Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged legal-remedies

Rss Feed Group items tagged

Paul Merrell

'This Week' Transcript: Ambassador Samantha Power - ABC News - 0 views

  • STEPHANOPOULOS: And we are joined now by the U.S. Ambassador to the United Nations Samantha Power. Thanks for coming back to This Week. And you know, the president said he's prepared to strike Syria. Those strikes could be imminent. Will the United States try to get UN Security Council authorization first? Or do you accept now that's just not going to be possible? SAMANTHA POWER, U.S. AMBASSADOR TO THE UNITED NATIONS: Well, let me say that Secretary Kerry just convened a meeting of the Security Council on Friday which showcased just how much support there is on the Security Council and in the broader international community for the anti-ISIL effort. STEPHANOPOULOS: But the Russia veto.
  • POWER: Russia has vetoed in the past, but on very different issues. I think Russia has made clear for a long time its opposition to ISIL. The Iraqis have appealed to the international community to come to their defense not only in Iraq, but also to go after safe havens in foreign countries. And what they mean by that of course is Syria. And they're quite explicit about that. So they have made an appeal to the international community for collective defense. And we think we have a legal basis we need if the president decides... STEPHANOPOULOS: Without a UN authorization. POWER: Consistent with the UN charter, we -- it will depend on the facts and circumstances of any particular strike in Syria, but we have a legal basis we need.
  •  
    Context: U.S. Ambassador to the U.N., Samantha Power, holds the U.N. Security Council's rotating chair this month. Powers'  claims a right for the U.S. to wage war against ISIL in Syria on grounds of the collective security exception to the U.N. Charter's prohibition; that is, that the U.S. has a collective security agreement with the nation of Iraq, that makes it lawful for the U.S. to strike ISIL. True enough as a matter of international law, ignoring the fact that Obama has yet to obtain permission from the U.S. Congress, which the U.S. Constitution requires him to do. But ISIL is not the nation of Syria; hence to attack ISIL in Syria, an additional exception is necessary for both Iraq and the U.S. The only other recognized exception that might seem to do deals with the situation when a nation in which a private organization inflicting harm on another nation  is "unwilling or unable" to protect the second nation (Iraq) from the depradations of the private organization. And that is where Powers' legal analysis dissembles because the U.S. has been actively attempting to overthrow the Syrian government via proxy terrorist organizations including ISIL. So the U.S. lacks clean hands in claiming any lawful right to invade Syria on the theory that the Syrian government is unwilling or unable to put down the ISIL organization. The Syrian government is certainly willing and has been attempting to do so. But its inability to do so thus far is entirely due to the U.S., its Gulf Coast state allies, and its ally Turkey continuing to supply ISIL and other terrorist groups in Syria with weapons, training, and supplies, aimed at overthrowing the Syrian government. The doctrine of unclean hands has limited applicability in international law governing human rights. See Lisa LaPlante, The Law of Remedies and the Clean Hands Doctrine: Exclusionary Reparation Policies in Peru's Political Transition, 23 Am Univ Int Law Rev 50 (2007), https://digitalcommons.wcl.american.edu/cg
Gary Edwards

CHILDREN KILLED OF KEVIN KRIM, CHIEF EXECUTIVE OF CNBC DIGITAL, AFTER RELEASING INFORMA... - 0 views

  •  
    Incredible article about the behind-the-scenes story of the nanny murder of two small children in NYC.   First, it's a staged murder meant to send a clear message to ALL media.  The children were the offspring of Kevin Krim, CEO of CNBC digital.  His website had published a story about the Spire Law Group suing an entire class of bigshot BANKSTERS for the theft of $43 TRILLION dollars of tax payer money.  Second, this involves the US Government.  The Spire allegation is that the Feds actively helped and assisted the Bankster theft. Third, the story describes the historical background of these Bankster hits, assassination and threats.  Although not covered in the article, Presidential assassinations in particular have an unmistakable link to Executive Orders that the Treasury print Silver Certificates that would compete against Bankster notes.  In one way or another, it's all about control of the money system.  This list of Presidents includes Jackson, Lincoln, Garfield, McKinley, Kennedy and Reagan. Original Press Release from the Spire Law Group:  ... http://goo.gl/ynV6O .... Wow! ................................... excerpt:: "On 10/25/2012 two corporate financial media bastions,  MarketWatch  (an affiliate of the Wall Street Journal) and CNBC, presented their readers with a bombshell.  In a too-good-to-be-true lawsuit, the top echelons of the USA's banking and civilian government had been sued for "racketeering and money laundering."  The suit requested "the return of $43 trillion to the United States Treasury."  Yes, you've read that right: 43 trillion-roughly 3 years worth of America's GDP or 3 times America's underestimate of its own national debt. The suit characterizes itself, according to these two corporate media tabloids, as the largest money laundering and racketeering lawsuit in United States History.  [It identifies] $43 trillion ($43,000,000,000,000.00) of laundered money by the 'Banksters' and their U.S. r
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
Paul Merrell

Wikimedia v. NSA: Another Court Blinds Itself to Mass NSA Surveillance | Electronic Fro... - 0 views

  • We all know justice is blind. But that is supposed to mean that everyone before it is treated equally, not that the justice system must close its eyes and refuse to look at important legal issues facing Americans.  Yet the government continues to convince courts that they cannot consider the constitutionality of its behavior in national security cases and, last week, in an important case for anyone who has ever used Wikipedia, another judge agreed with that position.  A federal district judge in Maryland dismissed Wikimedia v. NSA, a case challenging the legality of the NSA’s “upstream” surveillance—mass surveillance of Internet communications as they flow through the Internet backbone. The case was brought by our friends at the ACLU on behalf of nine plaintiffs, including human rights organizations, members of the media, and the Wikimedia Foundation.1 We filed a brief in the case, too, in support of Wikimedia and the other plaintiffs. The judge dismissed the case based on a legal principle called standing. Standing is supposed to ensure, among other things, that the party bringing the lawsuit has suffered a concrete harm, caused by the party being sued, and that the court can resolve the harm with a favorable ruling.
  • But the U.S. government has taken this doctrine, which was intended to limit the cases federal courts hear to actual live controversies, and turned it into a perverse shell game in surveillance cases—essentially arguing that because aspects of the surveillance program are secret, plaintiffs cannot prove that their communications were actually, in fact, intercepted and surveilled. And without that proof, the government argues, there’s no standing, because plaintiffs can’t show that they’ve suffered harm. Sadly, like several other courts before it, the judge agreed to this shell game and decided that it couldn’t decide whether the constitutional rights of Wikimedia and the other plaintiffs were violated.  This game is mighty familiar to us at EFF, but that doesn’t make it any less troubling. In our system, the courts have a fundamental obligation to conclusively determine the legality of government action that affects individuals’ constitutional rights. For years now, plaintiffs have tried to get the courts to simply issue a ruling on the merits of NSA surveillance programs. And for years, the government has successfully persuaded the courts to rely on standing and related doctrines to avoid doing so. That is essentially what happened here. The court labeled as “speculative” Wikimedia’s claim that, at a minimum, even one of its approximately one trillion Internet communications had been swept up in the NSA’s upstream surveillance program. Remember, this is a program that, by the government’s own admission, involves the searching and scanning of vast amounts of Internet traffic at key Internet junctures on the Internet’s backbone. Yet in court’s view, Wikimedia’s allegations describing upstream—based on concrete facts, taken from government documents— coupled with a plaintiff that engages in a large volume of internet communications were not enough to state a “plausible” claim that Wikimedia had been surveilled.
  • On the way to reaching that conclusion, and putting on its blindfold, the court made a number of mistakes. The Government’s Automated Eyes Are Still Government Eyes First, it appears the court fundamentally misunderstood Wikimedia’s claim about upstream surveillance and, in particular, “about surveillance.” As Wikimedia alleged, “about surveillance” (a specific aspect of upstream surveillance that searches the content of communications for references to particular email addresses or other identifiers) amounts to “the digital analogue of having a government agent open every piece of mail that comes through the post to determine whether it mentions a particular word or phrase.” The court held, however, that this type of “about” surveillance was “targeted insofar as it makes use of only those communications that contain information matching the tasked selectors,” like email addresses. But what the government "makes use of" is entirely beside the point—it is the scanning of the communications for the tasked selectors in the first place that is the problem.  To put it into a different context, the government conducts a search when it enters into your house and starts rifling through your files—not just when it finds something it wants to keep. The government's ultimate decision to “make use of” the communications it finds interesting is irrelevant. It is the search of the communications that matters.
  • ...2 more annotations...
  • Back of the Envelope Gymnastics Another troubling aspect of the court’s decision was its attack on the probabilities Wikimedia assigned to the likelihood of its communications being intercepted. Given that Wikimedia engages in a large volume of Internet communications, Wikimedia alleged that—even assuming a .00000001% chance that any one particular communication is intercepted—it would still have a 99.9999999999% of having one of its communications intercepted. The statistic was used to illustrate that, even assuming very low probabilities for interception, there was still a near-certainty that Wikipedia’s traffic was collected. But the court attacked Wikimedia’s simple statistical analysis (and the attack tracked, to a great degree, arguments made in the government’s declarations that the court purportedly did not consider). The court seemed to believe it had seized upon a great flaw in Wikimedia’s case by observing that, if the probability of any given communication being intercepted were decreased 100% or 1000%, the probability of one of Wikimedia’s communications being intercepted would similarly drop. The “mathematical gymnastics” the court believed it had unearthed were nothing more than Wikimedia using an intentionally small (and admittedly arbitrary) probability to illustrate the high likelihood that its communications had been swept up. But even if the court disagreed with the probabilities Wikimedia relied on, it’s not at all clear why that would justify dismissing the case at the outset. If it turned out, after development of the record, that the probabilities were off, then dismissal might be appropriate. But the court cut the case off before Wikimedia had the opportunity to introduce evidence or other facts that might support the probability they assigned.
  • Someone Else Probably Has Standing, Right? Perhaps most troubling was the court’s mistaken belief that the legality of upstream surveillance could be challenged in other ways, beyond civil cases like Wikimedia or our ongoing case, Jewel v. NSA. The court asserted its decision would not insulate upstream from judicial review, which—according to the court—could still receive judicial scrutiny through (1) review from the Foreign Intelligence Surveillance Court (FISC), (2) a challenge by a criminal defendant, or (3) a challenge from an electronic service provider. None of these options is truly a viable alternative, however. First, the FISC (until very recently) did not have adversarial proceedings—it only heard from the government, and its proceedings remain both far more limited and more secretive than a regular court’s. Second, a challenge from a criminal defendant won’t work either, because, to date, the government has explicitly refused to disclose—even where defendants are notified of the use of FISA surveillance—whether their communications were obtained using upstream surveillance. And, finally, in the nearly 15 years (or more) the government has conducted upstream surveillance, we’re not aware of any service provider that has challenged the legality of the practice. Indeed, given that upstream is done with the cooperation of telecoms like AT&T and Verizon—the same telcos that did not challenge the NSA’s bulk collection of Americans’ call records for over a decade—we're not holding our breath for a challenge anytime soon. Instead, we need the courts to tackle these cases. Upstream surveillance presents unique constitutional issues that no federal court has seriously addressed. It's time the federal courts stepped up to the challenge.
  •  
    The notion that the government can intentionally violate the privacy rights of its citizens yet a court find that those citizens have no right to seek redress announces a view that privacy rights are hollow --- that those wronged by government malfeasance have no remedy in the courts of our nation. That is a view that must be thrown in the dustbins of history if freedom is to be preserved. 
lawofficeofamit

Best Civil Lawyers in Chandigarh-Get Legal Advice from best lawyer - 0 views

shared by lawofficeofamit on 29 Dec 18 - No Cached
  •  
    Before Searching for Best civil lawyers in Chandigarh, You must be understand what is Civil Law. Civil law is a body of rules that defines and protects the private rights of citizens, offers legal remedies that may be sought in a dispute, and covers areas of law such as contracts, torts, property and family law. Civil law is derived from the laws of ancient Rome which used doctrines to develop a code that determined how legal issues would be decided.
Gary Edwards

David Skeel: A Nation Adrift From the Rule of Law - WSJ.com - 1 views

  •  
    "No one doubts that the coming election will be the most important referendum on the size and nature of government in a generation. But another issue is nearly as important and has gotten far less attention: our crumbling commitment to the rule of law. The notion that we are governed by rules that are transparent and enacted through the legislative process-not by the whims of our leaders-is at the heart of that commitment. If legislators exceed their authority under the Constitution, or if otherwise legitimate laws are misused, courts must step in to prevent or remedy the potential harm. During the 2008 financial crisis, the government repeatedly violated these principles. When regulators bailed out Bear Stearns by engineering its sale to J.P. Morgan Chase, they flagrantly disregarded basic corporate law by "locking up" the transaction so that no other bidder could intervene. When the government bailed out AIG six months later, the Federal Reserve funded the bailout by invoking extraordinary loan powers for what was clearly an acquisition rather than a loan. (The government acquired nearly 80% of AIG's stock.) Two months later, the Treasury Department used money from the $700-billion Troubled Asset Relief Program fund to bail out the car companies. This was dubious. Under the statute, the funds were to be used for financial institutions. But the real violation came a few months later, when the government used a sham bankruptcy sale to transfer Chrysler to Fiat while almost certainly stiffing Chrysler's senior creditors. According to two leading legal scholars, Eric Posner and Adrian Vermeule, rule-of-law violations are inevitable during a crisis. The executive branch takes all necessary steps, even if that means violating the law, until the crisis has passed. The argument is powerful, and its advocates are correct that presidents and other executive-branch officials often push the envelope during a crisis. Yet pushing the envelope isn't the same thing as f
Gary Edwards

A First Look at the Book "The Liberty Amendments", by Mark Levin - Tea Party Command Ce... - 0 views

  •  
    Excellent youtube interview! "Mark Levin has just published his much-anticipated book The Liberty Amendments: Restoring the American Republic. Three of his eleven proposed Constitutional amendments appear below, and a Sean Hannity interview of Levin appears at the bottom of this post. Levin's book is centered around the Constitution's Article V (aka "Article 5″). That article specifies two methods for amending the Constitution. Just briefly - In the first method of creating amendments, Congress proposes and the States dispose. In the second method of creating amendments, the States propose and the States dispose. The second method has never been used successfully, although there have been many attempts.  It is that second method that the Founders provided as a remedy for an overreaching federal government. In the second method, neither Congress, nor the President, nor the Supreme Court have any voting or veto authority whatsoever.  The states are in full control. Period. It is, by design, the ultimate override for an over-spending, over-taxing, over-regulating, and increasingly dictatorial and lawless federal government. Clearly, its time has come. In that second method, Congress has at most a mere ministerial role.  Of course Congress is very protective of its power, and could, through delay and inaction, attempt to convert their mere ministerial role into a de facto veto power, halting any attempt for a state-driven amendment action. Apparently Congress has done exactly that many times, acting in bad faith and contrary to the Framers' spirit and intent for Article V which is clearly expressed in the Federalist Papers. Legal scholars have been trying to find a way around the federal government's intransigence, so far with little success. Now more than ever, it is time for We the People to bring the power of Article V to the center ring of American politics. That starts with awareness, and Levin's book will br
Paul Merrell

War court judge orders Pentagon to replace USS Cole trial overseer | Miami Herald Miami... - 0 views

  • The military judge presiding at the USS Cole death-penalty trial ordered the Pentagon to replace the senior official and his staff overseeing the war-court process, ruling a since-revoked requirement for judges to live at Guantánamo until a trial is over appeared to be unlawful meddling.Air Force Col. Vance Spath, the judge, issued the ruling in court Monday following a week of hearings that showed behind-the-scenes planning at the Pentagon on how to perhaps replace military judges and speed along the pretrial process.Prosecutors defended the planning by the legal staff of the so-called convening authority for military commissions, retired Marine Maj. Gen. Vaughn Ary, as routine brainstorming on resourcing of the war court.Defense lawyers called the move-in order illegal, a crime in military justice called “unlawful command influence,” that was designed to unfairly rush the death-penalty trial of Saudi captive Abd al Rahim al Nashiri, 50, as the alleged mastermind the USS Cole bombing.
  • They wanted the judge to dismiss the case. But while Spath was still taking evidence, Deputy Secretary of Defense Robert O. Work quickly revoked the controversial order — meaning judges hearing war-crimes cases now may keep their prestigious regular duties and simultaneously preside at Guantánamo military commissions cases.Spath, in court Monday, called dismissal “not appropriate” in this instance. Instead, he disqualified Ary and four lawyers who worked on the move-in requirement: retired Army Col. Mark Toole, Army Reserves Lt. Col. Alyssa Adams, Navy Reserve Cmdr. Raghav Kotval, and Army Capt. Matthew Rich.He ordered the Pentagon to replace them in the USS Cole case — meaning a new convening authority would fund and assign Nashiri’s legal-team resources and pick the pool of military officers for his eventual jury.
  • Spath also cut an upcoming two-week pretrial hearing at Guantánamo back to just one week, he said, to demonstrate “this detailed trial judge feels no pressure to accelerate the pace of this litigation.”
  • ...3 more annotations...
  • Monday, Spath bristled at the notion that pretrial hearings could be accelerated.“This is a complicated international terrorism case under a relatively new statutory scheme with an unprecedented amount of classified evidence,” he said.In last week’s hearings, Nashiri’s attorneys uncovered a plan to relieve Spath of his Guantánamo cases and leave him in his full-time duties as chief of the Air Force Judiciary — a behind-the-scenes development that Spath said was particularly troubling.Ary had staff crunch costs of conducting commuter hearings here at remote Camp Justice — flights, translators, etc. — and figured that 34 days of hearings in 2014 cost $2,294,117 million for each day the court was open. That works out to $458,823 an hour on mostly tangential pretrial issues — or $7,647 a minute. Staff also tallied how many hours each judge spent on the bench at Guantánamo.
  • Three judges are hearing three terror cases: ▪ Army Col. James L. Pohl, presiding in the Sept. 11 capital murder conspiracy trial of Khalid Sheik Mohammed and four alleged accomplices. He ruled without taking testimony last week that there was an appearance of unlawful interference. He had halted proceedings and threatened more action until the Pentagon revoked the move-in order.▪ Judge Spath in the USS Cole case, who said Monday that Work’s revocation of the relocation rule was not a sufficient remedy. He said the attempted effort of unlawful influence appeared to “cast a cloud” over the independence of the judiciary but did not succeed because he would allow no one to rush him. Ary’s role, he ruled, is to resource the judiciary — “most certainly not an entity that sets the pace of litigation.”▪ The non-capital prosecution of Abd al Hadi al Iraqi, who is accused of commanding al-Qaida forces that allegedly committed war crimes while resisting the 2001 U.S. invasion in Afghanistan. Hadi’s judge, Navy Capt. J.K. Waits, has listed the unlawful-influence question, and whether to dismiss the case, as first up on the docket of his next hearing, March 23.
  • Hadi’s lawyers were watching Spath’s decision to see what, if any, remedy they would seek from their Navy judge who is based in Naples, Italy, and commutes to Cuba to preside in the case.It was disclosed over the weekend that Waits has lifted an order on the prison forbidding female troops from touching Hadi, a development that, like the move-in order, had stirred controversy.Spath’s move rejecting a “convening authority” has precedent in the war court that President George W. Bush built and President Barack Obama reformed.In 2008, before the reforms, a Navy judge in the case of Osama bin Laden’s driver disqualified the then-military commissions legal adviser, Air Force Brig. Gen. Thomas W. Hartmann, as not being fair and balanced. The legal adviser in that version of the war court had some of the duties of the current convening authority.
Gary Edwards

Major Banksters, Governmental Officials and Their Comrade Capitalists Targets of Spire ... - 0 views

  •  
    "NEW YORK, Oct. 25, 2012 /PRNewswire via COMTEX/ -- Spire Law Group, LLP's national home owners' lawsuit, pending in the venue where the "Banksters" control their $43 trillion racketeering scheme (New York) - known as the largest money laundering and racketeering lawsuit in United States History and identifying $43 trillion ($43,000,000,000,000.00) of laundered money by the "Banksters" and their U.S. racketeering partners and joint venturers - now pinpoints the identities of the key racketeering partners of the "Banksters" located in the highest offices of government and acting for their own self-interests. In connection with the federal lawsuit now impending in the United States District Court in Brooklyn, New York (Case No. 12-cv-04269-JBW-RML) - involving, among other things, a request that the District Court enjoin all mortgage foreclosures by the Banksters nationwide, unless and until the entire $43 trillion is repaid to a court-appointed receiver - Plaintiffs now establish the location of the $43 trillion ($43,000,000,000,000.00) of laundered money in a racketeering enterprise participated in by the following individuals (without limitation): Attorney General Holder acting in his individual capacity, Assistant Attorney General Tony West, the brother in law of Defendant California Attorney General Kamala Harris (both acting in their individual capacities), Jon Corzine (former New Jersey Governor), Robert Rubin (former Treasury Secretary and Bankster), Timothy Geitner, Treasury Secretary (acting in his individual capacity), Vikram Pandit (recently resigned and disgraced Chairman of the Board of Citigroup), Valerie Jarrett (a Senior White House Advisor), Anita Dunn (a former "communications director" for the Obama Administration), Robert Bauer (husband of Anita Dunn and Chief Legal Counsel for the Obama Re-election Campaign), as well as the "Banksters" themselves, and their affiliates and conduits. The lawsuit alleges serial violations of the United States Patri
  •  
    This is the first time anyone has tried to go after the Bankster class of midievil (mediæval) elites to recover theft of funds. Charges include racketeering, fraud and international money laundering. The mass tort action is now in the Brooklyn Federal Courts. Dead bodies are starting to show up as the Banksters move to shut down press coverage. Amazing stuff.
Paul Merrell

Loopholes, Filing Failures, and Lax Enforcement: How the Foreign Agents Registration Ac... - 0 views

  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Executive Summary The Foreign Agents Registration Act (FARA) requires that all American citizens working to influence U.S. policy on behalf of foreign governments register with the Department of Justice and to disclose information on any and all political activity in which they engaged for foreign clients. This includes filing, within 48 hours, any informational materials disseminated to two or more people.
  • ...7 more annotations...
  • Table of Contents Executive SummaryIntroductionBackgroundWhat the Foreign Influence Database ShowsEgypt: A Case Study Of Foreign InfluenceSame-Day ContributionsSystemic Foreign InfluenceQuid Pro Quo or Coincidence?Foreign Money and the LawLax Compliance with and Enforcement of FARAEnforcementConclusionRecommendationsEndnotes
  • The law requires lobbyists for foreign interests to plainly and conspicuously identify themselves as such in any materials distributed in the course of their lobbying—for example, emails, other correspondence, or publications. We found that many documents filed with the Justice Department lack this identification statement; furthermore, many lobbyists admitted that they did not comply with this requirement. More than half (51 percent) of the registrants we examined in a sample from 2010 checked a box on a the semi-annual Justice Department questionnaire saying they had filed informational materials, and checked another box saying they had not met the legal requirement that they identify themselves in those materials as working on behalf of foreign interests. Toby Moffett, a former Member of Congress from Connecticut who is now Chairman of the Moffett Group and one of its registered lobbyists, told POGO that “Around the edges there’s a lot of loosey-goosey stuff going on. People representing foreign interests and not reporting.”[4] But even when lobbyists do report to the Justice Department, the information they provide is not easily accessible to the public. Astonishingly, informational materials are not available online, despite the fact that the Justice Department has an electronic filing system. Instead, these documents are kept in an office at the Justice Department that is only open for four hours each weekday. Hard copies of the documents are kept in folders that are often disorganized and susceptible to misfiling. This archaic system undermines the intended transparency of the law.
  • We set out to determine the extent to which lobbyists for foreign interests were filing lobbying materials at the Justice Department within the required time frame. Based on a review of filings made in 2012, in those instances where it was possible to answer the question, POGO estimates that almost half—46 percent—were filed late. Fifteen percent were filed more than 30 business days after they were distributed, and 12 percent were filed more than 100 business days after they were distributed. In many instances, the Justice Department would be hard pressed to enforce the filing deadline. Based on the records the Department maintains to enforce the law, we found that in more than a quarter (26 percent) of the 2012 filings, it was impossible to determine whether the lobbyists complied. For example, in many cases, the records did not show when the lobbyists disseminated the materials to the targets of their lobbying. In a glaring omission, the law does not require lobbyists to provide that information. Without it, there may be no way for the government or the public to know whether lobbying materials were filed on time.
  • Though federal law bars foreign money from U.S. political campaigns, there appears to be a gray area in the law that can let in such money indirectly. POGO found many instances in which members of lobbying firms made political contributions to Members of Congress on the same day that those firms were lobbying the Members of Congress or their legislative staffs on behalf of foreign clients.[1] Lobbyists who fail to comply with certain FARA requirements may have little to fear from the Justice Department. “The cornerstone of the Registration Unit’s enforcement efforts is encouraging voluntary compliance,” a Justice Department website says.[2] When lobbyists do not voluntarily comply, the Justice Department rarely uses one of the key tools at its disposal to enforce the law—seeking a court injunction. A representative of the Department’s FARA unit told POGO: “While the FARA statute and regulations authorize the pursuit of formal legal proceedings, such as injunctive remedy options, the FARA Unit [has] not pursued injunctive remedy options recently and has instead utilized other mechanisms to achieve compliance.”[3] It appears that some registered foreign agents have been distributing materials but not filing them with the Justice Department. It’s unclear the extent to which that illustrates a lack of compliance with the law or loopholes in the law. In the process of researching this report, POGO noticed that many more lobbyists were registering as foreign agents than had filed informational materials that we could locate at the FARA office. To determine what was happening, we looked at a sampling of questionnaires that the Justice Department requires registered agents to complete every six months. Some checked one box indicating they had distributed materials and another box stating they did not file them with the FARA office.
  • The Project On Government Oversight examined thousands of these materials spanning four years, as well as additional public records related to the Justice Department’s oversight of lobbyists for foreign interests. We found that lobbyists for foreign interests have routinely failed to comply with the law—a failure that prevents journalists and watchdogs from scrutinizing the lobbying activities while foreign interests are trying to influence U.S. policy. We found a pattern of lax enforcement of FARA requirements by the Justice Department. We found that the Justice Department office responsible for administering the law is a record-keeping mess. And we found loopholes in the law that often makes it difficult if not impossible for the government to police compliance or to discipline lobbyists who fail to comply. Here are some highlights of our investigation:
  • When lobbyists for foreign interests do not follow the law, when the U.S. government fails to enforce it, and when the Justice Department makes it difficult for the American people to access records to which they are legally entitled, the public is left in the dark. To bring more transparency to this opaque realm, POGO has made four years of informational materials available for the first time online with our Foreign Influence Database, allowing the public to see how lobbyists attempt to influence American policies on behalf of their foreign clients.
  • With the release of the Foreign Influence Database, the Project On Government Oversight (POGO) is making years of documents from this key set of FARA filings electronically available for the first time. The materials were previously only available in hard copy at the FARA Registration Unit in Washington, DC, which is only open to the public from 11am to 3pm on weekdays.[12] In this digital age it is surprising that these materials could not be read online and are instead stored in file folders, where they are disorganized and susceptible to misfiling. Even those that were electronically filed by the registrants are not available to the public in an electronic format. POGO’s database includes informational materials filed in 2009, 2010, 2011, and 2012.[13]
  •  
    POGO does thorough work and doesn't let up until it gets results. Forcing DoJ to puts its foreign agents registration materials online should be a fairly trivial battle. The real war, though, will be forcing better enforcement. The new database is at http://www.pogo.org/tools-and-data/foreign-influence-database/ I punched up the word "Israel" and came up with 113 documents in the search results. Each search hit lists the name of the nation involved that the lobbying was done for. Of those 113 document hits, only two were for the nation of Israel, both for its Ministry of Tourism. The rest were by other nations who had mentioned Israel in their lobbying materials.  Now that is fairly incredible, given that Israel outright controls Congress when it comes to Middle East policy.  The last administration to attempt to do something about Israeli lobbyists not registering was the the Kennedy Administration. The result was that the major Israeli lobbying group disbanded and was promptly reformed under a new corporate charter and name. That was the very last attempt at enforcing the Foreign Agents Registration Act against Israel's lobbyists in the U.S., despite the fact that the reformed group, AIPAC, has even been caught more than once being passed highly classified U.S. documents by double agents working inside the U.S. military establishment. The leakers went to prison but the AIPACers were never prosecuted. AIPAC rules.  
Paul Merrell

No, Israel Does Not Have the Right to Self-Defense In International Law Against Occupie... - 0 views

  • On the fourth day of Israel's most recent onslaught against Gaza's Palestinian population, President Barack Obama declared, “No country on Earth would tolerate missiles raining down on its citizens from outside its borders.” In an echo of Israeli officials, he sought to frame Israel's aerial missile strikes against the 360-square kilometer Strip as the just use of armed force against a foreign country. Israel's ability to frame its assault against territory it occupies as a right of self-defense turns international law on its head.  A state cannot simultaneously exercise control over territory it occupies and militarily attack that territory on the claim that it is “foreign” and poses an exogenous national security threat. In doing precisely that, Israel is asserting rights that may be consistent with colonial domination but simply do not exist under international law. 
  • Admittedly, the enforceability of international law largely depends on voluntary state consent and compliance. Absent the political will to make state behavior comport with the law, violations are the norm rather than the exception. Nevertheless, examining what international law says with regard to an occupant’s right to use force is worthwhile in light of Israel's deliberate attempts since 1967 to reinterpret and transform the laws applicable to occupied territory. These efforts have expanded significantly since the eruption of the Palestinian uprising in 2000, and if successful, Israel’s reinterpretation would cast the law as an instrument that protects colonial authority at the expense of the rights of civilian non-combatants.  
  • International Law places the responsibility upon the commanding general of preserving order, punishing crime, and protecting lives and property within the occupied territory. His power in accomplishing these ends is as great as his responsibility.  The extent and breadth of force constitutes the distinction between the right to self-defense and the right to police. Police authority is restricted to the least amount of force necessary to restore order and subdue violence. In such a context, the use of lethal force is legitimate only as a measure of last resort. Even where military force is considered necessary to maintain law and order, such force is circumscribed by concern for the civilian non-combatant population. The law of self-defense, invoked by states against other states, however, affords a broader spectrum of military force. Both are legitimate pursuant to the law of armed conflict and therefore distinguished from the peacetime legal regime regulated by human rights law. 
  • ...5 more annotations...
  • Military occupation is a recognized status under international law and since 1967, the international community has designated the West Bank and the Gaza Strip as militarily occupied. As long as the occupation continues, Israel has the right to protect itself and its citizens from attacks by Palestinians who reside in the occupied territories. However, Israel also has a duty to maintain law and order, also known as “normal life,” within territory it occupies. This obligation includes not only ensuring but prioritizing the security and well-being of the occupied population. That responsibility and those duties are enumerated in Occupation Law.  Occupation Law is part of the laws of armed conflict; it contemplates military occupation as an outcome of war and enumerates the duties of an occupying power until the peace is restored and the occupation ends. To fulfill its duties, the occupying power is afforded the right to use police powers, or the force permissible for law enforcement purposes. As put by the U.S. Military Tribunal during the Hostages Trial (The United States of America vs. Wilhelm List, et al.)
  • To equate the two is simply to confuse the legal with the linguistic denotation of the term ”defense.“ Just as ”negligence,“ in law, does not mean ”carelessness” but, rather, refers to an elaborate doctrinal structure, so ”self-defense” refers to a complex doctrine that has a much more restricted scope than ordinary notions of ”defense.“  To argue that Israel is employing legitimate “self-defense” when it militarily attacks Gaza affords the occupying power the right to use both police and military force in occupied territory. An occupying power cannot justify military force as self-defense in territory for which it is responsible as the occupant. The problem is that Israel has never regulated its own behavior in the West Bank and Gaza as in accordance with Occupation Law. 
  • Once armed conflict is initiated, and irrespective of the reason or legitimacy of such conflict, the jus in bello legal framework is triggered. Therefore, where an occupation already is in place, the right to initiate militarized force in response to an armed attack, as opposed to police force to restore order, is not a remedy available to the occupying state. The beginning of a military occupation marks the triumph of one belligerent over another. In the case of Israel, its occupation of the West Bank, the Gaza Strip, the Golan Heights, and the Sinai in 1967 marked a military victory against Arab belligerents.  Occupation Law prohibits an occupying power from initiating armed force against its occupied territory. By mere virtue of the existence of military occupation, an armed attack, including one consistent with the UN Charter, has already occurred and been concluded. Therefore the right of self-defense in international law is, by definition since 1967, not available to Israel with respect to its dealings with real or perceived threats emanating from the West Bank and Gaza Strip population. To achieve its security goals, Israel can resort to no more than the police powers, or the exceptional use of militarized force, vested in it by IHL. This is not to say that Israel cannot defend itself—but those defensive measures can neither take the form of warfare nor be justified as self-defense in international law. As explained by Ian Scobbie:  
  • When It Is Just to Begin to Fight  The laws of armed conflict are found primarily in the Hague Regulations of 1907, the Four Geneva Conventions of 1949, and their Additional Protocols I and II of 1977. This body of law is based on a crude balance between humanitarian concerns on the one hand and military advantage and necessity on the other. The post-World War II Nuremberg trials defined military exigency as permission to expend “any amount and kind of force to compel the complete submission of the enemy…” so long as the destruction of life and property is not done for revenge or a lust to kill. Thus, the permissible use of force during war, while expansive, is not unlimited.  In international law, self-defense is the legal justification for a state to initiate the use of armed force and to declare war. This is referred to as jus ad bellum—meaning “when it is just to begin to fight.” The right to fight in self-defense is distinguished from jus in bello, the principles and laws regulating the means and methods of warfare itself. Jus ad bellum aims to limit the initiation of the use of armed force in accordance with United Nations Charter Article 2(4); its sole justification, found in Article 51, is in response to an armed attack (or an imminent threat of one in accordance with customary law on the matter). The only other lawful way to begin a war, according to Article 51, is with Security Council sanction, an option reserved—in principle, at least—for the defense or restoration of international peace and security.
  • Noura Erakat
Gary Edwards

What You Can Do About Vote Fraud | Fellowship of the Minds - 0 views

  •  
    "What You Can Do About Vote Fraud Posted on November 17, 2012 by Dr. Eowyn | 2 Comments excerpt: There is now massive compelling evidence that Democrats committed vote fraud in the 2012 presidential election, especially in the four battleground states of Colorado, Florida, Ohio, and Virginia. See FOTM's posts chronicling the extensive pervasive fraud by going to our "2012 Election" page below our FOTM masthead, and click on those post links colored neon green. But the Republican Party won't do anything about the fraud, because it is legally constrained by an agreement the Republican National Committee (RNC) made with the Democratic National Committee (DNC) in 1982, to settle a lawsuit. The agreement or Consent Decree, which is national in scope, limits the RNC's ability to engage or assist in voter fraud prevention unless the RNC obtains the court's approval in advance. Nor can the RNC engage in "ballot security activities" - defined as "ballot integrity, ballot security or other efforts to prevent or remedy vote fraud." Read more about the agreement HERE. Simply put, the GOP is neutered. But we ordinary Americans can do something about vote fraud, in our separate states. FOTM's Hardnox has been urging us to contact our state's attorney general. Here's how." Dr. Eowyn provides a list of all 50 State Attorneys Generals for the purposes of direct mail.  Mailing addresses and phone numbers!  Get writing Patriots.  It's now or never.
Gary Edwards

Impeach Judge James Robart for violating sovereignty and Constitution - 0 views

  •  
    "It's still hard to believe we now live in a country where a district judge can demand that we bring in refugees from state sponsors of terror and failed states saturated with terrorists and no data systems during a time of war. It's almost unfathomable that a district judge, an institution created by Congress, can overturn long-standing refugee law and bar the federal government from prioritizing persecuted religious minorities for refugee resettlement. All in contravention to statute, numerous clauses of the Constitution, the social contract, the social compact, popular sovereignty, jurisdictional sovereignty, and 200 years of case law. If Obergefell redefined the building block of all civilization, Judge James Robart's ruling redefined the building block of a sovereign nation. It's hard to comprehend a judicial opinion more divorced from our Constitution, sovereignty, fundamental laws, founding values, history, and tradition. It's also hard to imagine an opinion that is of greater consequence - unless it is ignored. In the long run, Congress must strip the federal judiciary of their power grab and restore Congress' plenary power over immigration, as it was since our founding. However, in the meantime, it's time to make impeachment great again. Impeachment was a critical check on abuse of power   Before the growth of political parties killed the separation of powers, the tool of impeachment was regarded by our founders as one of the most effective ways of checking the executive and judicial branches of government. By my count, impeachment is referenced 58 times in the Federalist Papers and countless times during the Constitutional Convention. Impeachment [U.S.CONST. art. II, §4] was not only reserved for those who engage in criminal behavior. It was clearly designed to check abuse of power. As the Congressional Research Service observes, Congress has identified "improperly exceeding or abusing the powers of the office" as a criterion for
Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Paul Merrell

The Latest European Court of Human Rights Ruling on Accountability for Torture | Just S... - 0 views

  • In another important decision on European participation in the US war on terrorism, the European Court of Human Rights (ECtHR) issued a judgment late last month against Italy for its role in the extraordinary rendition of Egyptian cleric Osama Mustafa Hassan Nasr, better known as Abu Omar. (An English-language summary of ruling is here; the full decision, presently available only in French, is here.) The ruling not only represents a further contribution to the Strasbourg Court’s growing accountability jurisprudence, but also highlights the United States’ own failure to provide any redress to victims of the torture program that it primarily created and operated. The ECtHR’s decision in Nasr v. Italy concerns one of the most notorious instances of extraordinary rendition (i.e., the extrajudicial transfer of an individual to another country for purposes of abusive interrogation). In 2003, Nasr, who had been granted political asylum in Italy, was abducted in broad daylight from a street in Milan and taken to Aviano air base, which is operated by the US Air Force. Nasr was subsequently taken, by way of the US’s Ramstein air base in Germany, to Cairo where he was interrogated by Egyptian intelligence services. Egyptian authorities held Nasr in secret for more than a year and subjected him to repeated torture before releasing him in April 2004. Approximately 20 days after his release — and after submitting a statement to Milan’s public prosecutor describing his abuse — Nasr was rearrested and detained without charges. He was released in 2007, but prohibited from leaving Egypt.
  • The ECtHR ruling centers on Italy’s role in Nasr’s abduction in Milan, his rendition to Egypt where he faced a real risk of abuse, and its subsequent failure to conduct an effective domestic investigation or to provide any redress. The ECtHR found Italy liable for multiple violations of the European Convention on Human Rights (ECHR), including article 3 (the prohibition on inhuman or degrading treatment), article 5 (the right to liberty and security), and article 13 (the right to an adequate remedy). It ordered Italy to pay €70,000 to Nasr and €15,000 to his wife, Nabila Ghali, for the suffering and anguish caused by her husband’s enforced disappearance. The Milan public prosecutor had previously investigated and prosecuted 25 CIA officers, including the agency’s Milan station chief, Robert Seldon Lady, and seven Italian military intelligence officers, for aiding and abetting in Nasr’s abduction and rendition. The United States strenuously opposed the prosecution, warning that it would harm US-Italian relations, and the Italian government successfully challenged much of the evidence on the grounds it could jeopardize national security. The trial court convicted 22 CIA agents in absentia and gave them prison sentences of between six to nine years; a Milan appeals court upheld the convictions and overturned the acquittals of the other three US defendants. Italy’s highest court, however, overturned the conviction of five of the Italian military intelligence agents based on state secrecy grounds. The Italian government has refused to seek the extradition of the convicted US nationals. (For more details, Human Rights Watch has an excellent summary of the proceedings in Italy here.)
  • The ECtHR’s ruling in Nasr strengthens accountability by reinforcing state responsibility for participation in abuses committed during the war on terrorism. It builds on the Strasbourg Court’s prior decisions in El-Masri v. Macedonia and Al-Nashiri v. Poland/Husayn (Abu Zubaydah) v. Poland, which held Macedonia and Poland, respectively, liable for their role in CIA torture and rendition, including (in the case of Poland) for hosting a CIA black site. Nasr, together with El-Masri and al-Nashiri/Husayn, should help discourage a state’s future participation in cross-border counterterrorism operations conducted in flagrant violation of human rights guarantees. While the deterrent value of legal judgments may be uncertain, the recent line of Strasbourg Court decisions raises the costs of aiding and abetting illegal operations, even in the national security context.
  • ...2 more annotations...
  • Nasr also advances the jurisprudence surrounding a state’s duty to conduct an effective domestic investigation into torture. The Strasbourg Court noted that Italian courts had conducted a detailed investigation and that the evidence disregarded by Italy’s highest court on grounds of state secrecy had been sufficient to convict the five Italian military intelligence defendants. It further observed that because the evidence inculpating those defendants had been widely available in the press and on the Internet, the court’s invocation of state secrecy doctrine was not only unpersuasive, but designed to grant impunity to the defendants. Further, the Strasbourg Court noted that the Italian government had never sought the extradition of the convicted CIA agents. As result, the court ruled that despite the efforts of Italian investigators and judges, which had identified the responsible individuals and secured their convictions, the domestic proceedings failed to satisfy the procedural requirements of article 3 of the European Convention (prohibiting torture and other ill-treatment), due to the actions of the executive. This ruling is important because it imposes liability not only where a state takes no steps towards a genuine domestic investigation and prosecution (as in El-Masri and Al-Nashiri/Husayn), but also where efforts by a state’s judges and prosecutors are thwarted in the name of state secrecy.
  • The ECtHR’s rulings on the CIA torture program also highlight the continued absence of accountability in the United States. The US has failed both to conduct an effective criminal investigation of those most responsible for CIA torture and to provide any remedies to victims. In fact, the Obama administration has vigorously opposed the latter at every turn, invoking the same sweeping state secrecy doctrines the ECtHR rejected in El-Masri and Nasr. These rulings will likely catalyze future litigation before the Strasbourg Court and in European domestic courts as well. (Recent actions filed against Germany for its participation in US targeted killings through use of the Ramstein Air Base provide one example of such litigation.) While the ECtHR’s rulings may not spur further efforts in the United States, they reinforce the perception of the United States as an outlier on the important question of accountability for human rights violations.
Paul Merrell

Courthouse News Service - 0 views

  • During secret proceedings in Washington, a key witness in undermining the $9.5 billion judgment Chevron faces in Ecuador repudiated much of his explosive testimony, transcripts made public today show.     Since agreeing to testify for the oil giant, Judge Alberto Guerra's fortunes have changed, and so have Chevron's.     Roughly two years ago, Guerra took to the witness stand in a New York federal courtroom and swore that lawyers for rainforest villagers bribed him to ghostwrite a multibillion-dollar Ecuadorean court judgment against Chevron for oil contamination to the Amazon jungle.     About a year before he made a deal with Chevron, Guerra had little more than $100 to his name. He also owed tens of thousands of dollars in debt and could not afford to visit his children living in the United States.     U.S. District Judge Lewis Kaplan had warned early on in proceedings that he did not "assume that anyone's hands in this are clean," yet he credited Guerra's testimony last year in ruling that the Ecuadoreans obtained their award "by corrupt means."     The Ecuadoreans have long attacked Guerra, who has a contract with Chevron for various perks, including at least $326,000, an immigration attorney and a car, as a "paid-for" participant in the oil giant's self-styled witness-protection program.     Kaplan's decision conceded that "Guerra's credibility is not impeccable," but found that his account was "corroborated extensively by independent evidence."
  • Both that credibility and the corroborating evidence came under withering attack this year during closed-door proceedings before an international arbitration tribunal.     Though the hearings took place without press or public access at the World Bank in Washington on April 23 and 24, the tribunal agreed to release transcripts of the proceedings in response to a Courthouse News request that the Reporters Committee for Freedom of the Press supported.     Courthouse News obtained advanced copies of more than 3,000 pages of transcripts, which were formally released on Monday.     They show Guerra putting a new twist on an old saying. "Money talks, gold screams," Guerra said in a June 25, 2012, meeting with Chevron representatives - a meeting Chevron recorded.     Testifying about this comment at the arbitration hearing, Guerra said Chevron showed him a safe filled with money. He recounted Chevron's representatives telling him: "Look, look, look what's down there. We have $20,000 there."     He remembered replying: "Oh, OK, very well, very well."     Guerra said he had only $146 in his bank account a year earlier, and owed tens of thousands more to finish the construction of his house. He said he could not scrape money for airfare to visit his children in the United States.
  •  Minutes from Guerra's meeting with Chevron that came to light during the tribunal proceedings showed that Chevron's lawyers hoped to find evidence that the Ecuadorean government had pressured the Guerra to rule against the company.     Guerra disappointed by saying that Ecuadorean President Rafael Correa's administration "never butted in" to the process, the transcript shows.     "These guys are idiots, but the truth, the truth, I attest, damn, they never got involved," Guerra added, referring to Correa's government.     The remark appears to undercut the foundation of Chevron's arbitration case, which asks the tribunal to blame the Ecuadorean government for a miscarriage of justice.     Guerra stood by those comments on the arbitration panel's witness stand.      "My position is that the government did not intervene," Guerra said.     The only time an Ecuadorean government official tried to elbow into the case, Guerra testified, was under a prior administration. Correa's predecessors pushed to dismiss the case in Chevron's favor in 2003, he said.
  • ...4 more annotations...
  •  Guerra also acknowledged bluntly on the witness stand that he had lied in telling Chevron's team that attorneys for the Ecuadoreans offered him $300,000.     "Yes, sir, I lied there," Guerra told Eric Bloom, who represents Ecuador for the firm Winston & Strawn. "I wasn't truthful."     Guerra maintains that other attorneys for the Ecuadoreans, specifically Steven Donziger and Pablo Fajardo, offered money in return for ghostwriting the judgment on behalf of Judge Nicolas Zambrano, the final jurist to preside over the case.     Shifting the details of this supposed arrangement, though, Guerra walked back his allegation that Zambrano offered him 20 percent.     "That was my sworn statement in New York, but what I said is that, because of a circumstance, because of a situation, I mentioned 20 percent when it wasn't true, and I think that, as a gentleman, I should say the truth, and we did not discuss - I did not discuss 20 percent with Mr. Zambrano - but we did discuss that he would share with me from what he received," he said.     In his nearly 500-page ruling, Judge Kaplan pointed to bank records, daily planners, shipping records and airplane tickets as corroborating evidence that outweighed Guerra's credibility problems.
  • Particularly persuasive for Kaplan was evidence that Ecuador's national airline, Tame, certified delivery of packages between Guerra and Zambrano.     Guerra told the arbitrators this spring, however, that all 11 of these packages "had nothing to do with the [Chevron] case."     As for his plane tickets to the rainforest from Aug. 11 and 12, 2010, Guerra said they occurred during an irrelevant time period.     "If I traveled during those dates, it wasn't for me to provide assistance to the Chevron case," he said.     Guerra testified that Chevron representatives told him that they would have raised his pay if he could provide them with the key physical evidence they were looking for: a draft of the judgment.     "We were unable to find the main document," Guerra recalled them saying. "Had we been able to find it, we would have been able to offer you a larger amount, something like that, we have $18,000 for you, and we're going to take the computer with us."     Though Guerra did not have a copy of the judgment, Ecuador's forensic expert Christopher Racich testified that he found a running draft of the judgment against Chevron on Zambrano's hard drives.
  • Ecuador now argues that this forensic evidence - which Courthouse News reported exclusively early this year - proves Zambrano painstakingly wrote the ruling and saved it hundreds of times throughout the case.     Chevron has not been able to produce emails between Guerra, Zambrano and the purported ghostwriters, Donziger and Fajardo, Ecuador's forensic expert says.     Guerra acknowledged to the arbitrators that that the bounty of physical evidence he promised Chevron fell short.     There are no calendars and day planners marked with meetings scheduled between Fajardo, Donziger or Guerra, he acknowledged.     While Guerra said he had payments from Zambrano from April 2011 and February 2012, he testified that these "had no connection to the Chevron case."     For Chevron, the thousands of pages of transcripts show that the company "proved its case before the International Arbitration Tribunal."     "Witness and expert testimony confirmed that the Ecuadorean judgment against Chevron was ghostwritten by Steven Donziger and his team and that the Ecuadorian government is responsible for any further remediation," Chevron spokesman Morgan Crinklaw said in a statement. "Chevron also proved that Ecuador breached the U.S.-Ecuador Bilateral Investment Treaty and international law."     Donziger, who still works for the Ecuadorean villagers seeking to collect from Chevron, said in a statement that Guerra's latest testimony "demonstrates once and for all that Chevron's so-called racketeering case has completely fallen apart."
  •   "Guerra has been the linchpin of Chevron's entire body of trumped up evidence and he now stands not only as an admitted liar, but also as a shocking symbol of how Chevron's management has become so obsessed with evading its legal obligations in Ecuador that it is willing to risk presenting false evidence in court to try to frame adversary counsel and undermine the rule of law," Donziger added.
  •  
    Chevron has a "witness-protection program" as an excuse for paying off witnesses? And for paying them to lie under oath, it appears. Never in my legal career did I ever here of a non-governmental entity with a witness protection program. This reeks to high heavens.  Hats off to Courthouse News for digging deep on this one.   
Paul Merrell

SPIEGEL Exclusive: NSA Spies on International Bank Transactions - SPIEGEL ONLINE - 0 views

  • The National Security Agency (NSA) widely monitors international payments, banking and credit card transactions, according to documents seen by SPIEGEL. The information from the American foreign intelligence agency, acquired by former NSA contractor and whistleblower Edward Snowden, show that the spying is conducted by a branch called "Follow the Money" (FTM). The collected information then flows into the NSA's own financial databank, called "Tracfin," which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions. Further NSA documents from 2010 show that the NSA also targets the transactions of customers of large credit card companies like VISA for surveillance. NSA analysts at an internal conference that year described in detail how they had apparently successfully searched through the US company's complex transaction network for tapping possibilities.
  • Their aim was to gain access to transactions by VISA customers in Europe, the Middle East and Africa, according to one presentation. The goal was to "collect, parse and ingest transactional data for priority credit card associations, focusing on priority geographic regions." In response to a SPIEGEL inquiry, however, VISA issued a statement in which it said, "We are not aware of any unauthorized access to our network. Visa takes data security seriously and, in response to any attempted intrusion, we would pursue all available remedies to the fullest extent of the law. Further, its Visa's policy to only provide transaction information in response to a subpoena or other valid legal process." The NSA's Tracfin data bank also contained data from the Brussels-based Society for Worldwide Interbank Financial Telecommunication (SWIFT), a network used by thousands of banks to send transaction information securely. SWIFT was named as a "target," according to the documents, which also show that the NSA spied on the organization on several levels, involving, among others, the agency's "tailored access operations" division. One of the ways the agency accessed the data included reading "SWIFT printer traffic from numerous banks," the documents show.
  • But even intelligence agency employees are somewhat concerned about spying on the world finance system, according to one document from the UK's intelligence agency GCHQ concerning the legal perspectives on "financial data" and the agency's own cooperations with the NSA in this area. The collection, storage and sharing of politically sensitive data is a deep invasion of privacy, and involved "bulk data" full of "rich personal information," much of which "is not about our targets," the document says.
  •  
    NSA and GCHQ spying on banksters' transactions? I'll bet that comes to a screeching halt soon. Isn't it unwritten law in the Obama Administration that no government agencies mess with the banksters?
Paul Merrell

Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com - 0 views

  • Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.
  • elements of the decision became evident on Friday, when the White House denied that it had any prior knowledge of the Heartbleed bug, a newly known hole in Internet security that sent Americans scrambling last week to change their online passwords. The White House statement said that when such flaws are discovered, there is now a “bias” in the government to share that knowledge with computer and software manufacturers so a remedy can be created and distributed to industry and consumers.Caitlin Hayden, the spokeswoman for the National Security Council, said the review of the recommendations was now complete, and it had resulted in a “reinvigorated” process to weigh the value of disclosure when a security flaw is discovered, against the value of keeping the discovery secret for later use by the intelligence community.“This process is biased toward responsibly disclosing such vulnerabilities,” she said.
  • The N.S.A. made use of four “zero day” vulnerabilities in its attack on Iran’s nuclear enrichment sites. That operation, code-named “Olympic Games,” managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.Not surprisingly, officials at the N.S.A. and at its military partner, the United States Cyber Command, warned that giving up the capability to exploit undisclosed vulnerabilities would amount to “unilateral disarmament” — a phrase taken from the battles over whether and how far to cut America’s nuclear arsenal.“We don’t eliminate nuclear weapons until the Russians do,” one senior intelligence official said recently. “You are not going to see the Chinese give up on ‘zero days’ just because we do.” Even a senior White House official who was sympathetic to broad reforms after the N.S.A. disclosures said last month, “I can’t imagine the president — any president — entirely giving up a technology that might enable him some day to take a covert action that could avoid a shooting war.”
  • ...2 more annotations...
  • One recommendation urged the N.S.A. to get out of the business of weakening commercial encryption systems or trying to build in “back doors” that would make it far easier for the agency to crack the communications of America’s adversaries. Tempting as it was to create easy ways to break codes — the reason the N.S.A. was established by Harry S. Truman 62 years ago — the committee concluded that the practice would undercut trust in American software and hardware products. In recent months, Silicon Valley companies have urged the United States to abandon such practices, while Germany and Brazil, among other nations, have said they were considering shunning American-made equipment and software. Their motives were hardly pure: Foreign companies see the N.S.A. disclosures as a way to bar American competitors.Continue reading the main story Continue reading the main story AdvertisementAnother recommendation urged the government to make only the most limited, temporary use of what hackers call “zero days,” the coding flaws in software like Microsoft Windows that can give an attacker access to a computer — and to any business, government agency or network connected to it. The flaws get their name from the fact that, when identified, the computer user has “zero days” to fix them before hackers can exploit the accidental vulnerability.
  • But documents released by Edward J. Snowden, the former N.S.A. contractor, make it clear that two years before Heartbleed became known, the N.S.A. was looking at ways to accomplish exactly what the flaw did by accident. A program code-named Bullrun, apparently named for the site of two Civil War battles just outside Washington, was part of a decade-long effort to crack or circumvent encryption on the web. The documents do not make clear how well it succeeded, but it may well have been more effective than exploiting Heartbleed would be at enabling access to secret data.The government has become one of the biggest developers and purchasers of information identifying “zero days,” officials acknowledge. Those flaws are big business — Microsoft pays up to $150,000 to those who find them and bring them to the company to fix — and other countries are gathering them so avidly that something of a modern-day arms race has broken out. Chief among the nations seeking them are China and Russia, though Iran and North Korea are in the market as well.
  •  
    Note that this is only an elastic policy, not law. Also notice that NYT is now reporting as *fact* that the NSA did the cyber attack on the Iranian enrichment centrifuges. By any legal measure, if true that was an act of war, a war of aggression.  So why wasn't the American public informed that we were at war with Iran? 
Paul Merrell

Privacy Board Urges New Criteria for Secrecy - Secrecy News - 0 views

  • The public controversy that erupted over NSA bulk collection of Americans’ telephone records was a clear sign, if one were needed, that the boundaries of government secrecy had been drawn incorrectly, and that the public had been wrongly denied an opportunity to grant or withhold its consent in such cases. To remedy this systemic problem, the Privacy and Civil Liberties Oversight Board said in a new report yesterday that the government needs to develop new criteria for secrecy and openness.
  • “The Board concludes that Section 215 [of the USA Patriot Act] does not provide an adequate legal basis to support this [bulk collection] program. Because the program is not statutorily authorized, it must be ended,” the report said. Even in the absence of overt abuse, it was argued, the mere collection of American telephone records in bulk is an infringement on privacy and other civil liberties. “Permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.” While there are procedures in place to limit the official use of such records, “in our view they cannot fully ameliorate the implications for privacy, speech, and association that follow from the government’s ongoing collection of virtually all telephone records of every American. Any governmental program that entails such costs requires a strong showing of efficacy. We do not believe the NSA’s telephone records program conducted under Section 215 meets that standard.”
  • If the bulk collection program were demonstrably effective in saving lives, the report implied, then certain infringements on privacy might well be warranted. But that is not the case, the Board majority concluded. “Given the limited value this [bulk collection] program has demonstrated to date… we find little reason to expect that it is likely to provide significant value, much less essential value, in safeguarding the nation in the future,” the Board report said.
Paul Merrell

EU court says Hamas should be removed from terror list | Reuters - 0 views

  • (Reuters) - The Palestinian Islamist group Hamas should be removed from the European Union's terrorist list, an EU court ruled on Wednesday, saying the decision to include it was based on media reports not considered analysis. However, in its ruling, the bloc's second highest tribunal said member states could maintain their freeze on Hamas's assets for three months to give time for further review or for an appeal to be launched.The EU's foreign policy arm said the bloc continued to view Hamas as a terrorist group. "This was a legal ruling of the court based on procedural grounds. We will look into this and decide on appropriate remedial action," spokeswoman Maja Kocijanic said.Israel, which has clashed repeatedly with Europe in recent years over Palestinian statehood ambitions, demanded Hamas remain blacklisted and said the ruling showed "staggering hypocrisy" toward a Jewish state founded after the Holocaust.
  • Hamas says it is a legitimate resistance movement and contested the European Union's decision in 2001 to include it on the terrorist list. It welcomed Wednesday's verdict."The decision is a correction of a historical mistake the European Union had made," Deputy Hamas chief Moussa Abu Marzouk said. "Hamas is a resistance movement and it has a natural right according to all international laws and standards to resist the occupation."The EU court did not ponder the merits of whether Hamas should be classified as a terror group, but reviewed the original decision-making process. This, it said, did not include the considered opinion of competent authorities, but rather relied on media and Internet reports.
1 - 20 of 21 Next ›
Showing 20 items per page