kill’ all day long,” he said. “[They are] recruiting and tasking at the same time. … In a way, the old paradigm between ‘inspired’ and ‘directed’ breaks down here." And with that distinction “no longer relevant," is it all the more challenging for the FBI to determine whether someone seeking jihadist propaganda online or even promoting themselves is “a talker or a doer,” as Comey described it. There’s also the question, “Where are they on the pathway from ‘talker’ to ‘doer’? And that’s really hard,” Comey added. Those are the exact types of questions the FBI faced with Simpson. Comey acknowledged today that Simpson had been under FBI watch since 2006, when the agency opened an investigation on the Phoenix-area man based on information suggesting he wanted to join al-Shabab, the al Qaeda-linked group in Somalia. Simpson was ultimately indicted on terrorism charges and convicted, but due to questions over the government’s case he never went to prison and was sentenced to probation. The FBI officially closed its case into Simpson last year.
Paul Merrell

Czech and Slovak Reservists Memorandum against NATO. "We Reject Fighting in NATO Ranks ... - 0 views

  • On January 19th 2015 the facebook group, which combines all members of the CSLA, PS, VMV, SNB in reserve or decommissioned, issued an important memorandum, which has become even more urgent in light of the situation today. A defensive back up location in the event that the group gets „disappeared“ from Facebook, the group of the same name exists on VK.com. as well. For the first time since the end of the 2nd World War we see a genuine threat of war yet again. Consequently, we consider it necessary to issue the following statement. We, the Czechoslovak soldiers in reserve, unanimously reject any participation in battles that are geopolitical acts of aggression of the global elite by way of NATO and the support of our governments. We swore to defend our homeland the Czech and Slovak Republics. We swore to protect the freedom and independence of our proud and sovereign nations, for which our ancestors laid down their lives in the world wars. We are guided by this oath in a civilian initiative to deal with a crisis situation. Freedom and independence is being jeopardized long time by a system of representative pseudo-democracy, where an elected representative does not have the obligation to advance the interests of voters and in practice, laws represent but the personal interests of the legislators, the interests of political parties and economic interest groups. Our homeland is under the pressure of global elites and economic interest groups, who are doing away with the power of citizens through a system of representative democracy.
  • Our deliberately flawed constitution and charter of rights and freedoms is being perverted and constitutional laws are violated by legislators themselves. Legislative power is being privatized, executive power is being politicized and judicial power corrupted by lobbying laws and pressure from our governments. The results are an unplayable public deficit, deindustrialization, the privatization of the republic’s property and defrauded budgets, food and energy dependence, the privatization of natural resources, pensions and the health of citizens. Our country has been unlawfully divided, looted, indebted, people enslaved and their families liquidated by repossession genocide, national infrastructure transferred into the hands of western corporations. Destructive chaos and despair dominates in the community. For this reason, we the Czechoslovak soldiers in reserve recognize our military oath and together we come with a vision for the defense of our nations. We unequivocally reject fighting in the ranks of NATO against the Russian federation or other Slavic nations and we likewise intend to stand up firmly through organized civilian pressure against the further liquidation of our democracy, freedom and independence. We are uniting in a crisis situation and by utilizing our civilian and military skills and expertise we intend to create sufficiently strong, organized civil pressure for the period of time necessary to assert our patriotic goals. We swore allegiance to our homeland, the Czech and Slovak Republics. We, the Czechoslovak reserve soldiers, will fulfill this oath!
  •  
    If true, U.S. hegemony and NATO just took another big hit. What if they gave a war and nobody came?
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
1 - 20 of 152 Next › Last »
Showing 20 items per page