Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged internal-security

Rss Feed Group items tagged

Paul Merrell

Hamid Karzai International Airport - Wikipedia, the free encyclopedia - 0 views

  • Hamid Karzai International Airport (Persian: میدان هوائی بین المللی حامدکرزی‎‎, Pashto: د حامدکرزی نړيوال هوائي ډګر‎, IATA: KBL, ICAO: OAKB), also known as Kabul International Airport (real name Kabul Khwaja Rawash International Airport), is located 5 kilometers (3.1 mi) from the city center of Kabul in Afghanistan. It serves as one of the nation's main international airports and as one of the largest military bases, capable of housing over one hundred aircraft. It was given the new name in October 2014 in honor of former President Hamid Karzai. The decision was made by the National Assembly of Afghanistan and the Cabinet of President Ashraf Ghani.[2] The airport has been expanded and modernized in the last decade. A new international terminal (which has free wi-fi) was added and the older terminal is now used for domestic flights. A number of military bases were also built around the airport, which are used by the United States Armed Forces and NATO's International Security Assistance Force (ISAF). The military of Afghanistan also has a base there, while the Afghan National Police provide security inside the passenger terminals. As of March 2015 the most frequently serviced destination from the airport was Dubai-International with no less than five passenger airlines flying the route, some with multiple daily flights.
  • Hamid Karzai International Airport (Persian: میدان هوائی بین المللی حامدکرزی‎‎, Pashto: د حامدکرزی نړيوال هوائي ډګر‎, IATA: KBL, ICAO: OAKB), also known as Kabul International Airport (real name Kabul Khwaja Rawash International Airport), is located 5 kilometers (3.1 mi) from the city center of Kabul in Afghanistan. It serves as one of the nation's main international airports and as one of the largest military bases, capable of housing over one hundred aircraft. It was given the new name in October 2014 in honor of former President Hamid Karzai. The decision was made by the National Assembly of Afghanistan and the Cabinet of President Ashraf Ghani.[2] The airport has been expanded and modernized in the last decade. A new international terminal (which has free wi-fi) was added and the older terminal is now used for domestic flights. A number of military bases were also built around the airport, which are used by the United States Armed Forces and NATO's International Security Assistance Force (ISAF). The military of Afghanistan also has a base there, while the Afghan National Police provide security inside the passenger terminals. As of March 2015 the most frequently serviced destination from the airport was Dubai-International with no less than five passenger airlines flying the route, some with multiple daily flights.
  • 3 Airlines and destinations 3.1 Passenger 3.2 Cargo
  •  
    Interesting factoid to remember: "As of March 2015 the most frequently serviced destination from the airport was Dubai-International with no less than five passenger airlines flying the route, some with multiple daily flights." Also two cargo routes, according to the fine print. Dubai is the largest city in United Arab Emirates. Any reason that route should get flown so much other than Dubai being a travel hub?
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Gary Edwards

Mideast war in March? - 1 views

  • NATO war in Syria in March? Meanwhile, according to the Middle Eastern diplomatic and security officials speaking to WND, the international community is considering launching NATO airstrikes on Assad’s forces as soon as March if the opposition does not make major strides toward ending Assad’s regime. The NATO members, however, have been satisfied with the momentum of the opposition in the last few days, which saw a number of defectors from the Syrian military join the rebels, a move that also precipitated the downfall of Muammar Gadhafi’s regime before the NATO campaign in Libya. Similar to Gadhafi, Assad’s regime has been accused of major human rights violations, including crimes against humanity, in clamping down on a violent insurgency targeting his rule.
  • Mass demonstrations were held in recent weeks in Syrian insurgent strongholds calling for the international NATO coalition in Libya to deploy in Syria. Just yesterday, 50 foreign ministers from Western and Arab nations got together in Tunis to demand that Syria allow aid to be delivered to civilians in the absence of any international force to resolve the conflict. Damascus officials claimed to WND that NATO troops are currently training in Turkey for a Turkish-led NATO invasion of Syria.
  • Any deployment would most likely come under the banner of the same “Responsibility to Protect” global doctrine used to justify the U.S.-NATO airstrikes in Libya.
  • ...3 more annotations...
  • Responsibility to Protect, or Responsibility to Act, as cited by President Obama, is a set of principles, now backed by the United Nations, based on the idea that sovereignty is not a privilege but a responsibility that can be revoked if a country is accused of “war crimes,” “genocide,” “crimes against humanity” or “ethnic cleansing.”
  • George Soros-funded doctrine
  • In his address to the nation in April explaining the NATO campaign in Libya, Obama cited Responsibility to Protect doctrine as the main justification for U.S. and international airstrikes against Libya. The Global Center for Responsibility to Protect is the world’s leading champion of the military doctrine. As WND reported, billionaire activist George Soros is a primary funder and key proponent of the Global Center for Responsibility to Protect. Several of the doctrine’s main founders also sit on boards with Soros.
  •  
    Marbux is right - this report is filled with stunning information! "TEL AVIV - NATO countries are strongly considering the possibility of an international deployment to Syria if the Syrian opposition does not make major advances in the next few weeks, according to informed Middle Eastern diplomatic and security officials. Egyptian security officials, meanwhile, outlined what they said was large scale international backing for the rebels attacking the embattled regime of Syrian President Bashar Assad - including arms and training from the U.S., Turkey, Jordan and Saudi Arabia."
  •  
    One key point is that this article was published on February 24, 2012, long before the false flag sarin gas attack in late August of 2013 that was falsely attributed to the Assad government of Syria. Planning for a Libya-like NATO invasion of Syria was underway long before that attack. And the report gives us the information that the shipment of arms to and training of the Syrian opposition was already underway at that early date, if the report is accurate. All such activities were later confirmed by mainstream media, although I have not found any such reports that provide a beginning date. Hence the value of this report. The report also goes into some detail on the emerging international law norm of Responsibility to Protect ("RTP"), but misses some key aspects. RTP doctrine was an innovation in international law in response to massive genocidal events such as the Rwandan and Srebrenica Massacres. As international law stood before RTP, what happened entirely within the borders of a nation was an aspect of national sovereignty that international law could not interfere with. RTP cracked that barrier, holding that some human rights were so important that they deserved protection by international law, therefore the United Nations Security Council would be empowered to authorize intervention in cases involving wholly domestic genocide, war crimes, ethnic cleansing, and crimes against humanity. But omitted from the article is the fact that it is a doctrine to be exercised only by the U.N. Security Council; individual nations gain no license under the doctrine to launch their own wars to protect the citizens of another nation, whether directly or through proxies such as jihadi mercenaries. Russia has, quite properly in my opinion, vetoed U.S. sponsored draft resolutions based on RTP for Security Council authorization to intervene in Syria, because the U.S. is already an unlawful belligerent in Syria and because the U.S. so severely abused the Security Council's RTP r
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Gary Edwards

The obscure legal system that lets corporations sue countries | Claire Provost and Matt... - 0 views

  • Every year on 15 September, thousands of Salvadorans celebrate the date when much of Central America gained independence from Spain. Fireworks are set off and marching bands parade through villages across the country. But, last year, in the town of San Isidro, in Cabañas, the festivities had a markedly different tone. Hundreds had gathered to protest against the mine. Gold mines often use cyanide to separate gold from ore, and widespread concern over already severe water contamination in El Salvador has helped fuel a powerful movement determined to keep the country’s minerals in the ground. In the central square, colourful banners were strung up, calling on OceanaGold to drop its case against the country and leave the area. Many were adorned with the slogan, “No a la mineria, Si a la vida” (No to mining, Yes to life). On the same day, in Washington DC, Parada gathered his notes and shuffled into a suite of nondescript meeting rooms in the World Bank’s J building, across the street from its main headquarters on Pennsylvania Avenue. This is the International Centre for the Settlement of Investment Disputes (ICSID): the primary institution for handling the cases that companies file against sovereign states. (The ICSID is not the sole venue for such cases; there are similar forums in London, Paris, Hong Kong and the Hague, among others.) The date of the hearing was not a coincidence, Parada said. The case has been framed in El Salvador as a test of the country’s sovereignty in the 21st century, and he suggested that it should be heard on Independence Day. “The ultimate question in this case,” he said, “is whether a foreign investor can force a government to change its laws to please the investor as opposed to the investor complying with the laws they find in the country.”
  • Most international investment treaties and free-trade deals grant foreign investors the right to activate this system, known as investor-state dispute settlement (ISDS), if they want to challenge government decisions affecting their investments. In Europe, this system has become a sticking point in negotiations over the controversial Transatlantic Trade and Investment Partnership (TTIP) deal proposed between the European Union and the US, which would massively extend its scope and power and make it harder to challenge in the future. Both France and Germany have said that they want access to investor-state dispute settlement removed from the TTIP treaty currently under discussion. Investors have used this system not only to sue for compensation for alleged expropriation of land and factories, but also over a huge range of government measures, including environmental and social regulations, which they say infringe on their rights. Multinationals have sued to recover money they have already invested, but also for alleged lost profits and “expected future profits”. The number of suits filed against countries at the ICSID is now around 500 – and that figure is growing at an average rate of one case a week. The sums awarded in damages are so vast that investment funds have taken notice: corporations’ claims against states are now seen as assets that can be invested in or used as leverage to secure multimillion-dollar loans. Increasingly, companies are using the threat of a lawsuit at the ICSID to exert pressure on governments not to challenge investors’ actions.
  • “I had absolutely no idea this was coming,” Parada said. Sitting in a glass-walled meeting room in his offices, at the law firm Foley Hoag, he paused, searching for the right word to describe what has happened in his field. “Rogue,” he decided, finally. “I think the investor-state arbitration system was created with good intentions, but in practice it has gone completely rogue.”
  • ...13 more annotations...
  • The quiet village of Moorburg in Germany lies just across the river from Hamburg. Past the 16th-century church and meadows rich with wildflowers, two huge chimneys spew a steady stream of thick, grey smoke into the sky. This is Kraftwerk Moorburg, a new coal-fired power plant – the village’s controversial next-door neighbour. In 2009, it was the subject of a €1.4bn investor-state case filed by Vattenfall, the Swedish energy giant, against the Federal Republic of Germany. It is a prime example of how this powerful international legal system, built to protect foreign investors in developing countries, is now being used to challenge the actions of European governments as well. Since the 1980s, German investors have sued dozens of countries, including Ghana, Ukraine and the Philippines, at the World Bank’s Centre in Washington DC. But with the Vattenfall case, Germany found itself in the dock for the first time. The irony was not lost on those who considered Germany to be the grandfather of investor-state arbitration: it was a group of German businessmen, in the late 1950s, who first conceived of a way to protect their overseas investments as a wave of developing countries gained independence from European colonial powers. Led by Deutsche Bank chairman Hermann Abs, they called their proposal an “international magna carta” for private investors.
  • In the 1960s, the idea was taken up by the World Bank, which said that such a system could help the world’s poorer countries attract foreign capital. “I am convinced,” the World Bank president George Woods said at the time, “that those … who adopt as their national policy a welcome [environment] for international investment – and that means, to mince no words about it, giving foreign investors a fair opportunity to make attractive profits – will achieve their development objectives more rapidly than those who do not.” At the World Bank’s 1964 annual meeting in Tokyo, it approved a resolution to set up a mechanism for handling investor-state cases. The first line of the ICSID Convention’s preamble sets out its goal as “international cooperation for economic development”. There was sharp opposition to this system from its inception, with a bloc of developing countries warning that it would undermine their sovereignty. A group of 21 countries – almost every Latin American country, plus Iraq and the Philippines – voted against the proposal in Tokyo. But the World Bank moved ahead regardless. Andreas Lowenfeld, an American legal academic who was involved in some of these early discussions, later remarked: “I believe this was the first time that a major resolution of the World Bank had been pressed forward with so much opposition.”
  • now governments are discovering, too late, the true price of that confidence. The Kraftwerk Moorburg plant was controversial long before the case was filed. For years, local residents and environmental groups objected to its construction, amid growing concern over climate change and the impact the project would have on the Elbe river. In 2008, Vattenfall was granted a water permit for its Moorburg project, but, in response to local pressure, local authorities imposed strict environmental conditions to limit the utility’s water usage and its impact on fish. Vattenfall sued Hamburg in the local courts. But, as a foreign investor, it was also able to file a case at the ICSID. These environmental measures, it said, were so strict that they constituted a violation of its rights as guaranteed by the Energy Charter Treaty, a multilateral investment agreement signed by more than 50 countries, including Sweden and Germany. It claimed that the environmental conditions placed on its permit were so severe that they made the plant uneconomical and constituted acts of indirect expropriation.
  • With the rapid growth in these treaties – today there are more than 3,000 in force – a specialist industry has developed in advising companies how best to exploit treaties that give investors access to the dispute resolution system, and how to structure their businesses to benefit from the different protections on offer. It is a lucrative sector: legal fees alone average $8m per case, but they have exceeded $30m in some disputes; arbitrators’ fees at start at $3,000 per day, plus expenses.
  • Vattenfall v Germany ended in a settlement in 2011, after the company won its case in the local court and received a new water permit for its Moorburg plant – which significantly lowered the environmental standards that had originally been imposed, according to legal experts, allowing the plant to use more water from the river and weakening measures to protect fish. The European Commission has now stepped in, taking Germany to the EU Court of Justice, saying its authorisation of the Moorburg coal plant violated EU environmental law by not doing more to reduce the risk to protected fish species, including salmon, which pass near the plant while migrating from the North Sea. A year after the Moorburg case closed, Vattenfall filed another claim against Germany, this time over the federal government’s decision to phase out nuclear power. This second suit – for which very little information is available in the public domain, despite reports that the company is seeking €4.7bn from German taxpayers – is still ongoing. Roughly one third of all concluded cases filed at the ICSID are recorded as ending in “settlements”, which – as the Moorburg dispute shows – can be very profitable for investors, though their terms are rarely fully disclosed.
  • “It was a total surprise for us,” the local Green party leader Jens Kerstan laughed, in a meeting at his sunny office in Hamburg last year. “As far as I knew, there were some [treaties] to protect German companies in the [developing] world or in dictatorships, but that a European company can sue Germany, that was totally a surprise to me.”
  • While a tribunal cannot force a country to change its laws, or give a company a permit, the risk of massive damages may in some cases be enough to persuade a government to reconsider its actions. The possibility of arbitration proceedings can be used to encourage states to enter into meaningful settlement negotiations.
  • A small number of countries are now attempting to extricate themselves from the bonds of the investor-state dispute system. One of these is Bolivia, where thousands of people took to the streets of the country’s third-largest city, Cochabamba, in 2000, to protest against a dramatic hike in water rates by a private company owned by Bechtel, the US civil engineering firm. During the demonstrations, the Bolivian government stepped in and terminated the company’s concession. The company then filed a $50m suit against Bolivia at the ICSID. In 2006, following a campaign calling for the case to be thrown out, the company agreed to accept a token payment of less than $1. After this expensive case, Bolivia cancelled the international agreements it had signed with other states giving their investors access to these tribunals. But getting out of this system is not easily done. Most of these international agreements have sunset clauses, under which their provisions remain in force for a further 10 or even 20 years, even if the treaties themselves are cancelled.
  • There are now thousands of international investment agreements and free-trade acts, signed by states, which give foreign companies access to the investor-state dispute system, if they decide to challenge government decisions. Disputes are typically heard by panels of three arbitrators; one selected by each side, and the third agreed upon by both parties. Rulings are made by majority vote, and decisions are final and binding. There is no appeals process – only an annulment option that can be used on very limited grounds. If states do not pay up after the decision, their assets are subject to seizure in almost every country in the world (the company can apply to local courts for an enforcement order).
  • While there is no equivalent of legal aid for states trying to defend themselves against these suits, corporations have access to a growing group of third-party financiers who are willing to fund their cases against states, usually in exchange for a cut of any eventual award.
  • Increasingly, these suits are becoming valuable even before claims are settled. After Rurelec filed suit against Bolivia, it took its case to the market and secured a multimillion-dollar corporate loan, using its dispute with Bolivia as collateral, so that it could expand its business. Over the last 10 years, and particularly since the global financial crisis, a growing number of specialised investment funds have moved to raise money through these cases, treating companies’ multimillion-dollar claims against states as a new “asset class”.
  • El Salvador has already spent more than $12m defending itself against Pacific Rim, but even if it succeeds in beating the company’s $284m claim, it may never recover these costs. For years Salvadoran protest groups have been calling on the World Bank to initiate an open and public review of ICSID. To date, no such study has been carried out. In recent years, a number of ideas have been mooted to reform the international investor-state dispute system – to adopt a “loser pays” approach to costs, for example, or to increase transparency. The solution may lie in creating an appeals system, so that controversial judgments can be revisited.
  • Brazil has never signed up to this system – it has not entered into a single treaty with these investor-state dispute provisions – and yet it has had no trouble attracting foreign investment.
  •  
    "Luis Parada's office is just four blocks from the White House, in the heart of K Street, Washington's lobbying row - a stretch of steel and glass buildings once dubbed the "road to riches", when influence-peddling became an American growth industry. Parada, a soft-spoken 55-year-old from El Salvador, is one of a handful of lawyers in the world who specialise in defending sovereign states against lawsuits lodged by multinational corporations. He is the lawyer for the defence in an obscure but increasingly powerful field of international law - where foreign investors can sue governments in a network of tribunals for billions of dollars. Fifteen years ago, Parada's work was a minor niche even within the legal business. But since 2000, hundreds of foreign investors have sued more than half of the world's countries, claiming damages for a wide range of government actions that they say have threatened their profits. In 2006, Ecuador cancelled an oil-exploration contract with Houston-based Occidental Petroleum; in 2012, after Occidental filed a suit before an international investment tribunal, Ecuador was ordered to pay a record $1.8bn - roughly equal to the country's health budget for a year. (Ecuador has logged a request for the decision to be annulled.) Parada's first case was defending Argentina in the late 1990s against the French conglomerate Vivendi, which sued after the Argentine province of Tucuman stepped in to limit the price it charged people for water and wastewater services. Argentina eventually lost, and was ordered to pay the company more than $100m. Now, in his most high-profile case yet, Parada is part of the team defending El Salvador as it tries to fend off a multimillion-dollar suit lodged by a multinational mining company after the tiny Central American country refused to allow it to dig for gold."
Paul Merrell

No, Israel Does Not Have the Right to Self-Defense In International Law Against Occupie... - 0 views

  • On the fourth day of Israel's most recent onslaught against Gaza's Palestinian population, President Barack Obama declared, “No country on Earth would tolerate missiles raining down on its citizens from outside its borders.” In an echo of Israeli officials, he sought to frame Israel's aerial missile strikes against the 360-square kilometer Strip as the just use of armed force against a foreign country. Israel's ability to frame its assault against territory it occupies as a right of self-defense turns international law on its head.  A state cannot simultaneously exercise control over territory it occupies and militarily attack that territory on the claim that it is “foreign” and poses an exogenous national security threat. In doing precisely that, Israel is asserting rights that may be consistent with colonial domination but simply do not exist under international law. 
  • Admittedly, the enforceability of international law largely depends on voluntary state consent and compliance. Absent the political will to make state behavior comport with the law, violations are the norm rather than the exception. Nevertheless, examining what international law says with regard to an occupant’s right to use force is worthwhile in light of Israel's deliberate attempts since 1967 to reinterpret and transform the laws applicable to occupied territory. These efforts have expanded significantly since the eruption of the Palestinian uprising in 2000, and if successful, Israel’s reinterpretation would cast the law as an instrument that protects colonial authority at the expense of the rights of civilian non-combatants.  
  • International Law places the responsibility upon the commanding general of preserving order, punishing crime, and protecting lives and property within the occupied territory. His power in accomplishing these ends is as great as his responsibility.  The extent and breadth of force constitutes the distinction between the right to self-defense and the right to police. Police authority is restricted to the least amount of force necessary to restore order and subdue violence. In such a context, the use of lethal force is legitimate only as a measure of last resort. Even where military force is considered necessary to maintain law and order, such force is circumscribed by concern for the civilian non-combatant population. The law of self-defense, invoked by states against other states, however, affords a broader spectrum of military force. Both are legitimate pursuant to the law of armed conflict and therefore distinguished from the peacetime legal regime regulated by human rights law. 
  • ...5 more annotations...
  • Military occupation is a recognized status under international law and since 1967, the international community has designated the West Bank and the Gaza Strip as militarily occupied. As long as the occupation continues, Israel has the right to protect itself and its citizens from attacks by Palestinians who reside in the occupied territories. However, Israel also has a duty to maintain law and order, also known as “normal life,” within territory it occupies. This obligation includes not only ensuring but prioritizing the security and well-being of the occupied population. That responsibility and those duties are enumerated in Occupation Law.  Occupation Law is part of the laws of armed conflict; it contemplates military occupation as an outcome of war and enumerates the duties of an occupying power until the peace is restored and the occupation ends. To fulfill its duties, the occupying power is afforded the right to use police powers, or the force permissible for law enforcement purposes. As put by the U.S. Military Tribunal during the Hostages Trial (The United States of America vs. Wilhelm List, et al.)
  • When It Is Just to Begin to Fight  The laws of armed conflict are found primarily in the Hague Regulations of 1907, the Four Geneva Conventions of 1949, and their Additional Protocols I and II of 1977. This body of law is based on a crude balance between humanitarian concerns on the one hand and military advantage and necessity on the other. The post-World War II Nuremberg trials defined military exigency as permission to expend “any amount and kind of force to compel the complete submission of the enemy…” so long as the destruction of life and property is not done for revenge or a lust to kill. Thus, the permissible use of force during war, while expansive, is not unlimited.  In international law, self-defense is the legal justification for a state to initiate the use of armed force and to declare war. This is referred to as jus ad bellum—meaning “when it is just to begin to fight.” The right to fight in self-defense is distinguished from jus in bello, the principles and laws regulating the means and methods of warfare itself. Jus ad bellum aims to limit the initiation of the use of armed force in accordance with United Nations Charter Article 2(4); its sole justification, found in Article 51, is in response to an armed attack (or an imminent threat of one in accordance with customary law on the matter). The only other lawful way to begin a war, according to Article 51, is with Security Council sanction, an option reserved—in principle, at least—for the defense or restoration of international peace and security.
  • Once armed conflict is initiated, and irrespective of the reason or legitimacy of such conflict, the jus in bello legal framework is triggered. Therefore, where an occupation already is in place, the right to initiate militarized force in response to an armed attack, as opposed to police force to restore order, is not a remedy available to the occupying state. The beginning of a military occupation marks the triumph of one belligerent over another. In the case of Israel, its occupation of the West Bank, the Gaza Strip, the Golan Heights, and the Sinai in 1967 marked a military victory against Arab belligerents.  Occupation Law prohibits an occupying power from initiating armed force against its occupied territory. By mere virtue of the existence of military occupation, an armed attack, including one consistent with the UN Charter, has already occurred and been concluded. Therefore the right of self-defense in international law is, by definition since 1967, not available to Israel with respect to its dealings with real or perceived threats emanating from the West Bank and Gaza Strip population. To achieve its security goals, Israel can resort to no more than the police powers, or the exceptional use of militarized force, vested in it by IHL. This is not to say that Israel cannot defend itself—but those defensive measures can neither take the form of warfare nor be justified as self-defense in international law. As explained by Ian Scobbie:  
  • To equate the two is simply to confuse the legal with the linguistic denotation of the term ”defense.“ Just as ”negligence,“ in law, does not mean ”carelessness” but, rather, refers to an elaborate doctrinal structure, so ”self-defense” refers to a complex doctrine that has a much more restricted scope than ordinary notions of ”defense.“  To argue that Israel is employing legitimate “self-defense” when it militarily attacks Gaza affords the occupying power the right to use both police and military force in occupied territory. An occupying power cannot justify military force as self-defense in territory for which it is responsible as the occupant. The problem is that Israel has never regulated its own behavior in the West Bank and Gaza as in accordance with Occupation Law. 
  • Noura Erakat
Paul Merrell

CSIS asked foreign agencies to spy on Canadians, kept court in dark, judge says - 0 views

  • OTTAWA — Canada’s foremost jurist on national security law has slammed CSIS for deliberately keeping the Federal Court of Canada “in the dark” about outsourcing its spying on Canadians abroad to foreign agencies, according to a redacted version of a classified court decision made public Friday.In a thundering rebuke, Federal Court Judge Richard Mosley said the Canadian Security Intelligence Service (CSIS) purposely misled him when he granted it numerous warrants beginning in 2009 to intercept the electronic communications of unidentified Canadians abroad suspected as domestic security threats.“This was a breach of the duty of candour owed by the service and their legal advisers to the court,” Mosley said in his Further Reasons for Order.CSIS also mistakenly assigned powers to the warrants that the court never authorized and which do not exist in law, he said.“It is clear that the exercise of the court’s warrant issuing authority has been used as protective cover for activities that it has not authorized,” Mosley wrote.Furthermore, tasking foreign security intelligence services to spy on Canadians overseas “carries the risk of the detention of or other harm to a Canadian person based on that information.“Given the unfortunate history of information sharing with foreign agencies over the past decade and the reviews conducted by several royal commissions, there can be no question that the Canadian agencies are aware of those hazards. It appears to me that they are using the warrants as authorization to assume those risks.”
  • Legal observers say this case and Mosley’s scolding will harm CSIS’s credibility and raise questions about whether the service has broken Criminal Code provisions dealing with the invasion of privacy.“When a judge says the government breached its duty of candour that is a very big ‘ouch’ moment,” Craig Forcese, a national security law scholar at the University of Ottawa, wrote in a recent blog posting.At the time the first warrants were issued, CSIS told the court “on clearly stated grounds” that the electronic intercepts would be carried out from within Canada by the Communications Security Establishment Canada (CSEC), the country’s foreign signals intelligence spy service.CSIS is largely restricted to domestic spying operations. If an investigation involves the use of intrusive techniques, such as electronic intercepts, Section 21 of the CSIS Act requires it to obtain a warrant approved by a Federal Court judge to guard the Charter right to a reasonable expectation of privacy.CSEC, meanwhile, is not allowed to spy on Canadians anywhere unless it is to provide technical and operational assistance to federal law enforcement and security agencies such as CSIS.And the federal court only has jurisdiction to authorize warrants under the CSIS Act as long as the communications in question are intercepted within Canada.
  • Yet once the so-called 30-08 warrants were approved by the court, CSEC, on behalf of CSIS, turned around and handed the jobs to one or more of its partners in the “Five Eyes” intelligence-gathering alliance between Canada, the United States, Great Britain, Australia and New Zealand.Mosley found out about the situation late this summer and summoned CSIS, CSEC and government officials and lawyers to court to explain themselves. The public version of his reasons for order was released Friday.
  • ...2 more annotations...
  • Some excerpts:• “I am satisfied that a decision was made by CSIS officials in consultation with their legal advisers to strategically omit information in applications for 30-08 warrants about their intention to seek the assistance of the foreign partners. As a result, the court was led to believe that all of the interception activity would take place in or under the control of Canada.”• “The principle of comity between nations that implies the acceptance of foreign laws and procedures when Canadian officials are operating abroad ends where clear violations of international law and human rights begin. In tasking the other members of the Five Eyes to intercept the communications of the Canadian targets, CSIS and CSEC officials knew ... this would involve the breach of international law by the requested second parties.”• “There is nothing in any of the material that I have read ... that persuades me that it was the intent of Parliament to give the service authority to engage the collection resources of the second party allies to intercept the private communications of Canadians.”• “It must be made clear, in any grant of a 30-08 warrant, that the warrant does not authorize the interception of the communications of a Canadian person by any foreign service on behalf of the service either directly or through the assistance of CSEC.”• “There must be no further suggestion in any reference to the use of second party assets by CSIS and CSEC, or their legal advisers, that it is being done under the authority of a (section) 21 warrant issued by this court.”
  • Forcese, meanwhile, raises some intriguing questions:• If Five Eyes assistance was not authorized, and CSEC and CSIS nevertheless sought it, are they still protected from Criminal Code, Part VI (invasion of privacy) culpability? Culpability, he writes, is only avoided where the intercept is lawfully authorized. If the parameters of the warrant were disregarded, does that vitiate the lawful access?• If CSEC and CSIS called on Five Eyes agencies to intercept communications, was the intercept still territorial, thus satisfying the international law concerns raised in the two warrant applications?“Outsourcing an international violation does not diminish state responsibility for that international violation. In a different context, that would be like asking bounty hunters to do your kidnapping of fugitives on the territory of a foreign state. Still a violation of international law.”CSIS has a choice, Forcese concludes: “Conduct extraterritorial spying without recourse to the courts, at risk of ultimately being called to account under domestic law, or honour the federal court’s construal of international law — and CSIS’s jurisdiction — and pull in its truly international surveillance operations, potentially blinding the country’s chief security intelligence agency.
  •  
    Canadian Security Intelligence Service is in politically explosive deep doo-doo. 
Gary Edwards

Why Banks Bought So Many Toxic Mortgage Bonds - 0 views

  •  
    Half of all subprime mortgage backed securities wound up on the balance sheets of banks. This fact surprises many people who think that the problem with securitization is that it let banks off-load risky loans onto investors. If that was the strategy, however, banks wouldn't have wound up with such huge holdings of subprime securities. So why did banks snap up so many mortgage backed securities? Even banks that were originating mortgage loans preferred to securitize them, and then hold the securities. Why would they do that rather than just hold the loans? The answer is that bank regulations encouraged them to own securities rather than loans. Under the international Basel capital requirements, a well-capitalized bank was required to hold $4 for every $100 in individual mortgages-a 4% reserve requirement. But if it held the securitized the AAA and AA tranches, the bank only had to hold $1.60 in capital. That's a huge incentive to trade in a loan for a mortgage backed security. But the capital regulations did more than just create incentives to own mortgage backed securities. They allowed banks to dramatically increase their balance sheets. The lower reserve requirement allowed banks to buy even more securities than it could make loans. A bank with $4 billion in reserve could hold $100 billion in loans. But that same $4 billion could instead be used to invest in $250 billion worth of mortgage backed securities.
Paul Merrell

'This Week' Transcript: Ambassador Samantha Power - ABC News - 0 views

  • STEPHANOPOULOS: And we are joined now by the U.S. Ambassador to the United Nations Samantha Power. Thanks for coming back to This Week. And you know, the president said he's prepared to strike Syria. Those strikes could be imminent. Will the United States try to get UN Security Council authorization first? Or do you accept now that's just not going to be possible? SAMANTHA POWER, U.S. AMBASSADOR TO THE UNITED NATIONS: Well, let me say that Secretary Kerry just convened a meeting of the Security Council on Friday which showcased just how much support there is on the Security Council and in the broader international community for the anti-ISIL effort. STEPHANOPOULOS: But the Russia veto.
  • POWER: Russia has vetoed in the past, but on very different issues. I think Russia has made clear for a long time its opposition to ISIL. The Iraqis have appealed to the international community to come to their defense not only in Iraq, but also to go after safe havens in foreign countries. And what they mean by that of course is Syria. And they're quite explicit about that. So they have made an appeal to the international community for collective defense. And we think we have a legal basis we need if the president decides... STEPHANOPOULOS: Without a UN authorization. POWER: Consistent with the UN charter, we -- it will depend on the facts and circumstances of any particular strike in Syria, but we have a legal basis we need.
  •  
    Context: U.S. Ambassador to the U.N., Samantha Power, holds the U.N. Security Council's rotating chair this month. Powers'  claims a right for the U.S. to wage war against ISIL in Syria on grounds of the collective security exception to the U.N. Charter's prohibition; that is, that the U.S. has a collective security agreement with the nation of Iraq, that makes it lawful for the U.S. to strike ISIL. True enough as a matter of international law, ignoring the fact that Obama has yet to obtain permission from the U.S. Congress, which the U.S. Constitution requires him to do. But ISIL is not the nation of Syria; hence to attack ISIL in Syria, an additional exception is necessary for both Iraq and the U.S. The only other recognized exception that might seem to do deals with the situation when a nation in which a private organization inflicting harm on another nation  is "unwilling or unable" to protect the second nation (Iraq) from the depradations of the private organization. And that is where Powers' legal analysis dissembles because the U.S. has been actively attempting to overthrow the Syrian government via proxy terrorist organizations including ISIL. So the U.S. lacks clean hands in claiming any lawful right to invade Syria on the theory that the Syrian government is unwilling or unable to put down the ISIL organization. The Syrian government is certainly willing and has been attempting to do so. But its inability to do so thus far is entirely due to the U.S., its Gulf Coast state allies, and its ally Turkey continuing to supply ISIL and other terrorist groups in Syria with weapons, training, and supplies, aimed at overthrowing the Syrian government. The doctrine of unclean hands has limited applicability in international law governing human rights. See Lisa LaPlante, The Law of Remedies and the Clean Hands Doctrine: Exclusionary Reparation Policies in Peru's Political Transition, 23 Am Univ Int Law Rev 50 (2007), https://digitalcommons.wcl.american.edu/cg
Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Paul Merrell

US and Israel try to rewrite history of UN resolution declaring Zionism racism - 0 views

  • “Zionism is a form of racism and racial discrimination,” reads UN General Assembly Resolution 3379. The measure was adopted 40 years ago, on Nov. 10, 1975, and the majority of the international community backed it. 72 countries voted for the resolution, with just 35 opposed (and 32 abstentions). Although little-known in the US today (it is remarkable how effectively the US and its allies have rewritten history in their favor), UN GA Res. 3379, titled “Elimination of all forms of racial discrimination,” made an indelible imprint on history. The geographic distribution of the vote was telling. The countries that voted against the resolution were primarily colonial powers and/or their allies. The countries that voted for it were overwhelmingly formerly colonized and anti-imperialist nations.
  • The resolution also cited two other little-known measures passed by international organizations in the same year: the Assembly of the Heads of State and Government of the Organization of African Unity’s resolution 77, which ruled “that the racist regime in occupied Palestine and the racist regimes in Zimbabwe and South Africa have a common imperialist origin, forming a whole and having the same racist structure”; and the Political Declaration and Strategy to Strengthen International Peace and Security and to Intensify Solidarity and Mutual Assistance among Non-Aligned Countries, which called Zionism a “racist and imperialist ideology.” When the resolution was passed, Israeli Ambassador to the UN Chaim Herzog — who later became Israel’s sixth president, and the father of Isaac Herzog, the head of Israel’s opposition — famously tore up the text at the podium. Herzog claimed the measure was “based on hatred, falsehood, and arrogance,” insisting it was “devoid of any moral or legal value.” Still today, supporters of Israel argue UN GA Res. 3379 was an anomalous product of anti-Semitism. In reality, however, the resolution was the result of international condemnation of the illegal military occupation to which Palestinians had been subjected since 1967 and the apartheid-like conditions the indigenous Arab population had lived under as second-class citizens of an ethnocratic state since 1948.
  • In 1991, resolution 3379 was repealed for two primary reasons: One, the Soviet bloc, which helped pass the resolution, had collapsed; and two, Israel and the US demanded that it be revoked or they refused to participate in the Madrid Peace Conference. At the UN on Nov. 11, US Ambassador to the UN Samantha Power and Secretary of State John Kerry eulogized the late Herzog and forcefully condemned the resolution on its 40th anniversary. In his 2,500-word statement, Kerry mentioned Palestinians just once, and only then as an extension of Israelis. In her remarks, Power did not mention Palestinians at all.
  • ...6 more annotations...
  • In his speech, Kerry smeared resolution 3379 as “anti-Semitic” and “absurd.” Kerry called it “a bitter irony that this resolution against Zionism was originally a resolution against racism and colonialism” and lamented that “reasonableness was detoured by a willful ignorance of history and truth.” Sec. Kerry insisted “we will do all in our power to prevent the hijacking of this great forum for malicious intent” — a fascinating claim, considering how incredibly often the US itself hijacks the UN against the will of the international community, in the interests of both itself and Israel. Kerry warned about “the global reality of anti-Semitism today” (he made no mention whatsoever of the global reality of rampant, rapidly accelerating, and viciously violent anti-Muslim, anti-Arab, and anti-Black racism), and implied that the “terrorist bigots of Daesh [ISIS], Boko Haram, Al Shabaab, and so many others” are part of this larger anti-Semitic trend. One could argue Sec. Kerry downplayed the severity of the present political situation by characterizing these fascistic groups’ violent extremism as rooted in anti-Semitic bigotry, rather than in radicalization under conditions of intense oppression, bitter poverty, and brutal tyranny.
  • UN Secretary-General Ban Ki-moon joined Kerry, Power, and Netanyahu in the echo chamber, albeit with a bit more subtlety. “The reputation of the United Nations was badly damaged by the adoption of resolution 3379, in and beyond Israel and the wider Jewish community,” he said. Unlike the others, Ban condemned not just anti-Semitism, but also “wide-ranging anti-Muslim bigotry and attacks [and] discrimination against migrants and refugees.” Although the Israeli government accuses the UN of bias, the evidence demonstrates the opposite. Secret cables released by whistleblowing journalism organization WikiLeaks revealed that the US and Israel worked hand-in-hand with the UN and Sec.-Gen. Ban in order to undermine investigation into and punitive action on Israel’s war crimes in Gaza.
  • In her speech at the UN, Power, like Kerry, conflated the heinous Nazi attacks on Jewish civilians in the Kristallnacht with UN GA Res. 3379. Both speakers cited the abominable horrors of the Holocaust several times as reasons to support Zionism, glossing over the fact that Zionism was created in the late 19th century and that the Balfour Declaration dates back to 1917, decades before World War II. Amb. Power — a serial warmonger and veteran blame-dodger — did what she did best: rewrote history in the favor of US imperialism. She called the resolution “1975 smearing of Jews’ aspirations to have a homeland” and insisted multiple times that resolutions like 3379 “threaten the legitimacy of the UN.” Like Kerry, Power conveniently forgot to mention that, when it comes to the halls of the UN, there is no other rogue state as blunt as the US, which regularly spits in the face of the international community, defying UN resolutions, violating the UN Charter, and breaking international law when it sees fit. Power’s speech exposed the fault lines in the contentious (to put it mildly) relationship between the US and the UN — that is to say, between the US and the international community. Such tensions are not the fault of the UN; the blame rests squarely on the shoulders of Washington, with its doctrinal “American exceptionalism” and the flagrant disregard for international law that so frequently accompanies such imperial hubris.
  • In their speeches, both Kerry and Power also thanked Israeli UN Ambassador Danny Danon, who was described by an Israeli Labor Party lawmaker as “a right-wing extremist with the diplomatic sensitivity of a pit bull” and who proposed legislation that would, in his own words, have the Israeli government “annex the West Bank and repeal the Oslo Accords.” Amb. Danon insists that God gave the land of historic Palestine to the Jewish people as an “everlasting possession” (while forsaking the US). He also told the Times of Israel that the “international community can say whatever they want, and we can do whatever we want.” Netanyahu addressed the session with a video message. He claimed that Israel, which has for years led the world in violating UN Security Council resolutions, “continues to face systemic discrimination here at the UN.” In a January 2013 statement submitted to the UN Human Rights Council, the Russell Tribunal calculated Israel had defied a bare minimum of 87 Security Council resolutions. The Russel Tribunal also crucially noted “that Israel’s ongoing colonial settlement expansion, its racial separatist policies, as well as its violent militarism would not be possible without the US’s unequivocal support.” The tribunal pointed out that Israel “is the largest recipient of US foreign aid since 1976 and the largest cumulative recipient since World War II” and that, between 1972 and 2012, the US was the lone veto of UN resolutions critical of Israel 43 times.
  • The US secretary of state extolled “Zionism as the expression of a national liberation movement.” The national liberation movements of Vietnam, Korea, China, Nicaragua, El Salvador, Colombia, Congo, South Africa, Burkina Faso, and so many more nations, however, did not get such approval from Washington; au contraire, they were mercilessly crushed under the iron fist of American empire. Traditionally, only right-wing and settler-colonial “national liberation movements” have garnered the US’s official approval. “Why do we Americans care so much about the rights of others being respected?” Kerry asked unprovoked. “Because, in an interconnected world, injustice anywhere is a threat to justice everywhere.” He should tell that to the victims of US-backed dictatorships in Saudi Arabia, the UAE, Bahrain, Qatar, Egypt, Turkmenistan, Kazakhstan, Thailand, Brunei, Rwanda, Ethiopia, Uganda, and, once again, so many more nations. “Times may change, but one thing we do know: America’s support for Israel’s dreaming and Israel’s security, that will never change,” Kerry proclaimed.
  • The real victim of the 40th anniversary event was the truth — and, of course, as it was four decades ago, the Palestinians. Yet, while UN GA Res. 3379 was repealed, the truth cannot be revoked. Zionism was and remains an unequivocally racist movement — just like any other hyper-nationalist and ethnocratic movement. None other than the founding father of Zionism, Theodor Herzl, recognized this elementary fact. In a 1902 letter to Cecil Rhodes — a diamond magnate and white supremacist British colonialist with oceans of African blood on his hands — Herzl, writing of “the idea of Zionism, which is a colonial idea,” requested help colonizing historic Palestine. “It doesn’t involve Africa, but a piece of Asia Minor, not Englishmen but Jews… How, then, do I happen to turn to you since this is an out-of-the-way matter for you? How indeed? Because it is something colonial,” Herzl wrote. “I want you to… put the stamp of your authority on the Zionist plan.”
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

Palestinians Seen Gaining Momentum in Quest for Statehood - NYTimes.com - 0 views

  • When the Palestinians sought statehood at the United Nations in 2011, it was widely dismissed as a symbolic gambit to skirt negotiations with Israel and Washington’s influence over the long-running conflict. But the Palestinians have begun to translate a series of such symbolic steps, culminating in last week’s move to join the International Criminal Court, into a strategy that has begun to create pressure on Israel.While many prominent Israelis have called for unilateral action to set the country’s borders, it is Palestinians who have gained political momentum with moves made outside of negotiations. The Palestinians are, in effect, establishing a legal state. International recognition, by 135 countries and counting, is what Palestinians are betting could eventually force changes on the ground — without their leaders having to make the concessions or assurances they have long avoided.
  • President Abbas, having joined the International Criminal Court after months of rebuffing internal pressure to do so, now faces calls from a frustrated public to go further, by halting security coordination with Israel or dissolving the Palestinian Authority. While both steps would be problematic for the Palestinians as well as the Israelis, Palestinian leaders see it as a way to further squeeze Israel. Without the authority, Israel would have to provide services and maintain order across the West Bank without Palestinian security forces, which would likely be both costly and chaotic, and could intensify international frustration with Israel’s occupation.“I’m a little surprised with the negative American reaction because Palestinians either pursue peaceful legal approaches or pursue violent illegal approaches,” said Ghassan Khatib, vice president of Birzeit University in the West Bank. “But if all the doors are closed, and if the Israelis and the Americans will stop funding, then the P.A. will collapse, and that will play to the hands of the extreme elements in Palestinian society, including Hamas.”
  • President Mahmoud Abbas of the Palestinian Authority seems undeterred and increasingly indifferent to American diplomacy. He vowed Sunday to resubmit a Security Council resolution that failed last week “again and again” and to “join 100, 200, 300” international organizations, despite the risk that Israeli and American sanctions could lead to his government’s collapse.
  • ...3 more annotations...
  • “Those states that have recognized the State of Palestine, that’s not an insignificant number, they’ve reached a kind of critical mark,” said Mark Ellis, director of the London-based International Bar Association. “We’ve added an additional complexity to this very long 66-year-old journey. I think it’s intriguing.”
  • In some ways, the dual Palestinian tracks seem contradictory — how could they continue to make the case for statehood if they collapse the provisional authority the Oslo Accords created two decades ago for state-building? But it is the Palestine Liberation Organization, not the Palestinian Authority, that represents Palestinians on the world stage. Mr. Ellis, the international-law expert, said that Palestine met the criteria for statehood — permanent population, defined territory, government, and recognition by other states — and that those would not be nullified if the authority disappeared and chaos ensued on the ground. Mustafa Barghouti, one of many Palestinian leaders pressing Mr. Abbas to collapse the authority, envisions “a government in exile” for a “state under occupation.”
  • “This would mean liberating the Palestinian movement from all these restrictions and obligations by Israel — it’s like declaring civil disobedience,” Mr. Barghouti said. “In a way, it’s the end of the Oslo era. For me, it was the end many years ago. For Abbas, it was the end only this week.”
Paul Merrell

Victory! Federal Court Recognizes Constitutional Rights of Americans on the No-Fly List... - 0 views

  • A federal court took a critically important step late yesterday towards placing a check on the government's secretive No-Fly List. In a 38-page ruling in Latif v. Holder, the ACLU's challenge to the No-Fly List, U.S. District Court Judge Anna Brown recognized that the Constitution applies when the government bans Americans from the skies. She also asked for more information about the current process for getting off the list, to inform her decision on whether that procedure violates the Fifth Amendment guarantee of due process. We represent 13 Americans, including four military veterans, who are blacklisted from flying. At oral argument in June on motions for partial summary judgment, we asked the court to find that the government violated our clients' Fifth Amendment right to due process by barring them from flying over U.S. airspace – and smearing them as suspected terrorists – without giving them any after-the-fact explanation or a hearing at which to clear their names. The court's opinion recognizes – for the first time – that inclusion on the No-Fly List is a draconian sanction that severely impacts peoples' constitutionally-protected liberties. It rejected the government's argument that No-Fly list placement was merely a restriction on the most "convenient" means of international travel.
  • Such an argument ignores the numerous reasons an individual may have for wanting or needing to travel overseas quickly such as for the birth of a child, the death of a loved one, a business opportunity, or a religious obligation. According to the court, placement on the No-Fly List is like the revocation of a passport because both actions severely burden the right to international travel and give rise to a constitutional right to procedural due process: Here it is undisputed that inclusion on the No-Fly List completely bans listed persons from boarding commercial flights to or from the United States or over United States air space.  Thus, Plaintiffs have shown their placement on the No-Fly List has in the past and will in the future severely restrict Plaintiffs' ability to travel internationally. Moreover, the realistic implications of being on the No-Fly List are potentially far-reaching. For example, TSC [the Terrorist Screening Center] shares watchlist information with 22 foreign governments and United States Customs and Boarder [sic] Protection makes recommendations to ship captains as to whether a passenger poses a risk to transportation security, which can result in further interference with an individual's ability to travel as evidenced by some Plaintiffs' experiences as they attempted to travel abroad by boat and land and were either turned away or completed their journey only after an extraordinary amount of time, expense, and difficulty. Accordingly, the Court concludes on this record that Plaintiffs have a constitutionally-protected liberty interest in traveling internationally by air, which is affected by being placed on the list. The court also found that the government's inclusion of our clients on the No-Fly List smeared them as suspected terrorists and altered their ability to lawfully board planes, resulting in injury to another constitutionally-protected right: freedom from reputational harm.
  • The importance of these rulings is clear. Because inclusion on the No-Fly List harms our clients' liberty interests in travel and reputation, due process requires the government to provide them an explanation and a hearing to correct the mistakes that led to their inclusion. But under the government's "Glomar" policy, it refuses to provide any information confirming or denying that our clients are on the list, let alone an after-the-fact explanation and hearing. The court has asked the ACLU and the government for more information about the No-Fly List redress procedure to help it decide the ultimate question of whether that system violates the Fifth Amendment right to due process. We are confident the court will recognize that the government's "Glomar" policy of refusing even to confirm or deny our clients' No-Fly List status (much less actually providing the reasons for their inclusion in the list) is fundamentally unfair and unconstitutional.
  •  
    A case decision in August that I had missed, right here in Oregon. One of our Oregon federal judges gets it right after being reversed the first time by the 9th U.S. Circuit Court of Appeals. I've read the opinion. Looks quite solid. Plaintiffs were carefully chosen for this test case, 13 citizens placed on the no-fly list, all with compelling stories of winding up stranded, some overseas. Several are U.S. military veterans. All were told by government officials that the reason they could not board was because they were on the TSA no-fly list. At issue is whether they have a right to be informed of the information that resulted in them being placed on the no-fly list and a right to a hearing to seek correction of the information. Their constitutional interest in their reputations is also in play, since they have been classified by their government as too dangerous to allow to travel by commercial airline.   The district court case is not done; the judge has ordered further briefing on some issues. But the government is trying to defend a process in which no one is ever formally notified that they are on the no-fly list and is never advised of the reasons they are on the no-fly list. The number of Americans on the no-fly list is now over 700,000. But the judge has recognized that there is a constitutional right to travel and that it extends to international travel. From the opinion: "Plaintiffs contend the government has deprived them of their protected liberty interest in travel. In Kent v. Dulles, 357 U.S. 116 (1958), the Supreme Court held "[t]he right to travel is part of the 'liberty' of which the citizen cannot be deprived without due process of law under the Fifth Amendment."  Id. at 125. As noted by the Ninth Circuit, "the [Supreme] Court has consistently treated the right to international travel as a liberty interest that is protected by the Due Process Clause of the Fifth Amendment." DeNieva v. Reyes, 966 F.2d 480, 485 (9th Cir. 1992)(emp
Paul Merrell

Exclusive: Inside America's Plan to Kill Online Privacy Rights Everywhere | The Cable - 0 views

  • The United States and its key intelligence allies are quietly working behind the scenes to kneecap a mounting movement in the United Nations to promote a universal human right to online privacy, according to diplomatic sources and an internal American government document obtained by The Cable. The diplomatic battle is playing out in an obscure U.N. General Assembly committee that is considering a proposal by Brazil and Germany to place constraints on unchecked internet surveillance by the National Security Agency and other foreign intelligence services. American representatives have made it clear that they won't tolerate such checks on their global surveillance network. The stakes are high, particularly in Washington -- which is seeking to contain an international backlash against NSA spying -- and in Brasilia, where Brazilian President Dilma Roussef is personally involved in monitoring the U.N. negotiations.
  • The Brazilian and German initiative seeks to apply the right to privacy, which is enshrined in the International Covenant on Civil and Political Rights (ICCPR), to online communications. Their proposal, first revealed by The Cable, affirms a "right to privacy that is not to be subjected to arbitrary or unlawful interference with their privacy, family, home, or correspondence." It notes that while public safety may "justify the gathering and protection of certain sensitive information," nations "must ensure full compliance" with international human rights laws. A final version the text is scheduled to be presented to U.N. members on Wednesday evening and the resolution is expected to be adopted next week. A draft of the resolution, which was obtained by The Cable, calls on states to "to respect and protect the right to privacy," asserting that the "same rights that people have offline must also be protected online, including the right to privacy." It also requests the U.N. high commissioner for human rights, Navi Pillay, present the U.N. General Assembly next year with a report on the protection and promotion of the right to privacy, a provision that will ensure the issue remains on the front burner.
  • Publicly, U.S. representatives say they're open to an affirmation of privacy rights. "The United States takes very seriously our international legal obligations, including those under the International Covenant on Civil and Political Rights," Kurtis Cooper, a spokesman for the U.S. mission to the United Nations, said in an email. "We have been actively and constructively negotiating to ensure that the resolution promotes human rights and is consistent with those obligations." But privately, American diplomats are pushing hard to kill a provision of the Brazilian and German draft which states that "extraterritorial surveillance" and mass interception of communications, personal information, and metadata may constitute a violation of human rights. The United States and its allies, according to diplomats, outside observers, and documents, contend that the Covenant on Civil and Political Rights does not apply to foreign espionage.
  • ...6 more annotations...
  • n recent days, the United States circulated to its allies a confidential paper highlighting American objectives in the negotiations, "Right to Privacy in the Digital Age -- U.S. Redlines." It calls for changing the Brazilian and German text so "that references to privacy rights are referring explicitly to States' obligations under ICCPR and remove suggestion that such obligations apply extraterritorially." In other words: America wants to make sure it preserves the right to spy overseas. The U.S. paper also calls on governments to promote amendments that would weaken Brazil's and Germany's contention that some "highly intrusive" acts of online espionage may constitute a violation of freedom of expression. Instead, the United States wants to limit the focus to illegal surveillance -- which the American government claims it never, ever does. Collecting information on tens of millions of people around the world is perfectly acceptable, the Obama administration has repeatedly said. It's authorized by U.S. statute, overseen by Congress, and approved by American courts.
  • "Recall that the USG's [U.S. government's] collection activities that have been disclosed are lawful collections done in a manner protective of privacy rights," the paper states. "So a paragraph expressing concern about illegal surveillance is one with which we would agree." The privacy resolution, like most General Assembly decisions, is neither legally binding nor enforceable by any international court. But international lawyers say it is important because it creates the basis for an international consensus -- referred to as "soft law" -- that over time will make it harder and harder for the United States to argue that its mass collection of foreigners' data is lawful and in conformity with human rights norms. "They want to be able to say ‘we haven't broken the law, we're not breaking the law, and we won't break the law,'" said Dinah PoKempner, the general counsel for Human Rights Watch, who has been tracking the negotiations. The United States, she added, wants to be able to maintain that "we have the freedom to scoop up anything we want through the massive surveillance of foreigners because we have no legal obligations."
  • The United States negotiators have been pressing their case behind the scenes, raising concerns that the assertion of extraterritorial human rights could constrain America's effort to go after international terrorists. But Washington has remained relatively muted about their concerns in the U.N. negotiating sessions. According to one diplomat, "the United States has been very much in the backseat," leaving it to its allies, Australia, Britain, and Canada, to take the lead. There is no extraterritorial obligation on states "to comply with human rights," explained one diplomat who supports the U.S. position. "The obligation is on states to uphold the human rights of citizens within their territory and areas of their jurisdictions."
  • The position, according to Jamil Dakwar, the director of the American Civil Liberties Union's Human Rights Program, has little international backing. The International Court of Justice, the U.N. Human Rights Committee, and the European Court have all asserted that states do have an obligation to comply with human rights laws beyond their own borders, he noted. "Governments do have obligation beyond their territories," said Dakwar, particularly in situations, like the Guantanamo Bay detention center, where the United States exercises "effective control" over the lives of the detainees. Both PoKempner and Dakwar suggested that courts may also judge that the U.S. dominance of the Internet places special legal obligations on it to ensure the protection of users' human rights.
  • "It's clear that when the United States is conducting surveillance, these decisions and operations start in the United States, the servers are at NSA headquarters, and the capabilities are mainly in the United States," he said. "To argue that they have no human rights obligations overseas is dangerous because it sends a message that there is void in terms of human rights protection outside countries territory. It's going back to the idea that you can create a legal black hole where there is no applicable law." There were signs emerging on Wednesday that America may have been making ground in pressing the Brazilians and Germans to back on one of its toughest provisions. In an effort to address the concerns of the U.S. and its allies, Brazil and Germany agreed to soften the language suggesting that mass surveillance may constitute a violation of human rights. Instead, it simply deep "concern at the negative impact" that extraterritorial surveillance "may have on the exercise of and enjoyment of human rights." The U.S., however, has not yet indicated it would support the revised proposal.
  • The concession "is regrettable. But it’s not the end of the battle by any means," said Human Rights Watch’s PoKempner. She added that there will soon be another opportunity to corral America's spies: a U.N. discussion on possible human rights violations as a result of extraterritorial surveillance will soon be taken up by the U.N. High commissioner.
  •  
    Woo-hoo! Go get'em, U.N.
Paul Merrell

Russia invites NATO Members to Security Conference: Experts warn about Risk of unwanted... - 0 views

  • Russia has invited all NATO member States and the NATO leadership to attend a security conference in mid-April, said the Russian Deputy Defense Minister Anatoly Antonov. The invitation comes against the backdrop of deteriorating relations between members of the Atlantic Alliance and Russia. Meanwhile, during a recent symposium, experts warned about the risk of a military escalation that includes the use of nuclear weapons, whether it be wanted or unwanted.  Russian Deputy Defense Minister Anatoly Antonov said on Thursday that NATO cannot be the sole guarantor of freedom and security in a modern world, reports the Russian Tass news agency, Antonov added that some countries now are trying to impose their policy and position on others and that latest developments show how imperfect the world is.
  • In 2008 NATO and the UN signed a Secretariat Coordination Treaty that implies that NATO has become the de facto military enforcement instrument of the international body, even though NATO is not representative of UN members or their individual rights or policies. The signing of this treaty was largely omitted by most media. Russia has since the reunification of Germany repeatedly complained that it perceives NATO’s eastwards expansion and the deployment of anti-missile systems directed against Russia along its borders as a potential threat and as a violation of the agreements which led to the reunification of Germany. This position has, among others, been stressed by the last Soviet leader Michael Gorbachev. It was confirmed by the former French Foreign Minister Roland Dumas who stressed that the understanding that NATO would not expand eastwards was by all sides understood as “the essence of peace”.
  • The dispute was to some degree mitigated by the Russian – NATO cooperation within the NATO’s “Partnership for Peace” program which has largely been suspended since the eruption of the conflict in and about Ukraine in 2014. The Tass news agency quotes Antonov as saying that: “Some countries and even associations, such as the European Union, venture to define who and how should behave themselves on the international arena. If anyone voices another stance, which is different from that of Washington, Brussels and Ottawa, then they try to punish this country. … This is what is happening in regard to Russia today.” Antonov stressed that there today is a lack of confidence between the countries and that it would be difficult to mend the international security system which has been seriously undermined by the actions of the United States and its allies in the international arena. He added, however, that the potential of Russian – U.S.’ relations has not yet been exhausted although he never, in his entire diplomatic career that relations had been has difficult as they were today. Antonov stressed that the Ukrainian crisis affects security throughout Europe.
  • ...2 more annotations...
  • International law with regard to the situation in Ukraine is difficult and subject to interpretation rather than regulation. On one hand there is the principal of non-interference into internal affairs which has been undermined, practically by financing policy groups and NGOs and legally by constructs such as the “responsibility to protect”. One the other hand there is the principle about the invulnerability of national borders. This principle, on the other hand, is being contradicted by the equally valid right to self-determination as seen in the Crimean referendum and Crimea’s accession into the Russian Federation or the 2014 referendum on Scottish independence. International law is, on other words, highly subjective and based on policy and  constructs about apparent “legitimacy” rather than legality and law.
  • Experts warn about the risk of unwanted nuclear war. Several analysts would note that the deterioration in relations between NATO and Russia poses an acute risk for a military escalation which could include the use of nuclear weapons and escalate into a conflict of global reach regardless whether it is wanted or unwanted. During a two-day symposium at the New York Academy of Medical Sciences on February 28 and March 1, 2015, several internationally renown experts warned about the risk about a potential escalation of the situation in Ukraine and the involvement of nuclear weapons due to mutual distrust and nuclear forces being on hair-trigger alert.
Paul Merrell

Responding to Failure: Reorganizing U.S. Policies in the Middle East | Middle East Poli... - 0 views

  • I want to speak with you today about the Middle East. This is the region where Africa, Asia, and Europe come together. It is also the part of the world where we have been most compellingly reminded that some struggles cannot be won, but there are no struggles that cannot be lost. It is often said that human beings learn little useful from success but can learn a great deal from defeat. If so, the Middle East now offers a remarkably rich menu of foreign-policy failures for Americans to study. • Our four-decade-long diplomatic effort to bring peace to the Holy Land sputtered to an ignominious conclusion a year ago. • Our unconditional political, economic, and military backing of Israel has earned us the enmity of Israel’s enemies even as it has enabled egregiously contemptuous expressions of ingratitude and disrespect for us from Israel itself.
  • • Our attempts to contain the Iranian revolution have instead empowered it. • Our military campaigns to pacify the region have destabilized it, dismantled its states, and ignited ferocious wars of religion among its peoples. • Our efforts to democratize Arab societies have helped to produce anarchy, terrorism, dictatorship, or an indecisive juxtaposition of all three. • In Iraq, Libya, and Syria we have shown that war does not decide who’s right so much as determine who’s left. • Our campaign against terrorism with global reach has multiplied our enemies and continuously expanded their areas of operation. • Our opposition to nuclear proliferation did not prevent Israel from clandestinely developing nuclear weapons and related delivery systems and may not preclude Iran and others from following suit.
  • • At the global level, our policies in the Middle East have damaged our prestige, weakened our alliances, and gained us a reputation for militaristic fecklessness in the conduct of our foreign affairs. They have also distracted us from challenges elsewhere of equal or greater importance to our national interests. That’s quite a record.
  • ...12 more annotations...
  • One can only measure success or failure by reference to what one is trying achieve. So, in practice, what have U.S. objectives been? Are these objectives still valid? If we’ve failed to advance them, what went wrong? What must we do now to have a better chance of success? Our objectives in the Middle East have not changed much over the course of the past half century or more. We have sought to 1. Gain acceptance and security for a Jewish homeland from the other states and peoples of the region; 2. Ensure the uninterrupted availability of the region’s energy supplies to sustain global and U.S. security and prosperity; 3. Preserve our ability to transit the region so as to be able to project power around the world; 4. Prevent the rise of a regional hegemon or the deployment of weapons of mass destruction that might threaten any or all of these first three objectives; 5. Maximize profitable commerce; and 6. Promote stability while enhancing respect for human rights and progress toward constitutional democracy. Let’s briefly review what’s happened with respect to each of these objectives. I will not mince words.
  • Israel has come to enjoy military supremacy but it remains excluded from most participation in its region’s political, economic, and cultural life. In the 67 years since the Jewish state was proclaimed, Israel has not made a single friend in the Middle East, where it continues to be regarded as an illegitimate legacy of Western imperialism engaged in racist removal of the indigenous population. International support for Israel is down to the United States and a few of the former colonial powers that originally imposed the Zionist project on the Arabs under Sykes-Picot and the related Balfour Declaration. The two-state solution has expired as a physical or political possibility. There is no longer any peace process to distract global attention from Israel’s maltreatment of its captive Arab populations. After years of deference to American diplomacy, the Palestinians are about to challenge the legality of Israel’s cruelties to them in the International Criminal Court and other venues in which Americans have no veto, are not present, or cannot protect the Jewish state from the consequences of its own behavior as we have always been able to do in the past. Israel’s ongoing occupation of the West Bank and siege of Gaza are fueling a drive to boycott its products, disinvest in its companies, and sanction its political and cultural elite. These trends are the very opposite of what the United States has attempted to achieve for Israel.
  • In a stunning demonstration of his country’s most famous renewable resource — chutzpah — Israel’s Prime Minister chose this very moment to make America the main issue in his reelection campaign while simultaneously transforming Israel into a partisan issue in the United States. This is the very opposite of a sound survival strategy for Israel. Uncertainties about their country’s future are leading many Israelis to emigrate, not just to America but to Europe. This should disturb not just Israelis but Americans, if only because of the enormous investment we have made in attempts to gain a secure place for Israel in its region and the world. The Palestinians have been silent about Mr. Netanyahu’s recent political maneuvers. Evidently, they recall Napoleon’s adage that one should never interrupt an enemy when he is making a mistake. This brings me to an awkward but transcendently important issue. Israel was established as a haven from anti-Semitism — Jew hatred — in Europe, a disease of nationalism and Christian culture that culminated in the Holocaust. Israel’s creation was a relief for European Jews but a disaster for the Arabs of Palestine, who were either ethnically cleansed by European Jewish settlers or subjugated, or both.  But the birth of Israel also proved tragic for Jews throughout the Middle East — the Mizrahim. In a nasty irony, the implementation of Zionism in the Holy Land led to the introduction of European-style anti-Semitism — including its classic Christian libels on Jews — to the region, dividing Arab Jews from their Muslim neighbors as never before and compelling them to join European Jews in taking refuge in Israel amidst outrage over the dispossession of Palestinians from their homeland. Now, in a further irony, Israel’s pogroms and other injustices to the Muslim and Christian Arabs over whom it rules are leading not just to a rebirth of anti-Semitism in Europe but to its globalization.
  • The late King `Abdullah of Saudi Arabia engineered a reversal of decades of Arab rejectionism at Beirut in 2002. He brought all Arab countries and later all 57 Muslim countries to agree to normalize relations with Israel if it did a deal — any deal — with the Palestinians that the latter could accept. Israel spurned the offer. Its working assumption seems to be that it does not need peace with its neighbors as long as it can bomb and strafe them. Proceeding on this basis is not just a bad bet, it is one that is dividing Israel from the world, including Jews outside Israel. This does not look like a story with a happy ending. It’s hard to avoid the thought that Zionism is turning out to be bad for the Jews. If so, given the American investment in it, it will also have turned out to be bad for America. The political costs to America of support for Israel are steadily rising. We must find a way to divert Israel from the largely self-engineered isolation into which it is driving itself, while repairing our own increasing international ostracism on issues related to Israel.  
  • Despite Mr. Netanyahu’s recent public hysteria about Iran and his efforts to demonize it, Israel has traditionally seen Iran’s rivalry with the Arabs as a strategic asset. It had a very cooperative relationship with the Shah. Neither Israelis nor Arabs have forgotten the strategic logic that produced Israel's entente with Iran. Israel is very much on Daesh’s list of targets, as is Iran. For now, however, Israel’s main concern is the possible loss of its nuclear monopoly in the Middle East. Many years ago, Israel actually did what it now accuses Iran of planning to do. It clandestinely developed nuclear weapons while denying to us and others that it was doing so. Unlike Iran, Israel has not adhered to the Nuclear Non-Proliferation Treaty or subjected its nuclear facilities to international inspection. It has expressed no interest in proposals for a nuclear-free zone in the Middle East. It sees its ability to bring on nuclear Armageddon as the ultimate guarantee of its existence.
  • To many, Israel now seems to have acquired the obnoxious habit of biting the American hand that has fed it for so long. The Palestinians have despaired of American support for their self-determination. They are reaching out to the international community in ways that deliberately bypass the United States. Random acts of violence herald mayhem in the Holy Land. Daesh has proclaimed the objective of erasing the Sykes-Picot borders and the states within them. It has already expunged the border between Iraq and Syria. It is at work in Lebanon and has set its sights on Jordan, Palestine, and Israel. Lebanon, under Saudi influence, has turned to France rather than America for support. Hezbollah has intervened militarily in Iraq and Syria, both of whose governments are close to Iran. Egypt and Turkey have distanced themselves from the United States as well as from each other. Russia is back as a regional actor and arms supplier. The Gulf Arabs, Egypt, and Turkey now separately intervene in Libya, Syria, and Iraq without reference to American policy or views. Iran is the dominant influence in Iraq, Syria, parts of Lebanon, and now Yemen. It has boots on the ground in Iraq. And now Saudi Arabia seems to be organizing a coalition that will manage its own nuclear deterrence and military balancing of Ir
  • To describe this as out of control is hardly adequate. What are we to do about it? Perhaps we should start by recalling the first law of holes — “when stuck in one, stop digging.” It appears that “don’t just sit there, bomb something” isn’t much of a strategy. When he was asked last summer what our strategy for dealing with Daesh was, President Obama replied, “We don’t yet have one.” He was widely derided for that. He should have been praised for making the novel suggestion that before Washington acts, it should first think through what it hopes to accomplish and how best to do it. Sunzi once observed that “tactics without strategy is the noise before defeat." America’s noisy but strategy-free approach to the Middle East has proven him right. Again the starting point must be what we are trying to accomplish. Strategy is "the discipline of achieving desired ends through the most efficient use of available means" [John Lewis Gaddis].Our desired ends with respect to the Middle East are not in doubt. They have been and remain to gain an accepted and therefore secure place for Israel there; to keep the region's oil and gas coming at reasonable prices; to be able to pass through the area at will; to head off challenges to these interests; to do profitable business in the markets of the Middle East; and to promote stability amidst the expansion of liberty in its countries. Judging by results, we have been doing a lot wrong. Two related problems in our overall approach need correction. They are “enablement” and the creation of “moral hazard.” Both are fall-out from  relationships of codependency.
  • Enablement occurs when one party to a relationship indulges or supports and thereby enables another party’s dysfunctional behavior. A familiar example from ordinary life is giving money to a drunk or a drug addict or ignoring, explaining away, or defending their subsequent self-destructive behavior.  Moral hazard is the condition that obtains when one party is emboldened to take risks it would not otherwise take because it knows another party will shoulder the consequences and bear the costs of failure. The U.S.-Israel relationship has evolved to exemplify codependency. It now embodies both enablement and moral hazard. U.S. support for Israel is unconditional.  Israel has therefore had no need to cultivate relations with others in the Middle East, to declare its borders, or to choose peace over continued expansion into formerly Arab lands. Confidence in U.S. backing enables Israel to do whatever it likes to the Palestinians and its neighbors without having to worry about the consequences. Israel is now a rich country, but the United States continues to subsidize it with cash transfers and other fiscal privileges. The Jewish state is the most powerful country in the Middle East. It can launch attacks on its neighbors, confident that it will be resupplied by the United States. Its use of U.S. weapons in ways that violate both U.S. and international law goes unrebuked. 41 American vetoes in the United Nations Security Council have exempted Israel from censure and international law. We enable it to defy the expressed will of the international community, including, ironically, our own.
  • We Americans are facilitating Israel's indulgence in denial and avoidance of the choices it must make if it is not to jeopardize its long-term existence as a state in the Middle East. The biggest contribution we could now make to Israel's longevity would be to ration our support for it, so as to cause it to rethink and reform its often self-destructive behavior. Such peace as Israel now enjoys with Egypt, Jordan, and the Palestinians is the direct result of tough love of this kind by earlier American administrations. We Americans cannot save Israel from itself, but we can avoid killing it with uncritical kindness. We should support Israel when it makes sense to do so and it needs our support on specific issues, but not otherwise. Israel is placing itself and American interests in jeopardy. We need to discuss how to reverse this dynamic.
  • Moral hazard has also been a major problem in our relationship with our Arab partners. Why should they play an active role in countering the threat to them they perceive from Iran, if they can get America to do this for them? Similarly, why should any Muslim country rearrange its priorities to deal with Muslim renegades like Daesh when it can count on America to act for it? If America thinks it must lead, why not let it do so? But responsible foreign and defense policies begin with self-help, not outsourcing of military risks. The United States has the power-projection and war-fighting capabilities to back a Saudi-led coalition effort against Daesh. The Saudis have the religious and political credibility, leadership credentials, and diplomatic connections to organize such an effort. We do not. Since this century began, America has administered multiple disappointments to its allies and friends in the Middle East, while empowering their and our adversaries. Unlike the Gulf Arabs, Egypt, and Turkey, Washington does not have diplomatic relations with Tehran. Given our non-Muslim identity, solidarity with Israel, and recent history in the Fertile Crescent, the United States cannot hope to unite the region’s Muslims against Daesh.  Daesh is an insurgency that claims to exemplify Islam as well as a governing structure and an armed force. A coalition led by inhibited foreign forces, built on papered-over differences, and embodying hedged commitments will not defeat such an insurgency with or without boots on the ground.
  • When elections have yielded governments whose policies we oppose, we have not hesitated to conspire with their opponents to overthrow them. But the results of our efforts to coerce political change in the Middle East are not just failures but catastrophic failures. Our policies have nowhere produced democracy. They have instead contrived the destabilization of societies, the kindling of religious warfare, and the installation of dictatorships contemptuous of the rights of religious and ethnic minorities. Frankly, we have done a lot better at selling things, including armaments, to the region than we have at transplanting the ideals of the Atlantic Enlightenment there. The region’s autocrats cooperate with us to secure our protection, and they get it. When they are nonetheless overthrown, the result is not democracy or the rule of law but socio-political collapse and the emergence of  a Hobbesian state of nature in which religious and ethnic communities, families, and individuals are able to feel safe only when they are armed and have the drop on each other. Where we have engineered or attempted to engineer regime change, violent politics, partition, and ethno-religious cleansing have everywhere succeeded unjust but tranquil order. One result of our bungled interventions in Iraq and Syria is the rise of Daesh. This is yet another illustration that, in our efforts to do good in the Middle East, we have violated the principle that one should first do no harm.
  • Americans used to believe that we could best lead by example. We and those in the Middle East seeking nonviolent change would all be better off if America returned to that tradition and forswore ideologically motivated hectoring and intervention. No one willingly follows a wagging finger. Despite our unparalleled ability to use force against foreigners, the best way to inspire them to emulate us remains showing them that we have our act together. At the moment, we do not. In the end, to cure the dysfunction in our policies toward the Middle East, it comes down to this. We must cure the dysfunction and venality of our politics. If we cannot, we have no business trying to use an 8,000-mile-long screwdriver to fix things one-third of the way around the world. That doesn’t work well under the best of circumstances. But when the country wielding the screwdriver has very little idea what it’s doing, it really screws things up.
  •  
    Chas Freeman served as US ambassador to Saudi Arabia during the war to liberate Kuwait and as Assistant Secretary of Defense from 1993-94. He was the editor of the Encyclopedia Britannica entry on "diplomacy" and is the author of five books, including "America's Misadventures in the Middle East" and "Interesting Times: China, America, and the Shifting Balance of Prestige."  I have largely omitted highlighting portions of the speech dealing with Muslim nations because Freeman has apparently lost touch with the actual U.S., Saudi, UAE, Kuwait, and Turish roles in creating and expanding ISIL. But his analysis of Israel's situation and recommendations for curing it seem quite valid, as well as his overall Mideast recommendation to heed the First Law of Holes: "when stuck in one, stop digging."   I recommend reading the entire speech notwithstanding his misunderstanding of ISIL. There is a lot of very important history there ably summarized.
Gary Edwards

Feds confiscate investigative reporter's confidential files during raid | The Daily Caller - 3 views

  • A veteran Washington D.C. investigative journalist says the Department of Homeland Security confiscated a stack of her confidential files during a raid of her home in August — leading her to fear that a number of her sources inside the federal government have now been exposed. In an interview with The Daily Caller, journalist Audrey Hudson revealed that the Department of Homeland Security and Maryland State Police were involved in a predawn raid of her Shady Side, Md. home on Aug. 6. Hudson is a former Washington Times reporter and current freelance reporter. A search warrant obtained by TheDC indicates that the August raid allowed law enforcement to search for firearms inside her home.
  • But without Hudson’s knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said. Outraged over the seizure, Hudson is now speaking out. She said no subpoena for the notes was presented during the raid and argues the confiscation was outside of the search warrant’s parameter. “They took my notes without my knowledge and without legal authority to do so,” Hudson said this week. “The search warrant they presented said nothing about walking out of here with a single sheet of paper.”
  • After the search began, Hudson said she was asked by an investigator with the Coast Guard Investigative Service if she was the same Audrey Hudson who had written a series of critical stories about air marshals for The Washington Times over the last decade. The Coast Guard operates under the Department of Homeland Security.
  •  
    If reality is as stated, the reporter has a pretty strong civil rights case against the government officials who knowingly participated in the theft and retention of the reporter's notes, two distinct conspiracies. Under the 4th Amendment, officers executing a search and seizure warrant may lawfully seize the items particularly described in the warrant and any other evidence of crime that is in plain view during the search. It's a big push of credibility to argue that reading documents stored in a bag in search for a gun falls within the "plain view" doctrine. The officer could instead just reach his hand into the bag and feel around for a gun. Quite a few extra steps involved in removing the documents and reading them simply to determine whether the bag contains a gun. Add in the facts that: [i] the supposed recognition of government documents argument does not explain why the officers seized personal handwritten notes too; and [ii] the evidence that the officer who discovered the docs had learned that the reporter was one who had called the conduct of his agency into question, and it comes out smelling a lot more like an attempt to discover the reporters' sources than a legitimate search for guns when the bag was searched.   Only one side heard from so far, of course. But this sounds more like low-level government officials who were ignorant of their legal obligations than a White House-driven scandal. But I wouldn't want to be the government lawyer who authorized the retention of the seized notes and other documents. They should have been returned without retaining copies the instant the lawyer learned of the circumstances of their seizure. There's not only a 4th Amendment liberty interest but also a 1st Amendment freecdom to communicate anonymously right protecting those documents and notes. 
  • ...1 more comment...
  •  
    I listened to an interview with Audrey Hudson last night. It seems to me the key fact is in this clip; "But without Hudson's knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said." Audrey had written a series of articles describing how the Homeland Security and Transportation agency had been lying about air marshalls and the post 911 program to secure passenger flights. The documents that were stolen listed her sources - the whistle blowers inside the Homeland Security administration who leaked information about the lies and the many problems with the program that the Obama administration was covering up. This sounds to me like another example of Obama hunting down and persecuting whistleblowers. A direct violation of the 1989 - 2007 Whistleblower Protection Act. Not surprisingly, Ms Hudson had not tried to contact any of her whistleblowing sources for fear that the NSA would be watching and that this persecution would happen. Interestingly, the warrant was to seize a "potato launcher". No kidding! It seems Ms. Hudson's husband had, at one time been a licensed arms dealer. He lost that license having sold a gun with faulty paperwork. This event had occurred years earlier, and Mr. Hudson had long since moved on and was currently working for the Coast Guard as an outside contractor/consultant. So they seized the toy "potato launcher", as described in the warrant. But they also ransacked the home looking for the key documents that listed Ms Hudson's inside Homeland Security sources behind her air marshal scandal articles. These documents were the only items seized - other than the "potato launcher" that was the only item listed in the warrant. Seems we've been here before. From wikipedia, the story of Friedrich Gustav Emil Martin Niemöller: ........................... Arrested on 1 July 1937, N
  •  
    "But without Hudson's knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said."
  •  
    What troubles me the most about this event, assuming the truth of what's reported, is how well known the limitations on execution of a search warrant are within the law enforcement community. If it happened as described, it seems very unlikely that the officer who grabbed the documents did not know he was violating the 4th Amendment. Ditto for the lawyer or other official(s) who learned of what went down shortly thereafter, but kept the documents anyway. There's an arrogance that goes with government and corporate officials who don't have to personally pay damage awards. With no personal monetary liability (in reality, since the government or corporation picks up the tab), it becomes a matter of personal ethics and whether the misbehavior will anger or please the boss. If the ethics are weak, that becomes a pretty simple choice.
1 - 20 of 786 Next › Last »
Showing 20 items per page