Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged legal-history

Rss Feed Group items tagged

Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

CIA SUCCESSFULLY CONCEALS BAY OF PIGS HISTORY - 0 views

  • May 21, 2014 – The U.S. Court of Appeals for the D.C. Circuit yesterday joined the CIA's cover-up of its Bay of Pigs disaster in 1961 by ruling that a 30-year-old volume of the CIA's draft "official history" could be withheld from the public under the "deliberative process" privilege, even though four of the five volumes have previously been released with no harm either to national security or any government deliberation. "The D.C. Circuit's decision throws a burqa over the bureaucracy," said Tom Blanton, director of the National Security Archive (www.nsarchive.org), the plaintiff in the case. "Presidents only get 12 years after they leave office to withhold their deliberations," commented Blanton, "and the Federal Reserve Board releases its verbatim transcripts after five years. But here the D.C. Circuit has given the CIA's historical office immortality for its drafts, because, as the CIA argues, those drafts might 'confuse the public.'" "Applied to the contents of the National Archives of the United States, this decision would withdraw from the shelves more than half of what's there," Blanton concluded.
  • The 2-1 decision, authored by Judge Brett Kavanaugh (a George W. Bush appointee and co-author of the Kenneth Starr report that published extensive details of the Monica Lewinsky affair), agreed with Justice Department and CIA lawyers that because the history volume was a "pre-decisional and deliberative" draft, its release would "expose an agency's decision making process in such a way as to discourage candid discussion within the agency and thereby undermine the agency's ability to perform its functions." This language refers to the fifth exemption (known as b-5) in the Freedom of Information Act. The Kavanaugh opinion received its second and majority vote from Reagan appointee Stephen F. Williams, who has senior status on the court.
  • On the 50th anniversary of the Bay of Pigs invasion in 2011, the National Security Archive's Cuba project director, Peter Kornbluh, requested, through the FOIA, the complete release of "The Official History of the Bay of Pigs Operation" — a massive, five-volume study compiled by a CIA staff historian, Jack Pfeiffer, in the 1970s and early 1980s. Volume III had already been released under the Kennedy Assassination Records Act; and a censored version of Volume IV had been declassified years earlier pursuant to a request by Pfeiffer himself. The Archive's FOIA request pried loose Volumes I and II of the draft history, along with a less-redacted version of Volume IV, but the CIA refused to release Volume V, so the Archive filed suit under FOIA in 2012, represented by the expert FOIA litigator, David Sobel. In May 2012, U.S. District Judge Gladys Kessler held that Volume V was covered by the deliberative process privilege, and refused to order any segregation of "non-deliberative" material, as required by FOIA.
  • ...2 more annotations...
  • The Archive appealed the lower court's decision, and with representation from the distinguished firm of Skadden Arps Meagher Slate & Flom, brought the case to the D.C. Circuit, with oral argument in December 2013. The National Coalition for History, including the American Historical Association and other historical and archival professional organizations, joined the case with an amicus curiae brief authored by the Jones Day law firm arguing for release of the volume. Titled "CIA's Internal Investigation of the Bay of Pigs Operation," Volume V apparently contains Pfeiffer's aggressive defense of the CIA against a hard-hitting 1961 internal review, written by the agency's own Inspector General, which held the CIA singularly responsible for the poor assumptions, faulty planning and incompetence that led to the quick defeat of the paramilitary exile brigade by Fidel Castro's military at the Bahia de Cochinos between April 17 and April 20, 1961. The Archive obtained under FOIA and published the IG Report in 1998. The CIA has admitted in court papers that the Pfeiffer study contains "a polemic of recriminations against CIA officers who later criticized the operation," as well as against other Kennedy administration officials who Pfeiffer contended were responsible for this foreign policy disaster. In the dissenting opinion from the D.C. Circuit's 2-1 decision yesterday, Judge Judith Rogers (appointed by Bill Clinton) identified multiple contradictions in the CIA's legal arguments. Judge Rogers pointed out that the CIA had failed to justify why release of Volume V would "lead to public confusion" when CIA had already released Volumes I-IV. She noted that neither the CIA nor the majority court opinion had explained "why release of the draft of Volume V 'would expose an agency's decision making process,'" and discourage future internal deliberations within the CIA's historical office any more than release of the previous four volumes had done.
  • Prior to yesterday's decision, the Obama administration had bragged that reducing the government's invocation of the b-5 exemption was proof of the impact of the President's Day One commitment to a "presumption of disclosure." Instead, the bureaucracy has actually increased in the last two years its use of the b-5 exemption, which current White House counselor John Podesta once characterized as the "withhold if you want to" exemption. The majority opinion also left two openings for transparency advocates. It invites Congress to set a time limit for applying the b-5 exemption, as Congress has done in the Presidential Records Act. Second, it concludes that any "factual material" contained in the draft should be reachable through Freedom of Information requests.
  •  
    "Causing public confusion" is a weak grounds for withholding government records because the agency has the option of issuing clarifying statements. Indeed, much of what government does causes public confusion. Hopefully, the Archive will pursue en banc reconsideration and/or seek Supreme Court review. 
Paul Merrell

Giuliani: Trump asked me how to do a Muslim ban 'legally' | TheHill - 0 views

  • Former New York City Mayor Rudy Giuliani (R) said in an interview on Saturday that President Trump had previously asked him about legally implementing a "Muslim ban."But Giuliani then disputed the notion that the president's sweeping executive order barring refugees and people from seven predominantly Muslim nations amounts to a ban on Muslims."I’ll tell you the whole history of it: When he first announced it, he said ‘Muslim ban,'" Giuliani said on Fox News."He called me up, he said, ‘Put a commission together, show me the right way to do it legally.’"ADVERTISEMENTGiuliani said he then put together a commission that included lawmakers and expert lawyers."And what we did was we focused on, instead of religion, danger," Giuliani said."The areas of the world that create danger for us, which is a factual basis, not a religious basis. Perfectly legal, perfectly sensible."Giuliani reiterated that the ban is "not based on religion.""It's based on places where there are substantial evidence that people are sending terrorists into our country," he said.
  •  
    So discriminatory intent without discrimination? That won't fly in court, which probably explains the rash of injunctions against the ban. But why is Giuliani admitting this? Is he trying to sabotage the order?
Paul Merrell

Data Transfer Pact Between U.S. and Europe Is Ruled Invalid - The New York Times - 0 views

  • Europe’s highest court on Tuesday struck down an international agreement that allowed companies to move digital information like people’s web search histories and social media updates between the European Union and the United States. The decision left the international operations of companies like Google and Facebook in a sort of legal limbo even as their services continued working as usual.The ruling, by the European Court of Justice, said the so-called safe harbor agreement was flawed because it allowed American government authorities to gain routine access to Europeans’ online information. The court said leaks from Edward J. Snowden, the former contractor for the National Security Agency, made it clear that American intelligence agencies had almost unfettered access to the data, infringing on Europeans’ rights to privacy. The court said data protection regulators in each of the European Union’s 28 countries should have oversight over how companies collect and use online information of their countries’ citizens. European countries have widely varying stances towards privacy.
  • Data protection advocates hailed the ruling. Industry executives and trade groups, though, said the decision left a huge amount of uncertainty for big companies, many of which rely on the easy flow of data for lucrative businesses like online advertising. They called on the European Commission to complete a new safe harbor agreement with the United States, a deal that has been negotiated for more than two years and could limit the fallout from the court’s decision.
  • Some European officials and many of the big technology companies, including Facebook and Microsoft, tried to play down the impact of the ruling. The companies kept their services running, saying that other agreements with the European Union should provide an adequate legal foundation.But those other agreements are now expected to be examined and questioned by some of Europe’s national privacy watchdogs. The potential inquiries could make it hard for companies to transfer Europeans’ information overseas under the current data arrangements. And the ruling appeared to leave smaller companies with fewer legal resources vulnerable to potential privacy violations.
  • ...3 more annotations...
  • “We can’t assume that anything is now safe,” Brian Hengesbaugh, a privacy lawyer with Baker & McKenzie in Chicago who helped to negotiate the original safe harbor agreement. “The ruling is so sweepingly broad that any mechanism used to transfer data from Europe could be under threat.”At issue is the sort of personal data that people create when they post something on Facebook or other social media; when they do web searches on Google; or when they order products or buy movies from Amazon or Apple. Such data is hugely valuable to companies, which use it in a broad range of ways, including tailoring advertisements to individuals and promoting products or services based on users’ online activities.The data-transfer ruling does not apply solely to tech companies. It also affects any organization with international operations, such as when a company has employees in more than one region and needs to transfer payroll information or allow workers to manage their employee benefits online.
  • But it was unclear how bulletproof those treaties would be under the new ruling, which cannot be appealed and went into effect immediately. Europe’s privacy watchdogs, for example, remain divided over how to police American tech companies.France and Germany, where companies like Facebook and Google have huge numbers of users and have already been subject to other privacy rulings, are among the countries that have sought more aggressive protections for their citizens’ personal data. Britain and Ireland, among others, have been supportive of Safe Harbor, and many large American tech companies have set up overseas headquarters in Ireland.
  • “For those who are willing to take on big companies, this ruling will have empowered them to act,” said Ot van Daalen, a Dutch privacy lawyer at Project Moore, who has been a vocal advocate for stricter data protection rules. The safe harbor agreement has been in place since 2000, enabling American tech companies to compile data generated by their European clients in web searches, social media posts and other online activities.
  •  
    Another take on it from EFF: https://www.eff.org/deeplinks/2015/10/europes-court-justice-nsa-surveilance Expected since the Court's Advocate General released an opinion last week, presaging today's opinion.  Very big bucks involved behind the scenes because removing U.S.-based internet companies from the scene in the E.U. would pave the way for growth of E.U.-based companies.  The way forward for the U.S. companies is even more dicey because of a case now pending in the U.S.  The Second U.S. Circuit Court of Appeals is about to decide a related case in which Microsoft was ordered by the lower court to produce email records stored on a server in Ireland. . Should the Second Circuit uphold the order and the Supreme Court deny review, then under the principles announced today by the Court in the E.U., no U.S.-based company could ever be allowed to have "possession, custody, or control" of the data of E.U. citizens. You can bet that the E.U. case will weigh heavily in the Second Circuit's deliberations.  The E.U. decision is by far and away the largest legal event yet flowing out of the Edward Snowden disclosures, tectonic in scale. Up to now, Congress has succeeded in confining all NSA reforms to apply only to U.S. citizens. But now the large U.S. internet companies, Google, Facebook, Microsoft, Dropbox, etc., face the loss of all Europe as a market. Congress *will* be forced by their lobbying power to extend privacy protections to "non-U.S. persons."  Thank you again, Edward Snowden.
Paul Merrell

Bank Of America's $17 Billion Mortgage Crisis Settlement Could Be A Total Bust | ThinkP... - 0 views

  • Bank of America has agreed to a legal settlement with the Department of Justice (DOJ) to avoid prosecution for the hundreds of billions of dollars in bad mortgage loans that it and its subsidiaries sold to unwitting investors in the run-up to the financial crisis, according to multiple new reports. The total on-paper cost of the deal is reportedly at least $16 billion and perhaps as high as $17 billion, which makes it the largest corporate legal settlement with the government in U.S. history. But that record price tag is deceptive. The deal is unlikely to cost Bank of America anywhere close to that amount.
  • the government’s decision to pursue civil settlements rather than criminal cases against banks that inflated the toxic mortgage bubble means that shareholders pay the price while executives who oversaw the misconduct earn large bonuses.
  • “If you let a thief buy his way out of jail, you should really make sure the check doesn’t bounce,” HDL national campaign director Kevin Whelan said in an email. “Even a record $17 billion settlement is a small fraction of the damage done by B of A and Countrywide. But it could do real good for a lot of families,” Whelan said. “The fact that the JP Morgan Chase settlement has not delivered any noticeable relief to families makes us skeptical.”
  • ...2 more annotations...
  • Even at face value, the reported settlement is minuscule compared to the harm caused by Bank of America companies. The on-paper cost of the deal is less than 7 percent of the value of the mortgage deals Bank of America and its subsidiaries Countrywide and Merrill Lynch made before the crisis that have since gone bad. (Bank of America bought Countrywide and Merrill Lynch at the height of the crisis.) Those three companies issued just shy of a trillion dollars in mortgage-backed securities in the run-up to the financial collapse, and $245 billion of those products have gone bad, according to Bloomberg. Bank of America had pushed for a much smaller settlement for months, arguing that it should not have to pay for the sins of the firms it bought at bargain-bin prices when the economy was reeling. But a court ruling last month regarding Countrywide’s most notorious mortgage swindle caused the bank to change its tune, according to the New York Times. Judge Jed Rakoff ordered the bank to pay about $1.3 billion for one tranch of defective mortgages sold under a program that Countrywide nicknamed “Hustle” because of its fraudulent nature. Having lost one court case over Countrywide’s notorious misdeeds, the Times says, Bank of America decided to stop resisting federal officials’ settlement demands.
  • After tax deductions, the settlement could easily shrink below the roughly $15 billion in profits the company has reported since 2011. And because the financial crisis sucked something like $14 trillion out of the economy and destroyed tens of trillions of dollars in wealth for homeowners, the DOJ can hardly claim to have delivered a proportional response. The department’s claims about the Bank of America settlement are likely to draw political scrutiny. A bipartisan bill from Sens. Elizabeth Warren (D-MA) and Tom Coburn (R-OK) would require government officials to state the full tax deductibility and true cost of corporate legal settlements in all public statements about them. That bill, inspired by the revelations that JP Morgan’s sweetheart deal with the DOJ didn’t come close to the portrait that Attorney General Eric Holder painted of it, was passed out of committee late last month.
Gary Edwards

GOP immigration plan devised by Communist Party - 0 views

  • Republican support
  • But why would Republicans get behind such a plan? Some astute political observers advise that when politicians appear to be promoting agendas against their own interest, follow the money.
  • t’s no surprise that the Republicans supporting this thing are the ones with ties to the Chamber of Commerce, not ordinary voters.”
  • ...8 more annotations...
  • But even if big business benefits, the cheap labor advantages are only temporary. Once illegal aliens are fully legalized, businesses will be required to provide just as much in pay and benefits as they pay American workers.
  • In the meantime, however, it is widely assumed those workers will take jobs from American citizens, depress wages and increase unemployment. Moreover, in many key swing states, projected amnesties will swamp the rolls of the unemployed (see table)
  • So, illegal aliens would be granted legal status immediately, but five years down the road, if the fence still isn’t built and e-verify still isn’t being used, then their legal status would be revoked. Given that the Department of Homeland Security is already allegedly ignoring border security –with immigration and customs agents suing their own agency for failing to enforce the law – many voters place little confidence in political promises of future enforcement.
  • In the meantime, Senate and House opponents have been painstakingly highlighting what they consider to be glaring flaws in these proposals: Every single border security provision in the Senate bill, including the hire of 20,000 Border Patrol agents, denying amnesty to criminals, building fences and installing surveillance devices, can be waived by the Homeland Security secretary. Both the House and Senate proposals emphasize the path to citizenship – the centerpiece of communist efforts – while making border security both vague and secondary. Both bills provide a $5,000 incentive for companies to hire the newly legalized illegal aliens instead of Americans, since the aliens would not be subject to the Obamacare coverage mandate.
  • Although politicians and the media have settled on the claim that there are 11 million illegal aliens, the actual number may well be closer to 20 million to 30 million. There were 10 million in 1996, a mere 10 years after Reagan’s amnesty, and it is doubtful only one million more have been added in the ensuing 17 years. Since 1990, Border agents have apprehended on average more than 1 million illegal aliens per year, almost all from Mexico.
  • When the Reagan amnesty became law, the intention was to naturalize only 1.2 million people, but the actual figure turned out to be 2.7 million. Statistics on illegal immigration have longed tended to be underestimated, sometimes vastly so.
  • Thus, current proposals provide a path to citizenship for as many as 20 to 30 million illegal aliens here now, plus relatives who will be brought in through chain migration and at least 75 percent of those who will come in the future – virtually endless amnesty – while efforts to secure the border are almost certain to be insufficient.
  • With polls showing more than two-thirds of Americans don’t believe “immigration laws would be enforced in the future if illegal aliens were given amnesty,” it is clear that passage of the current Republican-backed bill may indeed fulfill the agenda of its communist originators – the creation of a permanent Democrat voting majority, guaranteeing permanent control of the United States government by leftist progressives.
  •  
    Wow.  Documentation up the ying yang .......... "The U.S. Senate's "Gang of Eight" immigration-reform plan, as well as a strikingly similar plan now being backed by Rep. Paul Ryan, R-Wis., and a bi-partisan House "Gang," both offer the "roadmap to citizenship" originally conceived and carefully developed by members of the Communist Party USA working within the Democratic Party and the radical left activist network for the purpose of using amnestied illegals to build a "permanent progressive majority." That is the inescapable conclusion readers will draw after reading the forthcoming book by acclaimed researcher and blogger Trevor Loudon, titled "The Enemies Within: Communists, Socialists and Progressives in the U.S. Congress." Although not yet published, Loudon agreed to allow WND readers to preview one chapter, titled "Latino Immigrants: Tools to Ensure a 'Governing Coalition' for the Left." Ads by Google Marriage Visa Lawyer $195 Get Your Fiance/Spouse to the USA. Free Consultation. (888) 902-9285 EasyFianceVisa.com/SpousalVisa Canadian Rockies By Train Experience the Rockies By Train. Luxury Mountain Travel By Rail TravelAlberta.us/Train In the book, Loudon exhaustively documents the Left's longtime agenda regarding illegal aliens and how its activists have gone about implementing it. He provides irrefutable proof that the entire immigration-reform movement was the brainchild of American communists and that their goal has long been to establish unchallengeable political supremacy. According to Loudon, the Communist Party USA has influenced U.S. policy toward illegals since at least the 1960s. He traces the history, showing how communists and communist-founded organizations slowly built the movement from the ground up. While other groups certainly joined the effort, the communists were always at the center. For example, he tells the story of CPUSA member Bert Corona, the "Communist Father of the 'Immigrants Rights' move
Paul Merrell

News Roundup and Notes: August 18, 2014 | Just Security - 0 views

  • Over the weekend, the U.S. military carried out further airstrikes in Iraq, targeting Islamic State militants near the Mosul Dam, involving “a mix of fighter, bomber, attack and remotely piloted aircraft.” The nine strikes on Saturday and 14 strikes on Sunday were carried out under authority “to support humanitarian efforts in Iraq,” to protect U.S. personnel and facilities, and to support Iraqi and Kurdish defense forces [U.S. Central Command]. President Obama notified Congress of the latest American involvement yesterday, stating that “[t]he failure of the Mosul Dam could threaten the lives of large numbers of civilians, endanger U.S. personnel and facilities, including the U.S. Embassy in Baghdad.” Obama said the operations will be “limited in their scope and duration.” The significantly expanded air campaign, including the first reported use of U.S. bombers, has strengthened the Kurdish forces’ ground offensive to reclaim the strategic dam from Islamic State control [Wall Street Journal’s Matt Bradley et al.; Washington Post’s Liz Sly et al.]. Iraqi state television reported early today that Iraqi and Kurdish forces are now in control of the dam [Reuters], although there are reports of continued heavy fighting around the Mosul Dam [Al Jazeera]. Joe Parkinson [Wall Street Journal] covers how the U.S. has gained a “controversial new ally” in the Kurdistan Workers’ Party (PKK), as a number of PKK fighters joined the U.S.-backed Kurdish battle in northern Iraq over the weekend.
  • Israel-Palestine With the five-day truce between Israel and Hamas set to expire tonight, Israeli and Palestinian negotiators are continuing discussions in Cairo, although significant gaps remain between the two sides. While Israel is pushing for tougher security measures, Palestine is demanding an end to the Gaza blockade without preconditions [Associated Press; Reuters’ Nidal Al-Mughrabi and Jeffrey Heller]. Israeli troops have demolished the homes of two Palestinians suspected to have been behind the abduction and killing of the three Israeli teenagers in the West Bank in June [Haaretz’s Gili Cohen]. An IDF spokesperson said that the demolition “conveys a clear message to terrorists and their accomplices that there is a personal price to pay when engaging in terror and carrying out attacks against Israelis” [Al Jazeera]. Haaretz’s editorial board notes how the Israeli offensive in Gaza has generated “a very public crisis in relations between Israel and the United States” and warns that “Netanyahu must ease the tension with Washington and act to repair the rift with Obama.” The Wall Street Journal (Joshua Mitnick) explores how Israeli Prime Minister Benjamin Netanyahu’s “containment strategy” in the ongoing conflict is “a contrast from the tough talk against terrorism that fueled his political ascent.”
  • ulian Borger [The Guardian] notes how the potential International Criminal Court investigation into alleged war crimes in Gaza by both Israeli and Hamas forces has become a “fraught political battlefield.” Marwan Bishara [Al Jazeera] explains how and why the UN has been “sidelined” in the Middle East conflict. Meanwhile, the British government is facing a legal challenge over its decision to not suspend existing licenses for the sale of military hardware to Israel following the launch of Operation Protective Edge in Gaza last month [The Guardian’s Jamie Doward].
  • ...3 more annotations...
  • Texas Governor Rick Perry [Politico Magazine] writes that “[c]learly more strikes will be necessary, with nothing less than a sustained air campaign to degrade and destroy Islamic State forces.” The Hill (Alexander Bolton) notes that Democrats in both chambers have called for a vote in Congress over military strikes in Iraq, while Senate Majority Leader Harry Reid “almost certainly wants to avoid [a vote] as he seeks to keep the upper chamber majority in his party’s hands.” The United Kingdom has also expanded its military involvement in Iraq, with Defence Secretary Michael Fallon confirming that British warplanes are no longer confined to the initial humanitarian mission to assist Iraq’s Yazidi minority [The Guardian’s Nicholas Watt]. The UN Security Council has placed six individuals affiliated with extremist organizations in Iraq and Syria, including the Islamic State, on its sanctions list [UN News Centre]. Army Col. Joel Rayburn, writing in the Washington Post, considers the legacy of Nouri al-Maliki. While Maliki has agreed to step down as prime minister, Rayburn argues that “the damage he has wrought will define his country for decades to come.” Mike Hanna [Al Jazeera America] explains why Maliki’s ouster “is no magic bullet for Iraq,” noting that a “change of prime minister doesn’t in itself alter Iraq’s political or security equation.” And Ali Khedery [New York Times] writes how the latest change in government “really is Iraq’s last chance.”
  • Journalist James Risen, who faces prison over his refusal to reveal the source of a CIA operation story, has called President Obama “the greatest enemy of press freedom in a generation” [New York Times’ Maureen Dowd]. The International Atomic Energy Agency said that Iran has promised to co-operate with an investigation to be carried out by the nuclear watchdog, following a “useful” meeting in Tehran [Reuters’ Fredrik Dahl and Mehrdad Balali]. Sky News reports that WikiLeaks founder Julian Assange is planning to “soon” leave the Ecuadorian embassy in London, after spending more than two years inside the building. Assange said he is planning to meet with the British government to resolve his “lack of legal protection.”
  • If you want to receive your news directly to your inbox, sign up here for the Just Security Early Edition. For the latest information from Just Security, follow us on Twitter (@just_security) and join the conversation on Facebook. To submit news articles and notes for inclusion in our daily post, please email us at news@justsecurity.org. Don’t forget to visit The Pipeline for a preview of upcoming events and blog posts on U.S. national security.
  •  
    Until about a month ago, I thought that Barack Obama would leave only two lasting accomplishments for future history books: [i] first African-American President; and [ii] ending the U.S. war in Iraq. Make it item 1 only now. It's no longer U.S. military "mission creep" in Iraq; it's full bore reinvasion topped off with a U.S. enguineered coup of the Iraqi government.   Just Security is a very high quality politico-legal site for issues involving U.S. and U.S.-sponsored violence and surveillance issues. It's based at the Center for Human Rights and Global Justice at New York University School of Law. Their emailed weekday newsletter is great for the topics I try to follow.  
Gary Edwards

What the hell just happened? 'Tyranny By Executive Order' | by Constitutional Attorney ... - 0 views

  •  
    "What the hell just happened? That is the question that many Americans should be asking themselves following the news conference where Obama unveiled his plan for destroying the Bill of Rights to the U.S. Constitution. At first glance it appeared to be a case of Obama shamelessly using the deaths of innocents, and some live children as a backdrop, to push for the passage of radical gun control measures by Congress. Most of these have no chance of passing, yet, Obama's signing of Executive orders initiating 23 so called Executive actions on gun control seemed like an afterthought. Unfortunately, that is the real story, but it is generally being overlooked. The fact is that with a few strokes of his pen Obama set up the mechanisms he will personally use to not only destroy the Second Amendment to the Constitution, but also the First, Fourth, and Fifth Amendments. It will not matter what Congress does, Obama can and will act on his own, using these Executive actions, and will be violating both the Constitution and his oath of office when he does it. Here are the sections of the Executive Order that he will use: "1. Issue a Presidential Memorandum to require federal agencies to make relevant data available to the federal background-check system." What exactly is relevant data? Does it include our medical records obtained through Obamacare, our tax returns, our political affiliations, our military background, and our credit history? I suggest that all of the above, even if it violates our fourth Amendment right to privacy will now be relevant data for determining if we are allowed to purchase a firearm. "2. Address unnecessary legal barriers, particularly relating to the Health Insurance Portability and Accountability Act, that may prevent states from making information available to the background-check system." This should be read in conjunction with section 16 of the order that says: "16. Clarify that the Affordable Care Act does not prohibit doctors
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Gary Edwards

Banksters: The ultimate fascism center - 0 views

  •  
    Thanks to Marbux :) A history of the financial collapse and how we got to the sovereign debt crisis of today.  Excellent  stuff.  A factual account that i couldn't find fault with.  Very lengthy read though. excerpt: Bailout the Bankers, Punish the People In the fall of 2008, the Bush administration sought to implement a bailout package for the economy, designed to save the US banking system. The leaders of the nation went into rabid fear mongering. Advertising the bailout as a $700 billion program, the fine print revealed a more accurate description, saying that $700 billion could be lent out "at any one time." As Chris Martenson wrote: This means that $700 billion is NOT the cost of this dangerous legislation, it is only the amount that can be outstanding at any one time.  After, say, $100 billion of bad mortgages are disposed of, another $100 billion can be bought.  In short, these four little words assure that there is NO LIMIT to the potential size of this bailout. This means that $700 billion is a rolling amount, not a ceiling. So what happens when you have vague language and an unlimited budget?  Fraud and self-dealing.  Mark my words, this is the largest looting operation ever in the history of the US, and it's all spelled out right in this delightfully brief document that is about to be rammed through a scared Congress and made into law.[27] Further, as the bailout agreement stipulated, it essentially hands the Federal Reserve and the U.S. Treasury total control over the nation's finances in what has been termed a "financial coup d'état" as all actions and decisions by the Fed and the Treasury Secretary may be done in secret and are not able to be reviewed by Congress or any other administrative or legal agency.[28] Passed in the last months of the Bush administration, the Obama administration further implemented the bailout (and added a stimulus package on top of it). The banks got a massive bailout of untold trillions, and the
Paul Merrell

US and Israel try to rewrite history of UN resolution declaring Zionism racism - 0 views

  • “Zionism is a form of racism and racial discrimination,” reads UN General Assembly Resolution 3379. The measure was adopted 40 years ago, on Nov. 10, 1975, and the majority of the international community backed it. 72 countries voted for the resolution, with just 35 opposed (and 32 abstentions). Although little-known in the US today (it is remarkable how effectively the US and its allies have rewritten history in their favor), UN GA Res. 3379, titled “Elimination of all forms of racial discrimination,” made an indelible imprint on history. The geographic distribution of the vote was telling. The countries that voted against the resolution were primarily colonial powers and/or their allies. The countries that voted for it were overwhelmingly formerly colonized and anti-imperialist nations.
  • The resolution also cited two other little-known measures passed by international organizations in the same year: the Assembly of the Heads of State and Government of the Organization of African Unity’s resolution 77, which ruled “that the racist regime in occupied Palestine and the racist regimes in Zimbabwe and South Africa have a common imperialist origin, forming a whole and having the same racist structure”; and the Political Declaration and Strategy to Strengthen International Peace and Security and to Intensify Solidarity and Mutual Assistance among Non-Aligned Countries, which called Zionism a “racist and imperialist ideology.” When the resolution was passed, Israeli Ambassador to the UN Chaim Herzog — who later became Israel’s sixth president, and the father of Isaac Herzog, the head of Israel’s opposition — famously tore up the text at the podium. Herzog claimed the measure was “based on hatred, falsehood, and arrogance,” insisting it was “devoid of any moral or legal value.” Still today, supporters of Israel argue UN GA Res. 3379 was an anomalous product of anti-Semitism. In reality, however, the resolution was the result of international condemnation of the illegal military occupation to which Palestinians had been subjected since 1967 and the apartheid-like conditions the indigenous Arab population had lived under as second-class citizens of an ethnocratic state since 1948.
  • In 1991, resolution 3379 was repealed for two primary reasons: One, the Soviet bloc, which helped pass the resolution, had collapsed; and two, Israel and the US demanded that it be revoked or they refused to participate in the Madrid Peace Conference. At the UN on Nov. 11, US Ambassador to the UN Samantha Power and Secretary of State John Kerry eulogized the late Herzog and forcefully condemned the resolution on its 40th anniversary. In his 2,500-word statement, Kerry mentioned Palestinians just once, and only then as an extension of Israelis. In her remarks, Power did not mention Palestinians at all.
  • ...6 more annotations...
  • In his speech, Kerry smeared resolution 3379 as “anti-Semitic” and “absurd.” Kerry called it “a bitter irony that this resolution against Zionism was originally a resolution against racism and colonialism” and lamented that “reasonableness was detoured by a willful ignorance of history and truth.” Sec. Kerry insisted “we will do all in our power to prevent the hijacking of this great forum for malicious intent” — a fascinating claim, considering how incredibly often the US itself hijacks the UN against the will of the international community, in the interests of both itself and Israel. Kerry warned about “the global reality of anti-Semitism today” (he made no mention whatsoever of the global reality of rampant, rapidly accelerating, and viciously violent anti-Muslim, anti-Arab, and anti-Black racism), and implied that the “terrorist bigots of Daesh [ISIS], Boko Haram, Al Shabaab, and so many others” are part of this larger anti-Semitic trend. One could argue Sec. Kerry downplayed the severity of the present political situation by characterizing these fascistic groups’ violent extremism as rooted in anti-Semitic bigotry, rather than in radicalization under conditions of intense oppression, bitter poverty, and brutal tyranny.
  • UN Secretary-General Ban Ki-moon joined Kerry, Power, and Netanyahu in the echo chamber, albeit with a bit more subtlety. “The reputation of the United Nations was badly damaged by the adoption of resolution 3379, in and beyond Israel and the wider Jewish community,” he said. Unlike the others, Ban condemned not just anti-Semitism, but also “wide-ranging anti-Muslim bigotry and attacks [and] discrimination against migrants and refugees.” Although the Israeli government accuses the UN of bias, the evidence demonstrates the opposite. Secret cables released by whistleblowing journalism organization WikiLeaks revealed that the US and Israel worked hand-in-hand with the UN and Sec.-Gen. Ban in order to undermine investigation into and punitive action on Israel’s war crimes in Gaza.
  • In her speech at the UN, Power, like Kerry, conflated the heinous Nazi attacks on Jewish civilians in the Kristallnacht with UN GA Res. 3379. Both speakers cited the abominable horrors of the Holocaust several times as reasons to support Zionism, glossing over the fact that Zionism was created in the late 19th century and that the Balfour Declaration dates back to 1917, decades before World War II. Amb. Power — a serial warmonger and veteran blame-dodger — did what she did best: rewrote history in the favor of US imperialism. She called the resolution “1975 smearing of Jews’ aspirations to have a homeland” and insisted multiple times that resolutions like 3379 “threaten the legitimacy of the UN.” Like Kerry, Power conveniently forgot to mention that, when it comes to the halls of the UN, there is no other rogue state as blunt as the US, which regularly spits in the face of the international community, defying UN resolutions, violating the UN Charter, and breaking international law when it sees fit. Power’s speech exposed the fault lines in the contentious (to put it mildly) relationship between the US and the UN — that is to say, between the US and the international community. Such tensions are not the fault of the UN; the blame rests squarely on the shoulders of Washington, with its doctrinal “American exceptionalism” and the flagrant disregard for international law that so frequently accompanies such imperial hubris.
  • In their speeches, both Kerry and Power also thanked Israeli UN Ambassador Danny Danon, who was described by an Israeli Labor Party lawmaker as “a right-wing extremist with the diplomatic sensitivity of a pit bull” and who proposed legislation that would, in his own words, have the Israeli government “annex the West Bank and repeal the Oslo Accords.” Amb. Danon insists that God gave the land of historic Palestine to the Jewish people as an “everlasting possession” (while forsaking the US). He also told the Times of Israel that the “international community can say whatever they want, and we can do whatever we want.” Netanyahu addressed the session with a video message. He claimed that Israel, which has for years led the world in violating UN Security Council resolutions, “continues to face systemic discrimination here at the UN.” In a January 2013 statement submitted to the UN Human Rights Council, the Russell Tribunal calculated Israel had defied a bare minimum of 87 Security Council resolutions. The Russel Tribunal also crucially noted “that Israel’s ongoing colonial settlement expansion, its racial separatist policies, as well as its violent militarism would not be possible without the US’s unequivocal support.” The tribunal pointed out that Israel “is the largest recipient of US foreign aid since 1976 and the largest cumulative recipient since World War II” and that, between 1972 and 2012, the US was the lone veto of UN resolutions critical of Israel 43 times.
  • The US secretary of state extolled “Zionism as the expression of a national liberation movement.” The national liberation movements of Vietnam, Korea, China, Nicaragua, El Salvador, Colombia, Congo, South Africa, Burkina Faso, and so many more nations, however, did not get such approval from Washington; au contraire, they were mercilessly crushed under the iron fist of American empire. Traditionally, only right-wing and settler-colonial “national liberation movements” have garnered the US’s official approval. “Why do we Americans care so much about the rights of others being respected?” Kerry asked unprovoked. “Because, in an interconnected world, injustice anywhere is a threat to justice everywhere.” He should tell that to the victims of US-backed dictatorships in Saudi Arabia, the UAE, Bahrain, Qatar, Egypt, Turkmenistan, Kazakhstan, Thailand, Brunei, Rwanda, Ethiopia, Uganda, and, once again, so many more nations. “Times may change, but one thing we do know: America’s support for Israel’s dreaming and Israel’s security, that will never change,” Kerry proclaimed.
  • The real victim of the 40th anniversary event was the truth — and, of course, as it was four decades ago, the Palestinians. Yet, while UN GA Res. 3379 was repealed, the truth cannot be revoked. Zionism was and remains an unequivocally racist movement — just like any other hyper-nationalist and ethnocratic movement. None other than the founding father of Zionism, Theodor Herzl, recognized this elementary fact. In a 1902 letter to Cecil Rhodes — a diamond magnate and white supremacist British colonialist with oceans of African blood on his hands — Herzl, writing of “the idea of Zionism, which is a colonial idea,” requested help colonizing historic Palestine. “It doesn’t involve Africa, but a piece of Asia Minor, not Englishmen but Jews… How, then, do I happen to turn to you since this is an out-of-the-way matter for you? How indeed? Because it is something colonial,” Herzl wrote. “I want you to… put the stamp of your authority on the Zionist plan.”
Paul Merrell

Let's check James Comey's Bush years record before he becomes FBI director | Laura Murp... - 0 views

  • Comey is lionised in DC for one challenge over liberties. Yet he backed waterboarding, wire-tapping and indefinite detention
  • It had the air of Hollywood. On the night of 10 March 2004, James Comey, the nominee to lead the FBI for the next ten years, rushed to the hospital bedside of his terribly ill boss, Attorney General John Ashcroft.There, he eventually confronted White House Chief of Staff Andrew Card and White House Counsel Alberto Gonzales, who were trying to get the pancreatitis-stricken Ashcroft to renew a still secret and illegal surveillance program on Americans' electronic communications. Neither Ashcroft nor Comey, then acting attorney general because of Ashcroft's condition, would reauthorize the program. When Gonzales authorized the program to go forward without a Justice Department certification, Comey threatened to resign, along with his staff and FBI Director Robert Mueller.The threats worked: President Bush blinked, and Comey won modifications to the secret surveillance program that he felt brought it into compliance with the law. This event, now the stuff of DC legend, has solidified Comey's reputation as a "civil liberties superhero", in the words of CNN's Jake Tapper, and may be one of the reasons President Obama nominated him Friday to be the next director of the FBI.
  • There's one very big problem with describing Comey as some sort of civil libertarian: some facts suggest otherwise. While Comey deserves credit for stopping an illegal spying program in dramatic fashion, he also approved or defended some of the worst abuses of the Bush administration during his time as deputy attorney general. Those included torture, warrantless wiretapping, and indefinite detention.On 30 December 2004, a memo addressed to James Comey was issued that superseded the infamous memo that defined torture as pain "equivalent in intensity to the pain accompanying serious physical injury, such as organ failure". The memo to Comey seemed to renounce torture but did nothing of the sort. The key sentence in the opinion is tucked away in footnote 8. It concludes that the new Comey memo did not change the authorizations of interrogation tactics in any earlier memos.In short, the memo Comey that approved gave a thumbs-up on waterboarding, wall slams, and other forms of torture – all violations of domestic and international law.
  • ...3 more annotations...
  • Then, there's warrantless wiretapping. Many media reports describe that Comey's defiant stand at Ashcroft's bedside was in opposition to the warrantless wiretapping of Americans international communications. But we simply do not know exactly what Comey opposed, or why or what reforms he believed brought the secret program within the rule of law. We do, however, know that Comey was read into the program in January 2004.While, to his credit, he immediately began raising concerns, the program was still in existence when the New York Times exposed it in December 2005. This was a year and a half after Comey's hospital showdown with Gonzales and Card. In fact, the warrantless wiretapping program was supported by a May 2004 legal opinion (pdf) produced by the Justice Department's Office of Legal Counsel and signed off by Comey, which replaced the 2001 legal opinion Comey had problems with.This, of course, raises the question: just what illegal surveillance program did Comey oppose so much he would resign over it? Last weekend, the Washington Post provided a new theory: the Marina program, which collects internet metadata. Now, the Senate has an opportunity to end the theorizing and find out what exactly Comey objected to. It's a line of questioning that senators should focus doggedly on, in light of the recent revelations in the Post and the Guardian.
  • The final stain on Comey's record was his full-throated defense of the indefinite military detention of an American citizen arrested on American soil. In a June 2004 press conference, Comey told of Jose Padilla, an alleged al-Qaida member accused of plotting to detonate a dirty bomb as well as blow up apartment buildings in an American city. By working for al-Qaida, Padilla, Comey argued, could be deprived of a lawyer and indefinitely detained as an enemy combatant on a military brig off the South Carolina coast for the purpose of extracting intelligence out of him. It turned out that Padilla was never charged with the list of crimes and criminal associations pinned on him by Comey that day. When Padilla was finally convicted – in a federal court – in August 2007, it wasn't for plotting dirty bomb attacks or blowing up apartment buildings. Rather, he was convicted of material support of terrorism overseas. During his indefinite military detention, Padilla was tortured.
  • Everyone has a backstory, and the confirmation process should ensure the American public hears all relevant background information, both good and bad, when Comey appears before the Senate. Senators should insist that Comey explain his role during the Bush era and repudiate policies he endorsed on torture, indefinite detention, and illegal surveillance.The new FBI director will be around for the next decade. We need one who will respect the constitution and the rule of law; not one who will use discredited and illegal activities in the name of justice and safety.
  •  
    Comey's not right for the FBI directorship this time around. The nation needs an FBI Director and Comey's role in government surveillance, torture, warrantless wiretapping, extraordinary rendition, and indefinite detention of a U.S. citizen. That's too much to get sorted out any time soon given the government shroud of secrecy on those topics. 
Paul Merrell

DOJ's Motion to Dismiss in Smith v. Obama, the case challenging the legality of the war... - 0 views

  • As I noted in an earlier post, Nathan Smith, a U.S. Army captain deployed to Kuwait as part of the campaign against ISIL, Operation Inherent Resolve, has sued the President, seeking a declaration that Congress has not authorized the hostilities in Iraq and Syria and that therefore the War Powers Resolution requires the President to remove U.S. forces from hostilities in those nations. On Tuesday, the Department of Justice filed a motion to dismiss the case. Its brief in support of the motion includes one argument that I think is correct (albeit not for all the reasons the government offers) — namely, that Smith lacks standing to sue. That ought to be sufficient to have the case dismissed. The brief also includes an argument on the merits (albeit not designated as such) that is very interesting and potentially important — an account of how Congress has allegedly authorized Inherent Resolve in three ways: (i) in the 2001 AUMF; (ii) in the 2002 AUMF; and (iii) in current appropriations statutes. The heart of the brief, however, is devoted to a third argument — that Judge Koller-Kotelly must dismiss the case on the basis of the political question doctrine — that is not only wrong, but that simply ignores the Supreme Court’s recent (and repeated) repudiation of that very argument.
  • On page 39 of its 45-page brief, the government finally gets around to the reason why the court should dismiss the complaint: Smith lacks standing. Importantly, Smith’s theory of standing is not that he — an Army captain deployed to perform intelligence services in Kuwait — is more likely to be injured or killed by virtue of the President’s decision to deploy troops into hostilities in Iraq and Syria. It is, instead, that the President’s alleged failure to comply with the War Powers Act results in Captain Smith’s own violation of his officer’s oath to “support and defend” the Constitution “against all enemies, foreign and domestic,” and to “bear true faith and allegiance” to the Constitution.
  • The government’s standing argument begins (p. 35) by suggesting that “[p]laintiff’s claim that he is being forced to betray his oath is insufficient to establish standing because the violation of an oath, by itself, is not an injury in fact.” The cases the government cites for that proposition, however, do not say that a forced oath violation would not be an injury in fact — and that’s not a question the judge needs to resolve. What the cases establish, instead, is the point the government finally argues at page 39 — namely, that a government officer does not violate his oath by complying with superiors’ orders, even if it turns out that the law prohibits the military operation in which those orders are issued. Indeed, Smith would not violate his oath of office even if his superiors’ orders themselves were unauthorized, or if the intelligence activities he is ordered to performed were unauthorized. But he does not allege even those things (as I discuss below, he does not, for instance, alleged that he is being ordered to do anything unlawful). Instead, he merely argues that because President Obama should have withdrawn troops from Syria and Iraq 60 days after their deployment, Smith himself is violating his oath to “bear true faith and allegiance to the Constitution.” This is a non sequitur: Even if Smith is right that the continuation of Operation Inherent Resolve is unlawful, that would not mean that he is acting in violation of his oath. (Much more on this in my earlier post.) And that simple fact is reason enough for Judge Koller-Kotelly to dismiss the case.
  • ...8 more annotations...
  • One of Smith’s counsel, Professor Bruce Ackerman, argues that this reason for rejecting the oath-based theory of standing ignores the Supreme Court’s 1804 decision in Little v. Barreme. Little, however, is not on point. In that case, Navy Captain Little was sued by the owners of a Danish ship for damages caused when Little seized that neutral ship. The Court held that Little could be liable, notwithstanding the fact that he was following orders, because the capture violated a implicit statutory prohibition on the military’s seizure of ships sailing from France to the United States. In this case, however, Captain Smith has not argued — nor could he — that he has been ordered to do anything unlawful (in violation of a statute), let alone that he has been ordered to do something that would subject him to possible liability for damages. He is, instead, arguing that President Obama violated a statute. That is not enough to establish Smith’s standing to sue.
  • The government’s main argument, to which it devotes far too many pages, is that the judge must dismiss the case because it raises a “political question” that courts cannot answer. This is flatly wrong — and it ignores several controlling precedents, including the Supreme Court’s recent 8-1 rejection of virtually the same government argument in Zivotofsky v. Clinton.
  • The most interesting thing about the government’s brief — and by far the most important aspect of it, for public purposes apart from the lawsuit itself — is that, in the section ostensibly arguing that the case is nonjusticiable (see pp. 25-30, and also pp. 4-14), DOJ actually offers the Executive branch’s most detailed defense yet about why Operation Inherent Resolve is congressionally authorized. As some of us predicted, the government relies on three arguable authorizations, any one of which would be sufficient to defeat Smith’s WPR claim if the courts were to reach the merits. In this post I’m not going to assess the merits of the three arguments. For now, my purpose is only to describe them, and to raise one issue with respect to the third. i. First, the government argues that the 2001 AUMF authorizes the operation against ISIL.
  • Second, the government argues that the 2002 AUMF also authorizes Operation Inherent Resolve, just as it authorized operations in Iraq against AQI (which became ISIL) from 2003 to 2011, after the Hussain regime fell.
  • Finally, and most interestingly (in part because the government has not previously made this argument), DOJ argues that a recent “unbroken stream” of appropriations statutes not only confirm the authorities allegedly conferred by the 2001 and 2002 AUMFs, but also offer their own, independent congressional authorization.
  • Two things are fairly clear from this: The members of Congress approve of Operation Inherent Resolve — indeed, there’s virtually no opposition. And Congress has (most likely) appropriated funds to pay for it. The operative question, however, is whether Congress’s appropriations also serve as an authorization that would supersede the requirement of WPR section 5(b). The government brief alludes to one important argument that the plaintiff will undoubtedly raise: Section 8(a)(1) of the WPR provides that, for purposes of tolling the 60-day clock of section 5(b), “[a]uthority to introduce United States Armed Forces into hostilities or into situations wherein involvement in hostilities is clearly indicated by the circumstances shall not be inferred (1) from any provision of law . . . including any provision contained in any appropriations Act, unless such provision specifically authorizes the introduction of United States Armed Forces into hostilities or into such situations and states that it is intended to constitute specific statutory authorization within the meaning of this chapter.” Obviously, the 2016 Act does not satisfy that requirement. Is that fatal to the appropriations-as-authorization argument?
  • As the Office of Legal Counsel 50 U.S.C. 1542 and 1543). These provisions might be read simply to convey that the executive must continue to comply with the consultation and reporting requirements of WPR sections 3 and 4, even after the 2016 Act authorizes the introduction of troops into hostilities in Iraq and Syria. Or they might alternatively be construed to also specify that the Act is not providing the authority that section 5(b) of the WPR calls for.
  • Not surprisingly, DOJ argues for the former view (pp. 27-28 of the brief): “[I]n the few provisions in which Congress did reference the War Powers Resolution, to clarify that no funds made available for Operation Inherent Resolve are to be used ‘in contravention’ of the Resolution, Congress signaled its agreement that the President’s counter-ISIL military actions were authorized by simultaneously funding Operation Inherent Resolve. If Congress believed that the United States had been conducting airstrikes and other counter-ISIL military activities ‘in contravention of the War Powers Resolution,’ it would have made no sense for Congress to use the ‘in contravention’ proviso in the same laws that make funds available for the express purpose of continuing those military activities.” That’s not a bad argument, at least at first glance; but it’s not a slam-dunk, either, in part because appropriations provisions do not necessarily establish authorizations. It’ll be interesting to see how Captain Smith’s lawyers respond to this particular aspect of the merits argument. I doubt Judge Koller-Kotelly will reach it, however, because she is likely to dismiss the case for want of standing.
  •  
    I've read the brief. I don't think the implied partial repeal of the War Powers Resolution argument should fly. The relevant provision establishes a rule of interpretation of later statutes and the appropriations bills neither reject the rule of interpretation nor specifically provide authorization for use of military force. They just authorize funding. On the standing issue, I think the DoJ position is correct; the oath of office applies only to senior officers who make the decision to initiate a war. But DoJ may have opened the door to a more compelling standing argument by arguing that the war does not constitute a war crime, a crime against peace, or a crime against humanity under international law. DoJ did not need to make that argument because Smith had not alleged in his complaint that he was being ordered to commit such crimes, but by doing so DoJ waives any argument that such issues are beyond the scope of Smith's standing and the evidence that the Iraq and Syrian wars are illegal under international law is, to say the least, strong.
Gary Edwards

The Biggest Financial Scam In World History           : Information Clearing ... - 0 views

  •  
    Marbux sent me this link to series of videos explaining the LiBOR bankster crisis.  The awesome Bill Black is featured in two of the video interviews.  Others include Matt Taibi of the Rolling Stone Magazine.  Matt's work on bankster criminals is legendary.  This is incredible stuff.  Very heated.  Clearly we are at the heart of the largest criminal fraud ever perpetrated, and it involves the worlds largest banksters.  Including the Queen of England (Bank of England).  $800 Trillion in fraud.  Incredible. Yes, the Libor Scandal Affects You By Jack Hough July 06, 2012 "Smart Money" - -A liger is a cross between a lion and a tiger. Libor, on the other hand, is a daily approximation of what banks charge each other for loans. It turns out only one of these things is real. Awkwardly, it's not the one used to set prices on an estimated $800 trillion in global financial instruments, or $116,000 worth for each person on earth, ranging from complex derivatives to student loans. That's a problem for holders of bank stocks - which includes just about anyone who owns a mutual fund or 401(k). Barclays (BCS) agreed last week to pay $453 million to settle allegations that it manipulated Libor, which stands for London interbank offered rate. As The Wall Street Journal reported Thursday, it's likely only the first: More than a dozen banks on three continents are under investigation. Libor is compiled by asking 18 banks what they think they would pay if they needed money. Some banks may have submitted artificially low responses during the global financial crisis to give the appearance of high creditworthiness. Others may have tinkered with the reading to profit from trades, or avoid losses. The Barclays settlement is affordable, at less than 7% of the company's projected profits this year, but the size of legal claims it and other banks face is difficult to imagine. Trial lawyers will do their best to work out the sums, of course. Libor may have been subject
Paul Merrell

NSA can eavesdrop on Americans' phone calls, documents show | Politics and Law - CNET News - 0 views

  • The National Security Agency has been secretly granted legal authority to operate a massive domestic eavesdropping system that vacuums up Americans' phone calls and Internet communications, newly leaked documents show. A pair of classified government documents (No. 1 and No. 2) signed by Attorney General Eric Holder and posted by the Guardian on Thursday show that NSA analysts are able to listen to Americans' intercepted phone calls without asking a judge for a warrant first. That appears to be at odds with what President Obama said earlier this week in defense of the NSA's surveillance efforts. "I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails," Obama said. The new documents indicate, however, that NSA, CIA, and FBI analysts are granted broad access to data vacuumed up by the world's most powerful intelligence agency -- but are supposed to follow certain "targeting" and "minimization" procedures to limit the number of Americans who become individual targets of warrantless surveillance.
  • Analysts are expected to exercise "reasonable judgment" in determining which data to use, according to the documents, and "inadvertently acquired communications of or concerning a United States person may be retained no longer than five years." The documents also refer to "content repositories" that contain records of devices' "previous Internet activity," and say the NSA keeps records of Americans' "electronic communications accounts/addresses/identifiers" in an apparent effort to avoid targeting them in future eavesdropping efforts. The Holder procedures were blessed in advance by the secret Foreign Intelligence Surveillance Court, the Guardian reported, meaning that the judges would have issued a general order that authorizes the NSA to engage in warrantless surveillance as long as it's primarily aimed at foreign targets, subject to some limited judicial oversight. Today's disclosure jibes with what Edward Snowden, the former NSA contractor who leaked top-secret documents, alleged in an online chat earlier this week. Snowden said, referring to the contents of e-mail and phone calls, that "Americans' communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant."
  • On Sunday, Director of National Intelligence James Clapper released a carefully-worded statement in response to a CNET article and other reports questioning when intelligence analysts can listen to domestic phone calls. Clapper said: "The statement that a single analyst can eavesdrop on domestic communications without proper legal authorization is incorrect and was not briefed to Congress." Clapper's statement was viewed as a denial, but it wasn't. Today's disclosures reveal why: Because the Justice Department granted intelligence analysts "proper legal authorization" in advance through the Holder regulations. "The DNI has a history of playing games with wording, using terms with carefully obscured meanings to leave an impression different from the truth," Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation who has litigated domestic surveillance cases, told CNET earlier this week.
  • ...3 more annotations...
  • Jameel Jaffer, the American Civil Liberties Union's deputy legal director, said in a statement today that: After Congress enacted the FISA Amendments Act in 2008, we worried that the NSA would use the new authority to conduct warrantless surveillance of Americans' telephone calls and emails. These documents confirm many of our worst fears. The "targeting" procedures indicate that the NSA is engaged in broad surveillance of Americans' international communications. The "minimization" procedures that supposedly protect Americans' constitutional rights turn out to be far weaker than we imagined they could be. For example, the NSA claims the authority to collect and disseminate attorney-client communications -- and even, in some circumstances, to turn them over to Justice Department prosecutors. The government also claims the authority to retain Americans' purely domestic communications in certain situations.
  • The documents suggest there are some significant loopholes in domestic surveillance: if an NSA analyst reviews an intercepted communication and finds "evidence of a crime that has been, is being, or is about to be committed," it can be forwarded to the FBI or other federal law enforcement agencies. Another loophole is "a serious harm to life or property" -- which could sweep in intellectual property -- and "enciphered" data. Communications that contain "enciphered" data, which would likely include PGP but also could mean encrypted Web connections using SSL, may be kept indefinitely. Earlier reports have indicated that the NSA has the ability to record nearly all domestic and international phone calls -- in case an analyst needed to access the recordings in the future. A Wired magazine article last year disclosed that the NSA has established "listening posts" that allow the agency to collect and sift through billions of phone calls through a massive new data center in Utah, "whether they originate within the country or overseas." That includes not just metadata, but also the contents of the communications.
  • Section 702 of the FAA says surveillance may be authorized by the attorney general and director of national intelligence without prior approval by the secret Foreign Intelligence Surveillance Court, as long as minimization requirements and general procedures blessed by the court are followed.
Paul Merrell

Senate CIA torture report could throw Gitmo hearings into chaos | Al Jazeera America - 0 views

  • The possible declassification and release of a Senate report into the CIA’s detention and interrogation program — begun in the wake of the 9/11 terrorist attacks — could have a huge impact on the controversial military tribunals happening at Guantánamo Bay, experts and lawyers believe. The proceedings have been moving at a snail’s pace at the U.S.-held military base on the island of Cuba, amid widespread condemnation that they are being held in a legal limbo and outside the U.S. criminal justice system. Details surrounding the CIA’s activities have been one of the most contentious issues concerning the commissions at Guantánamo, where the alleged mastermind of the 9/11 attacks, Khalid Sheikh Mohammed, and his co-defendants are on trial. Their alleged treatment while in CIA custody has been a key stumbling block in the hearings’ progress. The same goes for the man alleged to be behind the USS Cole bombing, Abd al-Rahim al-Nashiri, another former CIA captive. In both cases, there have been dozens of delays — mainly due to the fact that the attorneys have been battling military prosecutors over access to classified information about the CIA interrogation program that the attorneys want to use as evidence. Both cases have been dragging on for two years and are still in the pretrial evidentiary phase.
  • But now that the Senate Intelligence Committee appears set to vote on releasing its long-awaited 6,300-page, $50 million study — or at least some portion of it — the defense attorneys will finally get the opportunity to talk openly at the military commissions about torture. That could prove disastrous for military prosecutors. According to defense attorneys and human rights observers who have been monitoring the proceedings, it might also derail the government’s attempts to convince a jury that the detainees, if convicted, deserve to be executed. “The U.S. government has gone to great lengths to classify evidence of crimes — crimes committed by U.S. actors,” said Army Maj. Jason Wright, one of Mohammed’s military defense attorneys. “Were this information in this Senate report to be revealed … it would completely gut the classification architecture currently in place before the commissions.” The panel is expected to vote April 3, and it is widely believed the panel will approve release of its 400-page executive summary. If that happens, Wright said, he anticipates petitioning the military court to amend the protective order that treats all information about the CIA torture program as classified.
  • The report is likely to contain reams of information that has not yet come to light. Intelligence Committee Chairwoman Sen. Dianne Feinstein has said the report “includes details of each detainee in CIA custody, the conditions under which they were detained, how they were interrogated, the intelligence they actually provided and the accuracy — or inaccuracy — of CIA descriptions about the program to the White House, Department of Justice, Congress and others.” Wright said that in addition to seeking a change to the protective order, he would file discovery motions to gain access to the 6.2 million pages of documents the Senate had. Such a move would lead to further legal wrangling and delay the start of the trial, which the government hopes will get underway in September. “We have an absolute right to review that and have it produced in discovery,” Wright said.
  • ...4 more annotations...
  • Richard Kammen, al-Nashiri’s civilian defense attorney, meanwhile, has already filed a motion with the military court to obtain a complete, unredacted copy of the Senate Intelligence Committee’s report. The motion, submitted in September prior to the revelations that have surfaced about infighting between the CIA and Senate committee investigators, said the report “will be central to the accused’s defense on the merits, in impeaching the credibility of the evidence against him and in mitigation of the death sentence the government is seeking to impose.” If the entire report were declassified by the Intelligence Committee, it “would be huge because it would really eliminate the ‘need’ for military commissions, which are in my view mainly a vehicle to have what will look like trials but will keep whatever evidence of torture the judge ultimately allows secret from or sanitized to the public,” Kammen said.
  • But not everyone expects the report to be released in great detail. Air Force Capt. Michael Schwartz, the attorney for alleged 9/11 co-conspirator Walid bin Attash, doesn’t believe the Senate committee’s report will ever see the light of day. If it is released, he said it will be highly redacted, rendering it useless to the public and Attash’s defense team. “This whole military commissions system is designed to make sure this information is never known to the public,” Schwartz said. “No one in my office is naive enough to think this report will come out in any unredacted form. Certainly that report contains a lot of mitigating information that would be relevant to the defense of this case. But I don’t believe for a second that we will see anything in that report that actually sheds light on the crimes committed by the CIA against our clients between 2003 and 2006.” Air Force Col. Morris Davis, the former chief prosecutor at Guantánamo and a staunch critic of the military commissions, doesn’t believe the Senate committee’s report “is legally relevant” to the military commission trial of Mohammed and the other high-value detainees. But he does believe it will force the hearings more into the public.
  • “Where I do think it will have an impact is in the assessment of whether those legal relevance proceedings take place in open court or in secret closed sessions,” he said. “The report is likely to officially reinforce and amplify what the public already knows about this regrettable chapter in our history. It should further undercut the government’s claim that all this absolutely must stay hidden behind closed doors or else cataclysmic things will happen.” Army. Lt. Col. Todd Breasseale, a Pentagon spokesman who deals with detainee matters at Guantánamo, declined to discuss the Senate report or how its release may affect the commissions. "I can't imagine a world where competent counsel — be they from the government or defense — would announce in advance, any strategy they might pursue or make predictions on how any given issue might affect the progress of their case," Breasseale said.
  • Daphne Eviatar, a lawyer for Human Rights First who has closely observed and written about the military commission proceedings, said whether the Senate’s report is a game changer will ultimately depend on what is declassified. Perhaps details of the interrogations will be released, or they may be heavily redacted. “Either way, you can be sure the defense lawyers will try to reopen this issue, and the government will fight it, and the case will get bogged down once again in months of argument in pretrial hearings that are already taking forever,” she said.
  •  
    A ray of sunlight ahead in the Gitmo detainee prosecutions?
Paul Merrell

CSIS asked foreign agencies to spy on Canadians, kept court in dark, judge says - 0 views

  • OTTAWA — Canada’s foremost jurist on national security law has slammed CSIS for deliberately keeping the Federal Court of Canada “in the dark” about outsourcing its spying on Canadians abroad to foreign agencies, according to a redacted version of a classified court decision made public Friday.In a thundering rebuke, Federal Court Judge Richard Mosley said the Canadian Security Intelligence Service (CSIS) purposely misled him when he granted it numerous warrants beginning in 2009 to intercept the electronic communications of unidentified Canadians abroad suspected as domestic security threats.“This was a breach of the duty of candour owed by the service and their legal advisers to the court,” Mosley said in his Further Reasons for Order.CSIS also mistakenly assigned powers to the warrants that the court never authorized and which do not exist in law, he said.“It is clear that the exercise of the court’s warrant issuing authority has been used as protective cover for activities that it has not authorized,” Mosley wrote.Furthermore, tasking foreign security intelligence services to spy on Canadians overseas “carries the risk of the detention of or other harm to a Canadian person based on that information.“Given the unfortunate history of information sharing with foreign agencies over the past decade and the reviews conducted by several royal commissions, there can be no question that the Canadian agencies are aware of those hazards. It appears to me that they are using the warrants as authorization to assume those risks.”
  • Legal observers say this case and Mosley’s scolding will harm CSIS’s credibility and raise questions about whether the service has broken Criminal Code provisions dealing with the invasion of privacy.“When a judge says the government breached its duty of candour that is a very big ‘ouch’ moment,” Craig Forcese, a national security law scholar at the University of Ottawa, wrote in a recent blog posting.At the time the first warrants were issued, CSIS told the court “on clearly stated grounds” that the electronic intercepts would be carried out from within Canada by the Communications Security Establishment Canada (CSEC), the country’s foreign signals intelligence spy service.CSIS is largely restricted to domestic spying operations. If an investigation involves the use of intrusive techniques, such as electronic intercepts, Section 21 of the CSIS Act requires it to obtain a warrant approved by a Federal Court judge to guard the Charter right to a reasonable expectation of privacy.CSEC, meanwhile, is not allowed to spy on Canadians anywhere unless it is to provide technical and operational assistance to federal law enforcement and security agencies such as CSIS.And the federal court only has jurisdiction to authorize warrants under the CSIS Act as long as the communications in question are intercepted within Canada.
  • Yet once the so-called 30-08 warrants were approved by the court, CSEC, on behalf of CSIS, turned around and handed the jobs to one or more of its partners in the “Five Eyes” intelligence-gathering alliance between Canada, the United States, Great Britain, Australia and New Zealand.Mosley found out about the situation late this summer and summoned CSIS, CSEC and government officials and lawyers to court to explain themselves. The public version of his reasons for order was released Friday.
  • ...2 more annotations...
  • Some excerpts:• “I am satisfied that a decision was made by CSIS officials in consultation with their legal advisers to strategically omit information in applications for 30-08 warrants about their intention to seek the assistance of the foreign partners. As a result, the court was led to believe that all of the interception activity would take place in or under the control of Canada.”• “The principle of comity between nations that implies the acceptance of foreign laws and procedures when Canadian officials are operating abroad ends where clear violations of international law and human rights begin. In tasking the other members of the Five Eyes to intercept the communications of the Canadian targets, CSIS and CSEC officials knew ... this would involve the breach of international law by the requested second parties.”• “There is nothing in any of the material that I have read ... that persuades me that it was the intent of Parliament to give the service authority to engage the collection resources of the second party allies to intercept the private communications of Canadians.”• “It must be made clear, in any grant of a 30-08 warrant, that the warrant does not authorize the interception of the communications of a Canadian person by any foreign service on behalf of the service either directly or through the assistance of CSEC.”• “There must be no further suggestion in any reference to the use of second party assets by CSIS and CSEC, or their legal advisers, that it is being done under the authority of a (section) 21 warrant issued by this court.”
  • Forcese, meanwhile, raises some intriguing questions:• If Five Eyes assistance was not authorized, and CSEC and CSIS nevertheless sought it, are they still protected from Criminal Code, Part VI (invasion of privacy) culpability? Culpability, he writes, is only avoided where the intercept is lawfully authorized. If the parameters of the warrant were disregarded, does that vitiate the lawful access?• If CSEC and CSIS called on Five Eyes agencies to intercept communications, was the intercept still territorial, thus satisfying the international law concerns raised in the two warrant applications?“Outsourcing an international violation does not diminish state responsibility for that international violation. In a different context, that would be like asking bounty hunters to do your kidnapping of fugitives on the territory of a foreign state. Still a violation of international law.”CSIS has a choice, Forcese concludes: “Conduct extraterritorial spying without recourse to the courts, at risk of ultimately being called to account under domestic law, or honour the federal court’s construal of international law — and CSIS’s jurisdiction — and pull in its truly international surveillance operations, potentially blinding the country’s chief security intelligence agency.
  •  
    Canadian Security Intelligence Service is in politically explosive deep doo-doo. 
Paul Merrell

Is the Government's Aerial Smartphone Surveillance Program Legal? | TIME - 0 views

  • Still, is the Justice Department’s airborne dragnet program legal? The answer is “maybe.” Federal authorities have employed similar tools in the past. The Federal Bureau of Investigation is known to use a surveillance tool called a “stingray,” a portable transceiver that tricks cell phones within a certain area into relaying their locations, not unlike the equipment onboard the Marshals’ aircraft. A government vehicle with a stingray can net hundreds of nearby cell phones’ approximate locations just by driving through a typical neighborhood. The government has said it doesn’t need a probable cause warrant to use stingrays because investigators don’t collect the content of phone calls, just the locations of those phones. Government officials, meanwhile, have said they get court approval to use the devices. Much of the government’s warrantless use of stingray-style technology hinges on a 1979 Supreme Court decision titled Smith v. Maryland. Smith involved law enforcement’s use of a device called a pen register that, when attached to a suspect’s phone line, recorded the numbers of outgoing calls, but not the calls themselves. The Smith decision upheld the warrantless use of such devices because the suspect’s phone company would record the same data picked up by the pen register, and therefore the suspect had no reasonable expectation of privacy when it came to that information. Currently, the law requires a court to approve the use of a pen register, but investigators only have to show that the device’s use is “relevant to an ongoing criminal investigation,” a much weaker standard than a probable cause warrant requires.
  • However, to get back to the Smith decision, wireless carriers do store your location history for several months to several years, information they obtain by keeping a record of the cell towers to which your device connects as you move from place to place. That could mean Americans don’t have a reasonable expectation of privacy over their location data and the Smith precedent applies, making the DoJ’s aerial surveillance program legal. Still, that would be a matter for the courts to decide. “There are a lot of tricky questions whether a stingray or dirtbox operated by the government directly is a pen register, or the Fourth Amendment concerns dismissed by the Supreme Court 35 years ago in Smith v. Maryland are more applicable here,” Fakhoury said.
  • Hanni Fakhoury, an attorney at the pro-privacy Electronic Frontier Foundation, says the Department of Justice could use the Smith precedent as legal justification for the airborne dirtbox program. However, Fakhoury also highlighted a key problem with that argument: Location. Pen registers aren’t intended to pick up location data beyond an area code, whereas the airborne dirtboxes can track a person down to a single building. Many courts, he said, have expressed that location data deserves greater constitutional protection than is afforded to other kinds of information.
  • ...2 more annotations...
  • Civil rights groups are raising serious constitutional questions about the Justice Department’s use of dragnet technology onboard aircraft to collect data from suspects’ cell phones, as reported by the Wall Street Journal Thursday.
  • The Justice Department said it could not confirm or deny the existence of the program. But a department official said that all federal investigations are consistent with federal law and are subject to court approval. That official also said the Marshals Service does not maintain any databases of cell phone information — meaning the program could possibly only be used to track the whereabouts of suspects on a case-by-case basis and that it’s vastly different in nature from the kinds of sweeping government surveillance programs first revealed by Edward Snowden.
  •  
    Smith v. Maryland is a dead precedent for mass surveillance after the Supreme Court's ruling in Riley v. California. It awaits only the judicial coup de grace. 
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Paul Merrell

Deported by US to Turkey, Palestinian activist Dr. Sami Al-Arian speaks out | The Elect... - 0 views

  • More than six months after the US government finally dropped all charges against Dr. Sami Al-Arian, the stateless Palestinian academic and activist was deported yesterday to Turkey. During his appearance on Democracy Now! today, Dr. Al-Arian expressed relief that his twelve-year-long persecution in the US, where he lived for forty years, had finally come to an end. “It feels like I’m free, finally really feeling freedom for the first time in twelve years,” Dr. Al-Arian said.
  • During the half-hour segment, Dr. Al-Arian revealed how he campaigned for George W. Bush, helping him win crucial votes from the Muslim community that would clinch his 2000 presidential election victory in the decisive state of Florida. Dr. Al-Arian was very active politically, and had visited the White House several times during both the Bush and Clinton administrations. Regarding his role in Bush’s election, Dr. Al-Arian said that he received a call “from someone who was very close to [Bush advisor] Karl Rove” asking how the campaign could win the endorsement of the Muslim American community. Dr. Al-Arian told this contact that Bush needed to declare his support for proposed legislation against secret evidence being used against Arab and Muslim Americans. During the second presidential candidate debate, Dr. Al-Arian told Democracy Now!, Bush did just that, securing the support of Muslim and Arab American leaders.
  • His administration had invited these leaders to the White House after Bush took office for a big announcement of good news regarding the legislation. “Unfortunately, it was on 9/11,” Dr. Al-Arian said, referring to the 11 September 2001 attacks in the US. “So that meeting never happened.” Instead, the country went in a very different direction. “At the time, we were protesting secret evidence,” Dr. Al-Arian added. “What happened after 9/11 is that they were arresting people with no evidence.”
  • ...4 more annotations...
  • Despite this plea deal, Dr. Al-Arian was subpoenaed for a separate prosecution and then hit with contempt charges in March 2008 and issued two more subpoenas in the following year. Now under house arrest, Dr. Al-Arian’s case languished in the courts for years until the government finally moved to dismiss in June of last year. Regarding the saga endured by Dr. Al-Arian, Qamar and Azhar write: Reading the case files is an exercise in bewildering consternation. How did a man who was never convicted by a jury of his peers end up serving five years in prison and four and a half years under house arrest? Several lawyers we consulted point to the unique nature of the case, perhaps unprecedented even in the annals of bizarre government judicial practices since 11 September 2001.
  • “In the hopes of escaping an indefinite legal battle that would keep him in jail, Al-Arian opted to plead guilty for one of the less serious charges, which accused him of sending money to a Palestinian charity before the US government made it illegal to do so,” Khadijah Qamar and Hamdan Azhar recounted for The Electronic Intifada last year. “The judge gave him a 57-month sentence, most of which he had already served, with the promise of deportation by April 2007,” Qamar and Azhar added.
  • After he was fired from the University of South Florida following two years of administrative leave and a lengthy smear campaign that began with “vicious” attacks on him by right-wing Fox News pundit Bill O’Reilly, Dr. Al-Arian found himself a target of the newly passed Patriot Act. In February 2003, as Democracy Now! host Amy Goodman explained today, “The Justice Department handed down a sweeping fifty count indictment against him and seven other men, charging them with conspiracy to commit murder, giving material support to terrorists, extortion, perjury and other offenses. He was held in solitary confinement leading up to the trial.” That trial ended in 2005 with the jury failing to return a single guilty verdict, acquitting Dr. Al-Arian of eight of the seventeen counts he was tried on. But the government’s efforts did not end there, as the prosecution threatened a retrial of the nine charges on which the jury had deadlocked. Dr. Al-Arian chose to spare himself a second trial.
  • The underhanded and unprecedented tactics used by government prosecutors against Al-Arian were wielded against other Palestinian activists. Humanitarians were sentenced to decades in prison in the Holy Land Five case as material support for terror convictions became the domestic front of the endless US wars and occupations abroad. The era of political repression is not over, as shown by the recent moves to criminalize Palestine solidarity work, including at US campuses, and the recent conviction of Palestinian American community leader Rasmea Odeh. “I’ve heard a lot from Obama, but it’s all rhetoric … after six years, I haven’t really seen much change,” Dr. Al-Arian said from Turkey today. But he expressed happiness towards protests and whistleblowing regarding “the excesses of the surveillance and police state.”
  •  
    A very sad chapter in American legal history. 
‹ Previous 21 - 40 of 127 Next › Last »
Showing 20 items per page