Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged legal-history

Rss Feed Group items tagged

Paul Merrell

Show Us the Drone Memos - NYTimes.com - 0 views

  • I BELIEVE that killing an American citizen without a trial is an extraordinary concept and deserves serious debate. I can’t imagine appointing someone to the federal bench, one level below the Supreme Court, without fully understanding that person’s views concerning the extrajudicial killing of American citizens.But President Obama is seeking to do just that. He has nominated David J. Barron, a Harvard law professor and a former acting assistant attorney general, to a seat on the United States Court of Appeals for the First Circuit.
  • I believe that all senators should have access to all of these opinions. Furthermore, the American people deserve to see redacted versions of these memos so that they can understand the Obama administration’s legal justification for this extraordinary exercise of executive power. The White House may invoke national security against disclosure, but legal arguments that affect the rights of every American should not have the privilege of secrecy.I agree with the A.C.L.U. that “no senator can meaningfully carry out his or her constitutional obligation to provide ‘advice and consent’ on this nomination to a lifetime position as a federal appellate judge without being able to read Mr. Barron’s most important and consequential legal writing.” The A.C.L.U. cites the fact that in modern history, a presidential order to kill an American citizen away from a battlefield is unprecedented.The Bill of Rights is clear. The Fifth Amendment provides that no one can be “deprived of life, liberty, or property, without due process of law.” The Sixth Amendment provides that “the accused shall enjoy the right to a speedy and public trial, by an impartial jury,” as well as the right to be informed of all charges and have access to legal counsel. These are fundamental rights that cannot be waived with a presidential pen.
  • In battle, combatants engaged in war against America get no due process and may lawfully be killed. But citizens not in a battlefield, however despicable, are guaranteed a trial by our Constitution.
  • ...3 more annotations...
  • While he was an official in the Justice Department’s Office of Legal Counsel, Mr. Barron wrote at least two legal memos justifying the execution without a trial of an American citizen abroad. Now Mr. Obama is refusing to share that legal argument with the American people. On April 30, I wrote to the Senate majority leader, Harry Reid, urging him to delay this nomination, pending a court-ordered disclosure of the first memo I knew about. Since that letter, I have learned more. The American Civil Liberties Union sent a letter to all senators on May 6, noting that in the view of the Senate Intelligence Committee chairwoman, Dianne Feinstein, “there are at least eleven OLC opinions on the targeted killing or drone program.” It has not been established whether Mr. Barron wrote all those memos, but we do know that his controversial classified opinions provided the president with a legal argument and justification to target an American citizen for execution without a trial by jury or due process.
  • No one argues that Americans who commit treason shouldn’t be punished. The maximum penalty for treason is death. But the Constitution specifies the process necessary to convict.Continue reading the main story Continue reading the main story AdvertisementAnwar al-Awlaki was an American citizen who was subject to a kill order from Mr. Obama, and was killed in 2011 in Yemen by a missile fired from a drone. I don’t doubt that Mr. Awlaki committed treason and deserved the most severe punishment. Under our Constitution, he should have been tried — in absentia, if necessary — and allowed a legal defense. If he had been convicted and sentenced to death, then the execution of that sentence, whether by drone or by injection, would not have been an issue. Continue reading the main story 526 Comments But this new legal standard does not apply merely to a despicable human being who wanted to harm the United States. The Obama administration has established a legal justification that applies to every American citizen, whether in Yemen, Germany or Canada.
  • Defending the rights of all American citizens to a trial by jury is a core value of our Constitution. Those who would make exceptions for killing accused American citizens without trial should give thought to the times in our history when either prejudice or fear allowed us to forget due process. During World War I, our nation convicted and imprisoned Americans who voiced opposition to the war. During World War II, the government interned Japanese-Americans.The rule of law exists to protect those who are minorities by virtue of their skin color or their beliefs. That is why I am fighting this nomination. And I will do so until Mr. Barron frankly discusses his opinions on executing Americans without trial, and until the American people are able to participate in one of the most consequential debates in our history. Rand Paul is a Republican senator from Kentucky.
Paul Merrell

NUJ members under police surveillance mount collective legal challenge - National Union... - 0 views

  • Six NUJ members have discovered that their lawful journalistic and union activities are being monitored and recorded by the Metropolitan Police. They are now taking legal action against the Metropolitan Police Commissioner and the Home Secretary to challenge this ongoing police surveillance. The NUJ members involved in the legal challenge include Jules Mattsson, Mark Thomas, Jason Parkinson, Jess Hurd, David Hoffman and Adrian Arbib. All of them have worked on media reports that have exposed corporate and state misconduct and they have each also previously pursued litigation or complaints arising from police misconduct. In many of those cases, the Metropolitan Police Commissioner has been forced to pay damages, apologise and admit liability to them after their journalistic rights were curtailed by his officers at public events.
  • The surveillance was revealed as part of an ongoing campaign, which began in 2008, during which NUJ members have been encouraged to obtain data held about them by the authorities including the Metropolitan Police 'National Domestic Extremism and Disorder Intelligence Unit' (NDEDIU). The supposed purpose of the unit is to monitor and police so called 'domestic extremism'. In the course of the campaign, a number of NUJ members have obtained data held about them and the union fears there are many more journalists and union members being monitored.
  • The NUJ has instructed Bhatt Murphy Solicitors to pursue the case. The cases raise significant and wide-ranging concerns about: the impact on privacy, the chilling effect on the ability of NUJ members and journalists to do their jobs, and their ability to take part in legitimate trade union activity. The claim challenges the surveillance and retention of data on the basis that it is unnecessary, disproportionate and not in accordance with the law. Journalists and union members have no way of knowing the circumstances in which their activities are monitored, retained, disclosed and systematically stored on secret police 'domestic extremism' databases. The NUJ continues to offer support and assistance to the members involved and extends its support to other media workers who may be affected. The union is extremely concerned by the lack of legal safeguards to protect the press and trade unions from state interference, and believes the actions of the authorities do not abide by domestic law and the European Convention on Human Rights, including Article 8 on privacy, Article 10 on freedom of expression and Article 11 on freedom of assembly and association.
  • ...1 more annotation...
  • I'm A Photographer Not A Terrorist – NUJ supported campaign. Met's journalist files include details of sexual orientation, childhood and family medical history - Jules MattssonTimes journalist Jules Mattsson is one of six members of the NUJ to launch a legal challenge against the Metropolitan Police after finding that it keeps surveillance files on them in a database of Domestic Extremism. When police spy on journalists like me, freedom is at risk - Jason N ParkinsonPersistent requests under the Data Protection Act revealed that files were kept on journalists who were simply doing their job IFJ backs legal challenge by journalists over police surveillance in UKThe International Federation of Journalists has joined in supporting six NUJ members who have taken legal action against the Metropolitan Police and the Home Secretary. The legal challenge concerns the monitoring and recording of their lawful journalistic and union activities.
  •  
    Two excellent short videos on this page. It's disturbing that police are ignoring the EU Convention on Human Rights. Related, legislation is currently in Parliament to grant the government the power to censor any form of "extremism" on the Web, with the term "extremism" left undefined.   Civil liberties have been under attack in the UK for at least 1,000 years. Time for a new Magna Carta?
Gary Edwards

The Basic Library - Article V Project To Restore Liberty - 2 views

  •  
    "Free Google Book Search (360 B.C.) The Republic - Plato (46 B.C.) Cicero's Brutus - Cicero   (1517) Discourses on Livy - Machiavelli (1553) The Discourse of Voluntary Servitude - Étienne de La Boétie (1690) Two Treatises of Government - John Locke   (1698) Discourses Concerning Government - Algernon Sydney Sidney's Discourses and Locke's Second Treatise were recommended by Jefferson and Madison as containing the "general principles of liberty and the rights of man, in nature and society" (1748) The Spirit of Laws  - Montesquieu (1748) The Principles of Natural and Politic Law - Burlamaqui   (1755) Old Family Letters - John Adams (1758) The Law of Nations- Vattel   (1764-1769) The Writings of Samuel Adams (1765-1769) Blackstone's Commentaries on the Laws of England (1766) The Declaratory Act (1770) The Writings of John Adams V1-2              The Writings of John Adams V3-4              The Writings of John Adams V5-7              The Writings of John Adams V8-10   (1771-1788) The Autobiography of Benjamin Franklin (1772) The Votes and Proceedings of the Freeholders and other Inhabitants (1774) A Full Vindication of the Measures of Congress - Hamilton (1774) Novanglus - John Adams Principle Controversy between Great Britain and Her Colonies (1776) Common Sense- Thomas Paine One Incident which gave a stimulus to the pamphlet Common Sense was, that it happened to appear on the very day that the King of England's speech reached the United States, in which the Americans were denounced as rebels and traitors, and in which speech it was asserted to be the right of the legislature of England to bind the Colonies in all cases whatsoever. (1776-1783) The Crisis- Thomas Paine (1780) Journal of the Convention for Framing the Massachusetts Bay Constitution (1785) Remarks concerning the Government and Laws of the United States of America: in Four Letters addressed to Mr. Adams (1787) The Anti-Federalist (audio) (1787) The Federalist
Gary Edwards

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Paul Merrell

Vienna Convention on Diplomatic Relations - Wikipedia, the free encyclopedia - 0 views

  • The Vienna Convention on Diplomatic Relations of 1961 is an international treaty that defines a framework for diplomatic relations between independent countries. It specifies the privileges of a diplomatic mission that enable diplomats to perform their function without fear of coercion or harassment by the host country. This forms the legal basis for diplomatic immunity.
  • The treaty is an extensive document, containing 53 articles. Following is a basic overview of its key provisions.[2]
  • Article 22. The premises of a diplomatic mission, such as an embassy, are inviolate and must not be entered by the host country except by permission of the head of the mission. Furthermore, the host country must protect the mission from intrusion or damage. The host country must never search the premises, nor seize its documents or property. Article 30 extends this provision to the private residence of the diplomats. Article 27. The host country must permit and protect free communication between the diplomats of the mission and their home country. A diplomatic bag must never be opened even on suspicion of abuse. A diplomatic courier must never be arrested or detained.
  • ...2 more annotations...
  • Article 37. The family members of a diplomat that are living in the host country enjoy most of the same protections as the diplomats themselves.
  • Original text related to this article Diplomatic Relations Protocols The Vienna Convention on Diplomatic Relations 50th Anniversary Website Created by the 2011 VCDR 50th Anniversary Project Introductory note by Eileen Denza, procedural history note and audiovisual material on the Vienna Convention on Diplomatic Relations in the Historic Archives of the United Nations Audiovisual Library of International Law Lecture by Eileen Denza entitled Diplomatic and Consular Law – Topical Issues in the Lecture Series of the United Nations Audiovisual Library of International Law Lecture by John Dugard entitled Diplomatic Protection in the Lecture Series of the United Nations Audiovisual Library of International Law
  •  
    Remember the NSA's electronic surveillance of foreign embassies and diplomats around the world and of U.N. missions and diplomats? The Vienna Convention on Diplomatic Relations is the governing international law. I've just completed reading the entire treaty but will highlight portions from its Wikipedia entry instead.  Disputes involving the treaty are decided by the International Court of Justice.  The treaty itself goes into far more detail, but suffice it to say that the NSA's electronic surveillance of diplomats and their staff is beyond doubt in direct conflict with both the letter and the spirit of the treaty. The inviolability privacy of diplomats and staff communications with each other and with their government is an obligation of the host nation. The U.S. committed a serious breach of the treaty by intercepting communications in this circumstance. 
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Britain Considers Pulling out of European Convention on Human Rights when Armed Forces ... - 0 views

  • Senior Whitehall figures are drawing up controversial plans to ensure that Britain’s armed forces will no longer be subject to legal claims by their enemies over human rights violations.Guaranteed to have Brits in Middle England choking on their morning croissants, Saturday’s claims from right-wing mouthpiece, The Telegraph, insisted that taxpayers are facing a bill of £150 million to defend British soldiers being sued by “enemy fighters” for breaching their human rights. The Telegraph claimed that over 2,000 compensation claims and judicial reviews are being prepared by lawyers in the aftermath of the wars in Afghanistan and Iraq as part of a growing litigation culture that is encroaching on the ability of the armed forces to do their jobs.So far, 500 judicial review applications have been lodged, with 1,200 claims for compensation against the Ministry of Defense for alleged abuse, unlawful detention, and unlawful killing in Iraq.Further, an estimated 800 compensation cases from Afghanistan could follow.
  • Defence secretary Michael Fallon is so dismayed at what he calls the “increasing encroachment of human rights law into the battlefield,” that he is determined to take steps to stem the tide of legal action.Some of the planned fightback by ministers should concern everyone:Pulling out of the European Convention: Ministers could declare a temporary withdrawal from the European Convention on Human Rights (ECHR) before sending British forces into action in future.Taking legal action against law firms that have brought “bogus” cases against the Armed Forces: This includes referring lawyers to legal watchdogs and bringing fraud prosecutions against firms found to have made false allegations.A time limit on legal action to stop compensation claims being made years after incidents occur: Further reforms would end legal aid for claimants who are living outside the U.K.Planned new laws would also allow the government to recover the costs of “bogus judicial reviews,”  but one proposal is the most worrying of all:
  • A new Bill of Rights: Michael Gove is working on a British Bill of Rights to replace the Human Rights Act, according to ministers. It will reportedly include safeguards for the Armed Forces to protect them from being sued.In contrast to Michael Fallon’s indignation, a report by Stop The War claims “The long history of British abuse and torture in Kenya, Malaya, Aden, Cyprus, Northern Ireland and Afghanistan cannot be explained as the work of a few ‘bad apples.’”.BottomResponsiveBanner{width:300px;height:250px}@media (min-width:420px){.BottomResponsiveBanner{width:336px;height:280px}}@media (min-width:1300px){.BottomResponsiveBanner{width:728px;height:90px}} The report lists abuses committed by British forces and also references the “loss of the moral compass evident in the behaviour of British forces in Iraq and Afghanistan.”Some might say that by scrapping the Human Rights Act, the government fears being challenged and wants to take away the public’s ability to contest decisions and policies. One thing is for sure: without it, the British government will be allowed to act with almost complete impunity.
Gary Edwards

Impeach Judge James Robart for violating sovereignty and Constitution - 0 views

  •  
    "It's still hard to believe we now live in a country where a district judge can demand that we bring in refugees from state sponsors of terror and failed states saturated with terrorists and no data systems during a time of war. It's almost unfathomable that a district judge, an institution created by Congress, can overturn long-standing refugee law and bar the federal government from prioritizing persecuted religious minorities for refugee resettlement. All in contravention to statute, numerous clauses of the Constitution, the social contract, the social compact, popular sovereignty, jurisdictional sovereignty, and 200 years of case law. If Obergefell redefined the building block of all civilization, Judge James Robart's ruling redefined the building block of a sovereign nation. It's hard to comprehend a judicial opinion more divorced from our Constitution, sovereignty, fundamental laws, founding values, history, and tradition. It's also hard to imagine an opinion that is of greater consequence - unless it is ignored. In the long run, Congress must strip the federal judiciary of their power grab and restore Congress' plenary power over immigration, as it was since our founding. However, in the meantime, it's time to make impeachment great again. Impeachment was a critical check on abuse of power   Before the growth of political parties killed the separation of powers, the tool of impeachment was regarded by our founders as one of the most effective ways of checking the executive and judicial branches of government. By my count, impeachment is referenced 58 times in the Federalist Papers and countless times during the Constitutional Convention. Impeachment [U.S.CONST. art. II, §4] was not only reserved for those who engage in criminal behavior. It was clearly designed to check abuse of power. As the Congressional Research Service observes, Congress has identified "improperly exceeding or abusing the powers of the office" as a criterion for
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Gary Edwards

Comey has Long History of Cases Ending Favorable to Clintons - Tea Party News - 0 views

  • Messages found stored on Clinton’s private email server show that Berger – a convicted thief of classified documents – had been advising Clinton while she served as secretary of state and had access to emails containing classified information. For example, in an email dated Sept. 22, 2009, Berger advised Clinton advised how she could leverage information to make Israeli Prime Minister Benjamin Netanyahu more cooperative in discussions with the Obama administration over a settlement freeze.
  • Law firm ties Berger, Lynch, Mills Berger worked as a partner in the Washington law firm Hogan & Hartson from 1973 to 1977, before taking a position as the deputy director of policy planning at the State Department in the Carter administration. When Carter lost his re-election bid, Berger returned to Hogan & Hartson, where he worked until he took leave in 1988 to act as foreign policy adviser in Gov. Michael Dukakis’ presidential campaign. When Dukakis was defeated, Berger returned to Hogan & Hartson until he became foreign policy adviser for Bill Clinton’s presidential campaign in 1992. On March 28, WND reported Lynch was a litigation partner for eight years at Hogan & Hartson, from March 2002 through April 2010. Mills also worked at Hogan & Hartson, for two years, starting in 1990, before she joined then President-elect Bill Clinton’s transition team, on her way to securing a position as White House deputy counsel in the Clinton administration. According to documents Hillary Clinton’s first presidential campaign made public in 2008, Hogan & Hartson’s New York-based partner Howard Topaz was the tax lawyer who filed income tax returns for Bill and Hillary Clinton beginning in 2004. In addition, Hogan & Hartson in Virginia filed a patent trademark request on May 19, 2004, for Denver-based MX Logic Inc., the computer software firm that developed the email encryption system used to manage Clinton’s private email server beginning in July 2013. A tech expert has observed that employees of MX Logic could have had access to all the emails that went through her account.
  • In 1999, President Bill Clinton nominated Lynch for the first of her two terms as U.S. attorney for the Eastern District of New York, a position she held until she joined Hogan & Hartson in March 2002 to become a partner in the firm’s Litigation Practice Group. She left Hogan & Hartson in 2010, after being nominated by President Obama for her second term as U.S. attorney for the Eastern District of New York, a position she held until Obama nominated her to serve in her current position as attorney general. A report published April 8, 2008, by The American Lawyer noted Hogan & Hartson was among Hillary Clinton’s biggest financial supporters in the legal industry during her first presidential campaign. “Firm lawyers and staff have donated nearly $123,400 to her campaign so far, according to campaign contribution data from the Center for Responsive Politics,” Nate Raymond observed in The American Lawyer article. “Christine Varney, a partner in Hogan’s Washington, D.C., office, served as chief counsel to the Clinton-Gore Campaign in 1992.” While there is no evidence that Lynch played a direct role either in the tax work done by the firm for the Clintons or in linking Hillary’s private email server to MX Logic, the ethics of the legal profession hold all partners jointly liable for the actions of other partners in a business. “If Hogan and Hartson previously represented the Clintons on tax matters, it is incumbent upon U.S. Attorney General Loretta Lynch to [disclose] what, if any, role she had in such tax matters,” said Tom Fitton, president of Washington-based Judicial Watch.
  • ...4 more annotations...
  • HSBC link When Lynch’s nomination as attorney general was considered by the Senate one year ago, as WND reported, the Senate Judiciary Committee examined her role in the Obama administration’s decision not to prosecute the banking giant HSBC for laundering funds for Mexican drug cartels and Middle Eastern terrorists. WND was first to report in a series of articles beginning in 2012 money-laundering charges brought by John Cruz, a former HSBC vice president and relationship manager, based on his more than 1,000 pages of evidence and secret audio recordings. The staff of the Senate Judiciary Committee focused on Cruz’s allegations that Lynch, acting then in her capacity as the U.S. attorney for the Eastern District of New York, engaged in a Department of Justice cover-up. Obama’s attorney general nominee allowed HSBC in December 2011 to enter into a “deferred prosecution” settlement in which the bank agreed to pay a $1.9 billion fine and admit “willful criminal conduct” in exchange for dropping criminal investigations and prosecutions of HSBC directors or employees. Cruz called the $1.92 billion fine the U.S. government imposed on HSBC “a joke” and filed a $10 million lawsuit for “retaliation and wrongful termination.” From 2002 to 2003, Comey held the position of U.S. Attorney for the Southern District of New York, the same position held by Lynch. On March 4, 2013, he joined the HSBC board of directors, agreeing to serve as an independent non-executive director and a member of the bank’s Financial System Vulnerabilities Committee, positions he held until he resigned on Aug. 3, 2013, to become head of the FBI.
  • Comey, Fitzgerald and Valerie Plame On Jan. 1, 2004, the Washington Post reported that after Attorney General John Aschroft recused himself and his staff from any involvement in the investigation of who leaked the name of CIA employee Valerie Plame after journalist Robert Novak named her in print as a CIA operative, Comey assumed the role of acting attorney general for the purposes of the investigation. Comey appointed Patrick J. Fitzgerald, a U.S. attorney in Chicago, to act as special counsel in conducting the inquiry into what became known as “Plamegate.” At the time Comey made the appointment, Fitzgerald was already godfather to one of Comey’s children. On April 13, 2015, co-authoring a USA Today op-ed piece, Plame and her husband, retired ambassador Joseph Wilson, made public their support for Hillary Clinton’s 2016 presidential campaign, openly acknowledging their political closeness to both Hillary and Bill Clinton. The first two paragraphs of the editorial read: We have known Hillary Clinton both professionally and personally for close to 20 years, dating back to before President Bill Clinton’s first trip to Africa in 1998 — a trip that they both acknowledge changed their lives, and gave considerable meaning to their post-White House years and to the activities of the Clinton Foundation. Joe, serving as the National Security Council Senior Director for African Affairs, was instrumental in arranging that historic visit. Our history became entwined with Hillary further after Valerie’s identity as a CIA officer was deliberately exposed. That criminal act was taken in retribution for Joe’s article in The New York Times in which he explained he had discovered no basis for the Bush administration’s justification for the Iraq War that Saddam Hussein was seeking yellowcake uranium to develop a nuclear weapon.
  • In January 2016, Chuck Ross in the Daily Caller reported that Hillary Clinton emails made public made clear that one of her “most frequent favor-seekers when she was secretary of state was former Ambassador Joseph Wilson, a longtime Clinton friend, an endorser of Clinton’s 2008 presidential campaign, and an Africa expert with deep business ties on the continent.” Ross noted that Wilson emailed Clinton on Dec. 22, 2009, seeking help for Symbion Power, an American engineering contractor for whom Wilson consulted, in the company’s bid to pursue a U.S. Agency of International Development contract for work in Afghanistan. In the case of the Afghanistan project, Ross noted, Clinton vouched for Wilson and Symbion as she forwarded the request to Jack Lew, who served then as deputy secretary of state for management and resources. Ross further reported Wilson’s request might also have been discussed with President Obama, as one email indicates. In 2005, Fitzgerald prosecuted Libby, a prominent adviser to then Vice President Dick Cheney, in the Plame investigation, charging him with two counts of perjury, two counts of making false statements to federal prosecutors and one count of obstruction of justice. On March 6, 2007, Libby was convicted of four of the five counts, and on June 5, 2007, was sentenced by U.S. District Judge Reggie B. Walton to two and a half years in federal prison. On April 6, 2015, the Wall Street Journal reported the publication of New York Times reporter Judith Miller’s memoir “The Story: A Reporter’s Journey” exposed “unscrupulous conduct” by Fitzgerald in the 2007 trial of Libby.
  • WSJ reporter Peter Berkowitz noted Miller “writes that Mr. Fitzgerald induced her to give what she now realizes was false testimony.” “By withholding critical information and manipulating her memory as he prepared her to testify, Ms. Miller relates, Mr. Fitzgerald ‘steered’ her ‘in the wrong direction.’” http://www.wnd.com/2016/07/comey-has-long-history-of-clinton-related-cases/
  •  
    Bend over and grab your ankles. The rats nest of Clinton operatives in Washington DC is far deeper than anyone ever imagined. "FBI Director James Comey has a long history of involvement in Department of Justice actions that arguably ended up favorable to the Clintons. In 2004, Comey, then serving as a deputy attorney general in the Justice Department, apparently limited the scope of the criminal investigation of Sandy Berger, which left out former Clinton administration officials who may have coordinated with Berger in his removal and destruction of classified records from the National Archives. The documents were relevant to accusations that the Clinton administration was negligent in the build-up to the 9/11 terrorist attack. On Tuesday, Comey announced that despite evidence of "extreme negligence by Hillary Clinton and her top aides regarding the handling of classified information through a private email server, the FBI would not refer criminal charges to Attorney General Loretta Lynch and the Justice Department. Curiously, Berger, Lynch and Cheryl Mills all worked as partners in the Washington law firm Hogan & Hartson, which prepared tax returns for the Clintons and did patent work for a software firm that played a role in the private email server Hillary Clinton used when she was secretary of state. Lynch and Comey both served as U.S. attorney for the Southern District of New York. They crossed paths in the investigation of HSBC bank, which avoided criminal charges in a massive money-laundering scandal for which the bank paid a $1.9 billion fine. After Attorney General John Aschroft recused himself in the Valerie Plame affair in 2004, Comey appointed as special counsel Patrick J. Fitzgerald, who ended up convicting "Scooter" Libby, a top aide to then Vice President Dick Cheney, of perjury and obstruction of justice. The charge affirmed the accusations of Plame and her former ambassador husband, Joe Wilson - both partisan supporters of Bill and
  •  
    The "ethical" situation is far worse than described. Attorney disciplinary rules require that a lawyer, including all lawyers in the same firm, owe a lifetime duty of loyalty to a client, a duty that does not end with representation in a particular matter. Accordingly, Lynch had what the disciplinary rules refer to as an "actual conflict of interest" between her duties of loyalty to both Hillary and the U.S. government that required her withdrawal from representing either in the decision whether to prosecute Hillary. Saying that she would rubber stamp what Comey recommended was not the required withdrawal. Comey is an investigator, not a prosecutor. This was a situation for appointment of a special counsel to represent the Department of Justice in the decision whether to prosecute, not satisfied by rubber stamping Comey's recomendation,.
Gary Edwards

CHILDREN KILLED OF KEVIN KRIM, CHIEF EXECUTIVE OF CNBC DIGITAL, AFTER RELEASING INFORMA... - 0 views

  •  
    Incredible article about the behind-the-scenes story of the nanny murder of two small children in NYC.   First, it's a staged murder meant to send a clear message to ALL media.  The children were the offspring of Kevin Krim, CEO of CNBC digital.  His website had published a story about the Spire Law Group suing an entire class of bigshot BANKSTERS for the theft of $43 TRILLION dollars of tax payer money.  Second, this involves the US Government.  The Spire allegation is that the Feds actively helped and assisted the Bankster theft. Third, the story describes the historical background of these Bankster hits, assassination and threats.  Although not covered in the article, Presidential assassinations in particular have an unmistakable link to Executive Orders that the Treasury print Silver Certificates that would compete against Bankster notes.  In one way or another, it's all about control of the money system.  This list of Presidents includes Jackson, Lincoln, Garfield, McKinley, Kennedy and Reagan. Original Press Release from the Spire Law Group:  ... http://goo.gl/ynV6O .... Wow! ................................... excerpt:: "On 10/25/2012 two corporate financial media bastions,  MarketWatch  (an affiliate of the Wall Street Journal) and CNBC, presented their readers with a bombshell.  In a too-good-to-be-true lawsuit, the top echelons of the USA's banking and civilian government had been sued for "racketeering and money laundering."  The suit requested "the return of $43 trillion to the United States Treasury."  Yes, you've read that right: 43 trillion-roughly 3 years worth of America's GDP or 3 times America's underestimate of its own national debt. The suit characterizes itself, according to these two corporate media tabloids, as the largest money laundering and racketeering lawsuit in United States History.  [It identifies] $43 trillion ($43,000,000,000,000.00) of laundered money by the 'Banksters' and their U.S. r
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Paul Merrell

Wikimedia v. NSA: Another Court Blinds Itself to Mass NSA Surveillance | Electronic Fro... - 0 views

  • We all know justice is blind. But that is supposed to mean that everyone before it is treated equally, not that the justice system must close its eyes and refuse to look at important legal issues facing Americans.  Yet the government continues to convince courts that they cannot consider the constitutionality of its behavior in national security cases and, last week, in an important case for anyone who has ever used Wikipedia, another judge agreed with that position.  A federal district judge in Maryland dismissed Wikimedia v. NSA, a case challenging the legality of the NSA’s “upstream” surveillance—mass surveillance of Internet communications as they flow through the Internet backbone. The case was brought by our friends at the ACLU on behalf of nine plaintiffs, including human rights organizations, members of the media, and the Wikimedia Foundation.1 We filed a brief in the case, too, in support of Wikimedia and the other plaintiffs. The judge dismissed the case based on a legal principle called standing. Standing is supposed to ensure, among other things, that the party bringing the lawsuit has suffered a concrete harm, caused by the party being sued, and that the court can resolve the harm with a favorable ruling.
  • But the U.S. government has taken this doctrine, which was intended to limit the cases federal courts hear to actual live controversies, and turned it into a perverse shell game in surveillance cases—essentially arguing that because aspects of the surveillance program are secret, plaintiffs cannot prove that their communications were actually, in fact, intercepted and surveilled. And without that proof, the government argues, there’s no standing, because plaintiffs can’t show that they’ve suffered harm. Sadly, like several other courts before it, the judge agreed to this shell game and decided that it couldn’t decide whether the constitutional rights of Wikimedia and the other plaintiffs were violated.  This game is mighty familiar to us at EFF, but that doesn’t make it any less troubling. In our system, the courts have a fundamental obligation to conclusively determine the legality of government action that affects individuals’ constitutional rights. For years now, plaintiffs have tried to get the courts to simply issue a ruling on the merits of NSA surveillance programs. And for years, the government has successfully persuaded the courts to rely on standing and related doctrines to avoid doing so. That is essentially what happened here. The court labeled as “speculative” Wikimedia’s claim that, at a minimum, even one of its approximately one trillion Internet communications had been swept up in the NSA’s upstream surveillance program. Remember, this is a program that, by the government’s own admission, involves the searching and scanning of vast amounts of Internet traffic at key Internet junctures on the Internet’s backbone. Yet in court’s view, Wikimedia’s allegations describing upstream—based on concrete facts, taken from government documents— coupled with a plaintiff that engages in a large volume of internet communications were not enough to state a “plausible” claim that Wikimedia had been surveilled.
  • On the way to reaching that conclusion, and putting on its blindfold, the court made a number of mistakes. The Government’s Automated Eyes Are Still Government Eyes First, it appears the court fundamentally misunderstood Wikimedia’s claim about upstream surveillance and, in particular, “about surveillance.” As Wikimedia alleged, “about surveillance” (a specific aspect of upstream surveillance that searches the content of communications for references to particular email addresses or other identifiers) amounts to “the digital analogue of having a government agent open every piece of mail that comes through the post to determine whether it mentions a particular word or phrase.” The court held, however, that this type of “about” surveillance was “targeted insofar as it makes use of only those communications that contain information matching the tasked selectors,” like email addresses. But what the government "makes use of" is entirely beside the point—it is the scanning of the communications for the tasked selectors in the first place that is the problem.  To put it into a different context, the government conducts a search when it enters into your house and starts rifling through your files—not just when it finds something it wants to keep. The government's ultimate decision to “make use of” the communications it finds interesting is irrelevant. It is the search of the communications that matters.
  • ...2 more annotations...
  • Back of the Envelope Gymnastics Another troubling aspect of the court’s decision was its attack on the probabilities Wikimedia assigned to the likelihood of its communications being intercepted. Given that Wikimedia engages in a large volume of Internet communications, Wikimedia alleged that—even assuming a .00000001% chance that any one particular communication is intercepted—it would still have a 99.9999999999% of having one of its communications intercepted. The statistic was used to illustrate that, even assuming very low probabilities for interception, there was still a near-certainty that Wikipedia’s traffic was collected. But the court attacked Wikimedia’s simple statistical analysis (and the attack tracked, to a great degree, arguments made in the government’s declarations that the court purportedly did not consider). The court seemed to believe it had seized upon a great flaw in Wikimedia’s case by observing that, if the probability of any given communication being intercepted were decreased 100% or 1000%, the probability of one of Wikimedia’s communications being intercepted would similarly drop. The “mathematical gymnastics” the court believed it had unearthed were nothing more than Wikimedia using an intentionally small (and admittedly arbitrary) probability to illustrate the high likelihood that its communications had been swept up. But even if the court disagreed with the probabilities Wikimedia relied on, it’s not at all clear why that would justify dismissing the case at the outset. If it turned out, after development of the record, that the probabilities were off, then dismissal might be appropriate. But the court cut the case off before Wikimedia had the opportunity to introduce evidence or other facts that might support the probability they assigned.
  • Someone Else Probably Has Standing, Right? Perhaps most troubling was the court’s mistaken belief that the legality of upstream surveillance could be challenged in other ways, beyond civil cases like Wikimedia or our ongoing case, Jewel v. NSA. The court asserted its decision would not insulate upstream from judicial review, which—according to the court—could still receive judicial scrutiny through (1) review from the Foreign Intelligence Surveillance Court (FISC), (2) a challenge by a criminal defendant, or (3) a challenge from an electronic service provider. None of these options is truly a viable alternative, however. First, the FISC (until very recently) did not have adversarial proceedings—it only heard from the government, and its proceedings remain both far more limited and more secretive than a regular court’s. Second, a challenge from a criminal defendant won’t work either, because, to date, the government has explicitly refused to disclose—even where defendants are notified of the use of FISA surveillance—whether their communications were obtained using upstream surveillance. And, finally, in the nearly 15 years (or more) the government has conducted upstream surveillance, we’re not aware of any service provider that has challenged the legality of the practice. Indeed, given that upstream is done with the cooperation of telecoms like AT&T and Verizon—the same telcos that did not challenge the NSA’s bulk collection of Americans’ call records for over a decade—we're not holding our breath for a challenge anytime soon. Instead, we need the courts to tackle these cases. Upstream surveillance presents unique constitutional issues that no federal court has seriously addressed. It's time the federal courts stepped up to the challenge.
  •  
    The notion that the government can intentionally violate the privacy rights of its citizens yet a court find that those citizens have no right to seek redress announces a view that privacy rights are hollow --- that those wronged by government malfeasance have no remedy in the courts of our nation. That is a view that must be thrown in the dustbins of history if freedom is to be preserved. 
Gary Edwards

Ted Cruz: Legal Limit Report 4 - 0 views

  •  
    "  1 THE LEGAL LIMIT: THE OBAMA ADMINISTRATION'S ATTEMPTS TO EXPAND FEDERAL POWER  Report No. 4: The Obama Administration's Abuse of Power By U.S. Senator Ted Cruz (R-TX) Ranking Member Senate Judiciary Subcommittee on The Constitution, Civil Rights and Human Rights Of all the troubling aspects of the Obama presidency, none is more dangerous than the President's persistent pattern of lawlessness, his willingness to disregard the written law and instead enforce his own policies via executive fiat. The President's taste for unilateral action to circumvent Congress should concern every citizen, regardless of party or ideology. The great 18th-century political philosopher Montesquieu observed: "There can be no liberty where the legislative and executive powers are united in the same person, or body of magistrates." America's Founding Fathers took this warning to heart, and we should too. Rule of law doesn't simply mean that society has laws; dictatorships are often characterized by an abundance of laws. Rather, rule of law means that we are a nation ruled   by laws, not men. No one-and especially not the president-is above the law. For that reason, the U.S. Constitution imposes on every president the express duty to "take Care that the Laws be faithfully executed." R ather than honor this duty, President Obama has openly defied it by repeatedly suspending, delaying, and waiving portions of the laws that he is charged to enforce. When President Obama disagreed with federal immigration laws, he instructed the Justice Department to cease enforcing the laws. He did the same thing with federal welfare law, drug laws, and the federal Defense of Marriage Act. In the more than two centuries of our nation's history, there is simply no precedent for the White House wantonly ignoring federal law and asking others to do the same. For all those who are silent now: What would they think of a Republican president who announced that he was going to ignore th
  •  
    "  1 THE LEGAL LIMIT: THE OBAMA ADMINISTRATION'S ATTEMPTS TO EXPAND FEDERAL POWER  Report No. 4: The Obama Administration's Abuse of Power By U.S. Senator Ted Cruz (R-TX) Ranking Member Senate Judiciary Subcommittee on The Constitution, Civil Rights and Human Rights Of all the troubling aspects of the Obama presidency, none is more dangerous than the President's persistent pattern of lawlessness, his willingness to disregard the written law and instead enforce his own policies via executive fiat. The President's taste for unilateral action to circumvent Congress should concern every citizen, regardless of party or ideology. The great 18th-century political philosopher Montesquieu observed: "There can be no liberty where the legislative and executive powers are united in the same person, or body of magistrates." America's Founding Fathers took this warning to heart, and we should too. Rule of law doesn't simply mean that society has laws; dictatorships are often characterized by an abundance of laws. Rather, rule of law means that we are a nation ruled   by laws, not men. No one-and especially not the president-is above the law. For that reason, the U.S. Constitution imposes on every president the express duty to "take Care that the Laws be faithfully executed." R ather than honor this duty, President Obama has openly defied it by repeatedly suspending, delaying, and waiving portions of the laws that he is charged to enforce. When President Obama disagreed with federal immigration laws, he instructed the Justice Department to cease enforcing the laws. He did the same thing with federal welfare law, drug laws, and the federal Defense of Marriage Act. In the more than two centuries of our nation's history, there is simply no precedent for the White House wantonly ignoring federal law and asking others to do the same. For all those who are silent now: What would they think of a Republican president who announced that he was going to ignore the law, or unil
Gary Edwards

The Lawless President - 0 views

  •  
    Excellent read!  Peter Ferrara walks us through the latest Obama assault on the Constitution, this time his refusal to enforce laws he disagrees with.  Surprisingly, this now includes the employer mandate portion of ObamaCare!!!  Why he has to do this however is a stunning story. Bottom line:  The latest jobs report has the economy producing 195,000 new jobs in the past quarter.  The problem is, 100% of these new jobs are part-time.  Thanks to ObamaCare.   "The duties of the President of the United States are spelled out in Article II, Section 3 of the Constitution, which states, inter alia, that the President "shall take Care that the laws be faithfully executed." As Stanford Law Professor and former federal judge Michael McConnell explained in yesterday's Wall Street Journal, "This is a duty, not a discretionary power. While the president does have substantial discretion about how to enforce a law, he has no discretion about whether to do so." Section 1513(d) of the Unaffordable Care Act (aka "Obamacare") states unequivocally, "The amendments made by this section shall apply to months beginning after December 31, 2013." In other words, the provisions of Obamacare become fully effective in 2014, as a matter of duly enacted federal law. But over the long Fourth of July weekend, in a "Never Mind" moment, the Obama Administration announced, through a Deputy Assistant Secretary of the Treasury, that contrary to federal law, the employer mandate of Obamacare shall not become fully effective in months beginning after December 31, 2013, but only in months beginning after December 31, 2014. Making the announcement through such a low level Administration official to me says that Obama has contempt for the American people, and for the rule of law. Barack Obama: Lawbreaker But it does not matter who announces it. The President is the one responsible. And the announcement constitutes the assumption of authoritarian powers by President Obama. McCo
Paul Merrell

Is the Justice Department Protecting An Anti-Iran Smear Campaign? « LobeLog - 0 views

  • A new wrinkle in an already bizarre lawsuit is shaping up to potentially embarrass the Obama administration. If allegations made in a recent court filing are true, then the US Department of Justice, with an unprecedented assertion of the state secrets privilege, might be shielding from any accountability a group actively engaged in spreading false information. The lawsuit revolves around United Against Nuclear Iran (UANI), an anti-Iran, pro-sanctions outfit that takes a hard line against Iran and lodges name-and-shame campaigns against companies it says are doing business with the country. The group is made up of former officials from the Bush and Obama administrations, as well as a host of academics, former diplomats and former intelligence officials from foreign countries, including Israel.
  • Last week, things got even weirder: in a motion filed on Wednesday, Restis’s lawyers suggested that UANI had leaked information to the Jerusalem Post that resulted in a piece accusing Restis of doing more illegal business in Iran. The Post later retracted the article, citing “new information” that indicated the purportedly illegal shipping had been “legitimate and permitted,” and scrubbed the article from its website. “Defendants appear to have provided The Jerusalem Post with false information purporting to show an American company’s legal and humanitarian cargo of soya beans to Iran aboard Plaintiffs’ vessel violated sanctions against Iran,” said a footnote in the filing from Restis’s lawyers. “Although it printed Defendants’ false allegations against Plaintiffs, The Jerusalem Post recognized the falsity of the allegations and issued a retraction and apology.”
  • If true, the alleged UANI leak of false information to the Jerusalem Post would contradict UANI’s lawyers’ assertion in an October hearing that “UANI has made no statements whatsoever about Victor Restis or his companies, about any subject, doing business with Iran or any subject since February of 2014.” The Jerusalem Post article also said that the information it revealed would be “raised… in an upcoming hearing in a US federal court.” UANI’s lawyers brought up the purported revelations the following day in the October 8 hearing. It has not been proven that UANI leaked information to the Post.
  • ...4 more annotations...
  • In a separate filing last Wednesday, lawyers from the American Civil Liberties Union, the Center for Constitutional Rights, the Electronic Frontier Foundation and other groups spelled out how unusual the Justice Department intervention was. The groups submitted a friend of the court briefing—itself an unusual move, since amicus briefs are usually filed when cases reach the appellate stage—agreeing with Restis’s team. “Never before has the government sought dismissal of a suit between private parties on state secrets grounds without providing the parties and the public any information about the government’s interest in the case,” the lawyers from the groups wrote. “It is hard to see why, unlike in every other state secrets case in history, meaningful public disclosure to the parties is not possible in this case.”
  • The October 7 Jerusalem Post article in question, headlined “Evidence obtained by JPost shows alleged ongoing violation of Iran sanctions” and written by legal correspondent Yonah Jeremy Bob, went through several iterations online before being retracted. (Bob did not respond to requests for comment.) The original version of the article purported to present evidence that Restis’s companies were continuing to violate Iran sanctions by pointing to information that a ship owned by Restis docked in Iran on September 27. (The article was amended without notice before being captured by a web archive on October 8.) Lowell, the lawyer for Restis, denied the charges to the Post at the time. “In September 2014, a major US-based food company made a legal shipment of soya beans from Argentina to Iran aboard the Helvetia One, a vessel owned by the Restis family,” Lowell told the paper. “The provision of food cargo to Iran is entirely legal and encouraged under the humanitarian carve-outs to international sanctions regimes.”
  • The original version of the article purported to present evidence that Restis’s companies were continuing to violate Iran sanctions by pointing to information that a ship owned by Restis docked in Iran on September 27. (The article was amended without notice before being captured by a web archive on October 8.) Lowell, the lawyer for Restis, denied the charges to the Post at the time. “In September 2014, a major US-based food company made a legal shipment of soya beans from Argentina to Iran aboard the Helvetia One, a vessel owned by the Restis family,” Lowell told the paper. “The provision of food cargo to Iran is entirely legal and encouraged under the humanitarian carve-outs to international sanctions regimes.”
  • On October 22, the Post came around to Lowell’s perspective, scrubbing the story and issuing a “clarification and correction” that expressed regret for publishing the story. The Post said its assertions of illegal business were “contradicted by new information provided to us and therefore no allegations of misconduct should be concluded from the above article.”
  •  
    The strange Restis case just keeps getting more strange.
Gary Edwards

Major Banksters, Governmental Officials and Their Comrade Capitalists Targets of Spire ... - 0 views

  •  
    "NEW YORK, Oct. 25, 2012 /PRNewswire via COMTEX/ -- Spire Law Group, LLP's national home owners' lawsuit, pending in the venue where the "Banksters" control their $43 trillion racketeering scheme (New York) - known as the largest money laundering and racketeering lawsuit in United States History and identifying $43 trillion ($43,000,000,000,000.00) of laundered money by the "Banksters" and their U.S. racketeering partners and joint venturers - now pinpoints the identities of the key racketeering partners of the "Banksters" located in the highest offices of government and acting for their own self-interests. In connection with the federal lawsuit now impending in the United States District Court in Brooklyn, New York (Case No. 12-cv-04269-JBW-RML) - involving, among other things, a request that the District Court enjoin all mortgage foreclosures by the Banksters nationwide, unless and until the entire $43 trillion is repaid to a court-appointed receiver - Plaintiffs now establish the location of the $43 trillion ($43,000,000,000,000.00) of laundered money in a racketeering enterprise participated in by the following individuals (without limitation): Attorney General Holder acting in his individual capacity, Assistant Attorney General Tony West, the brother in law of Defendant California Attorney General Kamala Harris (both acting in their individual capacities), Jon Corzine (former New Jersey Governor), Robert Rubin (former Treasury Secretary and Bankster), Timothy Geitner, Treasury Secretary (acting in his individual capacity), Vikram Pandit (recently resigned and disgraced Chairman of the Board of Citigroup), Valerie Jarrett (a Senior White House Advisor), Anita Dunn (a former "communications director" for the Obama Administration), Robert Bauer (husband of Anita Dunn and Chief Legal Counsel for the Obama Re-election Campaign), as well as the "Banksters" themselves, and their affiliates and conduits. The lawsuit alleges serial violations of the United States Patri
  •  
    This is the first time anyone has tried to go after the Bankster class of midievil (mediæval) elites to recover theft of funds. Charges include racketeering, fraud and international money laundering. The mass tort action is now in the Brooklyn Federal Courts. Dead bodies are starting to show up as the Banksters move to shut down press coverage. Amazing stuff.
Paul Merrell

ACLU files new lawsuit over Obama administration drone 'kill list' | World news | The G... - 0 views

  • As the US debates expanding its campaign against the Islamic State beyond Iraq and Syria, the leading US civil liberties group is intensifying its efforts to force transparency about lethal US counterterrorism strikes and authorities. On Monday, the American Civil Liberties Union (ACLU) will file a disclosure lawsuit for secret Obama administration documents specifying, among other things, the criteria for placement on the so-called “kill list” for drone strikes and other deadly force. Information sought by the ACLU includes long-secret analyses establishing the legal basis for what the administration terms its “targeted killing program” and the process by which the administration determines that civilians are unlikely to be killed before launching a strike, as well as verification mechanisms afterward to establish if the strike in fact has caused civilian deaths.
  • “Over the last few years, the US government has used armed drones to kill thousands of people, including hundreds of civilians. The public should know who the government is killing, and why it’s killing them,” Jameel Jaffer, deputy legal director for the ACLU, told the Guardian.
  • The ACLU suit proceeds after the Obama administration disclosed none of the lethal counterterrorism documentation through a Freedom of Information Act request the civil liberties group launched in October 2013. According to the new lawsuit, the departments of state, justice and defense, as well as the CIA, have stonewalled the ACLU’s requests for nearly 18 months. Recent legal history suggests the ACLU is in for an uphill court struggle. The Obama administration, which has called itself the most transparent in history, has thus far repelled or delayed ACLU lawsuits for disclosure around drone strikes and the 2011 assassination of Anwar al-Awlaki, a US citizen and al-Qaida propagandist. Additionally, the administration is fighting the ACLU on the legality of its bulk surveillance activities and to prevent the release of thousands of graphic photographs detailing Bush-era torture by the CIA and military. Yet the administration has seen the courts chip away at its blanket denials of documents sought by the ACLU. Most of the intelligence community’s disclosures of surveillance memos since Edward Snowden’s revelations have followed the administration’s courtroom losses to the ACLU and other civil-liberties groups. In June, the second circuit court of appeals forced the Department of Justice to release much of a critical 2010 memo blessing the killing of Awlaki. (The ACLU is seeking the release of 10 more major intelligence memos related to targeted killing.)
Paul Merrell

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | gu... - 0 views

  • Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
  • GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history"."It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."
  • However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.Britain's technical capacity to tap into the cables that carry the world's communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.By 2010, two years after the project was first trialled, it was able to boast it had the "biggest internet access" of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.UK officials could also claim GCHQ "produces larger amounts of metadata than NSA". (Metadata describes basic information on who has been contacting whom, without detailing the content.)By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: "We have a light oversight regime compared with the US".
  • ...8 more annotations...
  • When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was "your call".The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
  • For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.This was done under secret agreements with commercial companies, described in one document as "intercept partners".The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned "sensitive relationship teams" and staff were urged in one internal guidance paper to disguise the origin of "special source" material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".
  • The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency's comparative advantage as the world's leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ's capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: "You are in an enviable position – have fun and make the most of it."
  • The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ's compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.An indication of how broad the dragnet can be was laid bare in advice from GCHQ's lawyers, who said it would be impossible to list the total number of people targeted because "this would be an infinite list which we couldn't manage".There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: "So far they have always found in our favour".
  • Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA's intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: "Why can't we collect all the signals all the time? Sounds like a good summer project for Menwith."By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK's position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
  • The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to "selectors" – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is "content", such as recordings of phone calls or the substance of email messages. The rest is metadata.
  • "The criteria are security, terror, organised crime. And economic well-being. There's an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don't have the resources."However, the legitimacy of the operation is in doubt. According to GCHQ's legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
  • British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
  •  
    Note particularly that the Brit criteria adds economic data to the list of categories categories the NSA trawls for and shares its data with the U.S. NSA. Both agencies claim to be targeting foreigners, so now we're into the "we surveil your citizens; you surveil our citizens, then we'll share the results" scenario that leaves both sides of the pond with a superficial excuse to say "we don't surveil our own citizens, just foreigners." But it's just ring-around-the-rosy. 850,000 NSA employees and U.S. private contractors with access to GCHQ surveillance databases.  Lots more in the article that I didn't highlight.
1 - 20 of 127 Next › Last »
Showing 20 items per page