Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged legalization

Rss Feed Group items tagged

Paul Merrell

Vienna Convention on Diplomatic Relations - Wikipedia, the free encyclopedia - 0 views

  • The Vienna Convention on Diplomatic Relations of 1961 is an international treaty that defines a framework for diplomatic relations between independent countries. It specifies the privileges of a diplomatic mission that enable diplomats to perform their function without fear of coercion or harassment by the host country. This forms the legal basis for diplomatic immunity.
  • The treaty is an extensive document, containing 53 articles. Following is a basic overview of its key provisions.[2]
  • Article 22. The premises of a diplomatic mission, such as an embassy, are inviolate and must not be entered by the host country except by permission of the head of the mission. Furthermore, the host country must protect the mission from intrusion or damage. The host country must never search the premises, nor seize its documents or property. Article 30 extends this provision to the private residence of the diplomats. Article 27. The host country must permit and protect free communication between the diplomats of the mission and their home country. A diplomatic bag must never be opened even on suspicion of abuse. A diplomatic courier must never be arrested or detained.
  • ...2 more annotations...
  • Article 37. The family members of a diplomat that are living in the host country enjoy most of the same protections as the diplomats themselves.
  • Original text related to this article Diplomatic Relations Protocols The Vienna Convention on Diplomatic Relations 50th Anniversary Website Created by the 2011 VCDR 50th Anniversary Project Introductory note by Eileen Denza, procedural history note and audiovisual material on the Vienna Convention on Diplomatic Relations in the Historic Archives of the United Nations Audiovisual Library of International Law Lecture by Eileen Denza entitled Diplomatic and Consular Law – Topical Issues in the Lecture Series of the United Nations Audiovisual Library of International Law Lecture by John Dugard entitled Diplomatic Protection in the Lecture Series of the United Nations Audiovisual Library of International Law
  •  
    Remember the NSA's electronic surveillance of foreign embassies and diplomats around the world and of U.N. missions and diplomats? The Vienna Convention on Diplomatic Relations is the governing international law. I've just completed reading the entire treaty but will highlight portions from its Wikipedia entry instead.  Disputes involving the treaty are decided by the International Court of Justice.  The treaty itself goes into far more detail, but suffice it to say that the NSA's electronic surveillance of diplomats and their staff is beyond doubt in direct conflict with both the letter and the spirit of the treaty. The inviolability privacy of diplomats and staff communications with each other and with their government is an obligation of the host nation. The U.S. committed a serious breach of the treaty by intercepting communications in this circumstance. 
Paul Merrell

Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian - 0 views

  • The UK intelligence agency GCHQ has repeatedly warned it fears a "damaging public debate" on the scale of its activities because it could lead to legal challenges against its mass-surveillance programmes, classified internal documents reveal.Memos contained in the cache disclosed by the US whistleblower Edward Snowden detail the agency's long fight against making intercept evidence admissible as evidence in criminal trials – a policy supported by all three major political parties, but ultimately defeated by the UK's intelligence community.Foremost among the reasons was a desire to minimise the potential for challenges against the agency's large-scale interception programmes, rather than any intrinsic threat to security, the documents show.
  • The papers also reveal that:• GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone "well beyond" what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas.• GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissible in court.• GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and America's National Security Agency.The most recent attempt to make intelligence gathered from intercepts admissible in court, proposed by the last Labour government, was finally stymied by GCHQ, MI5 and MI6 in 2009.
  • Another top GCHQ priority in resisting the admission of intercepts as evidence was keeping secret the extent of the agency's co-operative relationships with telephone companies – including being granted access to communications networks overseas.In June, the Guardian disclosed the existence of GCHQ's Tempora internet surveillance programme. It uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to vast swaths of internet users' personal data. The intercepts are placed in the UK and overseas, with the knowledge of companies owning either the cables or landing stations.The revelations of voluntary co-operation with some telecoms companies appear to contrast markedly with statements made by large telecoms firms in the wake of the first Tempora stories. They stressed that they were simply complying with the law of the countries in which they operated.
  • ...6 more annotations...
  • In reality, numerous telecoms companies were doing much more than that, as disclosed in a secret document prepared in 2009 by a joint working group of GCHQ, MI5 and MI6.Their report contended that allowing intercepts as evidence could damage relationships with "Communications Service Providers" (CSPs).In an extended excerpt of "the classified version" of a review prepared for the Privy Council, a formal body of advisers made up of current and former cabinet ministers, the document sets out the real nature of the relationship between telecoms firms and the UK government."Under RIPA [the Regulation of Investigatory Powers Act 2000], CSPs in the UK may be required to provide, at public expense, an adequate interception capability on their networks," it states. "In practice all significant providers do provide such a capability. But in many cases their assistance – while in conformity with the law – goes well beyond what it requires."
  • GCHQ's internet surveillance programme is the subject of a challenge in the European court of human rights, mounted by three privacy advocacy groups. The Open Rights Group, English PEN and Big Brother Watch argue the "unchecked surveillance" of Tempora is a challenge to the right to privacy, as set out in the European convention on human rights.That the Tempora programme appears to rely at least in part on voluntary co-operation of telecoms firms could become a major factor in that ongoing case. The revelation could also reignite the long-running debate over allowing intercept evidence in court.GCHQ's submission goes on to set out why its relationships with telecoms companies go further than what can be legally compelled under current law. It says that in the internet era, companies wishing to avoid being legally mandated to assist UK intelligence agencies would often be able to do so "at little cost or risk to their operations" by moving "some or all" of their communications services overseas.
  • As a result, "it has been necessary to enter into agreements with both UK-based and offshore providers for them to afford the UK agencies access, with appropriate legal authorisation, to the communications they carry outside the UK".The submission to ministers does not set out which overseas firms have entered into voluntary relationships with the UK, or even in which countries they operate, though documents detailing the Tempora programme made it clear the UK's interception capabilities relied on taps located both on UK soil and overseas.There is no indication as to whether the governments of the countries in which deals with companies have been struck would be aware of the GCHQ cable taps.
  • Evidence that telecoms firms and GCHQ are engaging in mass interception overseas could stoke an ongoing diplomatic row over surveillance ignited this week after the German chancellor, Angela Merkel, accused the NSA of monitoring her phone calls, and the subsequent revelation that the agency monitored communications of at least 35 other world leaders.On Friday, Merkel and the French president, François Hollande, agreed to spearhead efforts to make the NSA sign a new code of conduct on how it carried out intelligence operations within the European Union, after EU leaders warned that the international fight against terrorism was being jeopardised by the perception that mass US surveillance was out of control.Fear of diplomatic repercussions were one of the prime reasons given for GCHQ's insistence that its relationships with telecoms firms must be kept private .
  • Telecoms companies "feared damage to their brands internationally, if the extent of their co-operation with HMG [Her Majesty's government] became apparent", the GCHQ document warned. It added that if intercepts became admissible as evidence in UK courts "many CSPs asserted that they would withdraw their voluntary support".The report stressed that while companies are going beyond what they are required to do under UK law, they are not being asked to violate it.Shami Chakrabarti, Director of Liberty and Anthony Romero Executive Director of the American Civil Liberties Union issued a joint statement stating:"The Guardian's publication of information from Edward Snowden has uncovered a breach of trust by the US and UK Governments on the grandest scale. The newspaper's principled and selective revelations demonstrate our rulers' contempt for personal rights, freedoms and the rule of law.
  • "Across the globe, these disclosures continue to raise fundamental questions about the lack of effective legal protection against the interception of all our communications."Yet in Britain, that conversation is in danger of being lost beneath self-serving spin and scaremongering, with journalists who dare to question the secret state accused of aiding the enemy."A balance must of course be struck between security and transparency, but that cannot be achieved whilst the intelligence services and their political masters seek to avoid any scrutiny of, or debate about, their actions."The Guardian's decision to expose the extent to which our privacy is being violated should be applauded and not condemned."
  •  
    The Guardian lands another gigantic bomb squarely on target, with massive potential for diplomatic, political, and financial disruption. Well done, Guardian. 
Paul Merrell

U.S. gives big, secret push to Internet surveillance - CNET - 0 views

  • Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws. The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12. "The Justice Department is helping private companies evade federal wiretap laws," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, which obtained over 1,000 pages of internal government documents and provided them to CNET this week. "Alarm bells should be going off." Those documents show the National Security Agency and the Defense Department were deeply involved in pressing for the secret legal authorization, with NSA director Keith Alexander participating in some of the discussions personally. Despite initial reservations, including from industry participants, Justice Department attorneys eventually signed off on the project.
  • The Justice Department agreed to grant legal immunity to the participating network providers in the form of what participants in the confidential discussions refer to as "2511 letters," a reference to the Wiretap Act codified at 18 USC 2511 in the federal statute books. The Wiretap Act limits the ability of Internet providers to eavesdrop on network traffic except when monitoring is a "necessary incident" to providing the service or it takes place with a user's "lawful consent." An industry representative told CNET the 2511 letters provided legal immunity to the providers by agreeing not to prosecute for criminal violations of the Wiretap Act. It's not clear how many 2511 letters were issued by the Justice Department. In 2011, Deputy Secretary of Defense William Lynn publicly disclosed the existence of the original project, called the DIB Cyber Pilot, which used login banners to inform network users that monitoring was taking place. In May 2012, the pilot was turned into an ongoing program -- broader but still voluntary -- by the name of Joint Cybersecurity Services Pilot, with the Department of Homeland Security becoming involved for the first time. It was renamed again to Enhanced Cybersecurity Services program in January, and is currently being expanded to all types of companies operating critical infrastructure.
  • Another e-mail message from a Justice Department attorney wondered: "Will the program cover all parts of the company network -- including say day care centers (as mentioned as a question in a [deputies committee meeting]) and what are the policy implications of this?" The deputies committee includes the deputy secretary of defense, the deputy director of national intelligence, the deputy attorney general, and the vice chairman of the Joint Chiefs of Staff. "These agencies are clearly seeking authority to receive a large amount of information, including personal information, from private Internet networks," says EPIC staff attorney Amie Stepanovich, who filed a lawsuit against Homeland Security in March 2012 seeking documents relating to the program under the Freedom of Information Act. "If this program was broadly deployed, it would raise serious questions about government cybersecurity practices." In January, the Department of Homeland Security's privacy office published a privacy analysis (PDF) of the program saying that users of the networks of companies participating in the program will see "an electronic login banner [saying] information and data on the network may be monitored or disclosed to third parties, and/or that the network users' communications on the network are not private."
  • ...2 more annotations...
  • Paul Rosenzweig, a former Homeland Security official and founder of Red Branch Consulting, compared the NSA and DOD asking the Justice Department for 2511 letters to the CIA asking the Justice Department for the so-called torture memos a decade ago. (They were written by Justice Department official John Yoo, who reached the controversial conclusion that waterboarding was not torture.) "If you think of it poorly, it's a CYA function," Rosenzweig says. "If you think well of it, it's an effort to secure advance authorization for an action that may not be clearly legal." A report (PDF) published last month by the Congressional Research Service, a non-partisan arm of Congress, says the executive branch likely does not have the legal authority to authorize more widespread monitoring of communications unless Congress rewrites the law. "Such an executive action would contravene current federal laws protecting electronic communications," the report says.
  • An internal Defense Department presentation cites as possible legal authority a classified presidential directive called NSPD 54 that President Bush signed in January 2008. Obama's own executive order , signed in February 2013, says Homeland Security must establish procedures to expand the data-sharing program "to all critical infrastructure sectors" by mid-June. Those are defined as any companies providing services that, if disrupted, would harm national economic security or "national public health or safety."
  •  
    Article is from April 2013, before the Snowden disclosures. 
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Microsoft to host data in Germany to evade US spying | Naked Security - 0 views

  • Microsoft's new plan to keep the US government's hands off its customers' data: Germany will be a safe harbor in the digital privacy storm. Microsoft on Wednesday announced that beginning in the second half of 2016, it will give foreign customers the option of keeping data in new European facilities that, at least in theory, should shield customers from US government surveillance. It will cost more, according to the Financial Times, though pricing details weren't forthcoming. Microsoft Cloud - including Azure, Office 365 and Dynamics CRM Online - will be hosted from new datacenters in the German regions of Magdeburg and Frankfurt am Main. Access to data will be controlled by what the company called a German data trustee: T-Systems, a subsidiary of the independent German company Deutsche Telekom. Without the permission of Deutsche Telekom or customers, Microsoft won't be able to get its hands on the data. If it does get permission, the trustee will still control and oversee Microsoft's access.
  • Microsoft CEO Satya Nadella dropped the word "trust" into the company's statement: Microsoft’s mission is to empower every person and every individual on the planet to achieve more. Our new datacenter regions in Germany, operated in partnership with Deutsche Telekom, will not only spur local innovation and growth, but offer customers choice and trust in how their data is handled and where it is stored.
  • On Tuesday, at the Future Decoded conference in London, Nadella also announced that Microsoft would, for the first time, be opening two UK datacenters next year. The company's also expanding its existing operations in Ireland and the Netherlands. Officially, none of this has anything to do with the long-drawn-out squabbling over the transatlantic Safe Harbor agreement, which the EU's highest court struck down last month, calling the agreement "invalid" because it didn't protect data from US surveillance. No, Nadella said, the new datacenters and expansions are all about giving local businesses and organizations "transformative technology they need to seize new global growth." But as Diginomica reports, Microsoft EVP of Cloud and Enterprise Scott Guthrie followed up his boss’s comments by saying that yes, the driver behind the new datacenters is to let customers keep data close: We can guarantee customers that their data will always stay in the UK. Being able to very concretely tell that story is something that I think will accelerate cloud adoption further in the UK.
  • ...2 more annotations...
  • Microsoft and T-Systems' lawyers may well think that storing customer data in a German trustee data center will protect it from the reach of US law, but for all we know, that could be wishful thinking. Forrester cloud computing analyst Paul Miller: To be sure, we must wait for the first legal challenge. And the appeal. And the counter-appeal. As with all new legal approaches, we don’t know it is watertight until it is challenged in court. Microsoft and T-Systems’ lawyers are very good and say it's watertight. But we can be sure opposition lawyers will look for all the holes. By keeping data offshore - particularly in Germany, which has strong data privacy laws - Microsoft could avoid the situation it's now facing with the US demanding access to customer emails stored on a Microsoft server in Dublin. The US has argued that Microsoft, as a US company, comes under US jurisdiction, regardless of where it keeps its data.
  • Running away to Germany isn't a groundbreaking move; other US cloud services providers have already pledged expansion of their EU presences, including Amazon's plan to open a UK datacenter in late 2016 that will offer what CTO Werner Vogels calls "strong data sovereignty to local users." Other big data operators that have followed suit: Salesforce, which has already opened datacenters in the UK and Germany and plans to open one in France next year, as well as new EU operations pledged for the new year by NetSuite and Box. Can Germany keep the US out of its datacenters? Can Ireland? Time, and court cases, will tell.
  •  
    The European Community's Court of Justice decision in the Safe Harbor case --- and Edward Snowden --- are now officially downgrading the U.S. as a cloud data center location. NSA is good business for Europeans looking to displace American cloud service providers, as evidenced by Microsoft's decision. The legal test is whether Microsoft has "possession, custody, or control" of the data. From the info given in the article, it seems that Microsoft has done its best to dodge that bullet by moving data centers to Germany and placing their data under the control of a European company. Do ownership of the hardware and profits from their rent mean that Microsoft still has "possession, custody, or control" of the data? The fine print of the agreement with Deutsche Telekom and the customer EULAs will get a thorough going over by the Dept. of Justice for evidence of Microsoft "control" of the data. That will be the crucial legal issue. The data centers in Germany may pass the test. But the notion that data centers in the UK can offer privacy is laughable; the UK's legal authority for GCHQ makes it even easier to get the data than the NSA can in the U.S.  It doesn't even require a court order. 
Paul Merrell

Britain Considers Pulling out of European Convention on Human Rights when Armed Forces ... - 0 views

  • Senior Whitehall figures are drawing up controversial plans to ensure that Britain’s armed forces will no longer be subject to legal claims by their enemies over human rights violations.Guaranteed to have Brits in Middle England choking on their morning croissants, Saturday’s claims from right-wing mouthpiece, The Telegraph, insisted that taxpayers are facing a bill of £150 million to defend British soldiers being sued by “enemy fighters” for breaching their human rights. The Telegraph claimed that over 2,000 compensation claims and judicial reviews are being prepared by lawyers in the aftermath of the wars in Afghanistan and Iraq as part of a growing litigation culture that is encroaching on the ability of the armed forces to do their jobs.So far, 500 judicial review applications have been lodged, with 1,200 claims for compensation against the Ministry of Defense for alleged abuse, unlawful detention, and unlawful killing in Iraq.Further, an estimated 800 compensation cases from Afghanistan could follow.
  • Defence secretary Michael Fallon is so dismayed at what he calls the “increasing encroachment of human rights law into the battlefield,” that he is determined to take steps to stem the tide of legal action.Some of the planned fightback by ministers should concern everyone:Pulling out of the European Convention: Ministers could declare a temporary withdrawal from the European Convention on Human Rights (ECHR) before sending British forces into action in future.Taking legal action against law firms that have brought “bogus” cases against the Armed Forces: This includes referring lawyers to legal watchdogs and bringing fraud prosecutions against firms found to have made false allegations.A time limit on legal action to stop compensation claims being made years after incidents occur: Further reforms would end legal aid for claimants who are living outside the U.K.Planned new laws would also allow the government to recover the costs of “bogus judicial reviews,”  but one proposal is the most worrying of all:
  • A new Bill of Rights: Michael Gove is working on a British Bill of Rights to replace the Human Rights Act, according to ministers. It will reportedly include safeguards for the Armed Forces to protect them from being sued.In contrast to Michael Fallon’s indignation, a report by Stop The War claims “The long history of British abuse and torture in Kenya, Malaya, Aden, Cyprus, Northern Ireland and Afghanistan cannot be explained as the work of a few ‘bad apples.’”.BottomResponsiveBanner{width:300px;height:250px}@media (min-width:420px){.BottomResponsiveBanner{width:336px;height:280px}}@media (min-width:1300px){.BottomResponsiveBanner{width:728px;height:90px}} The report lists abuses committed by British forces and also references the “loss of the moral compass evident in the behaviour of British forces in Iraq and Afghanistan.”Some might say that by scrapping the Human Rights Act, the government fears being challenged and wants to take away the public’s ability to contest decisions and policies. One thing is for sure: without it, the British government will be allowed to act with almost complete impunity.
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Paul Merrell

Edward Snowden asks for asylum in Ecuador: live updates | World news | guardian.co.uk - 0 views

  • The NSA whistleblower left Hong Kong on an Aeroflot flight to Moscow, two days after the US charged him with espionage, before applying for asylum in Ecuador
  • WikiLeaks has released a statement claiming that Snowden is "bound for Ecuador" and is awaiting the processing of his application for asylum:  Mr Edward Snowden, the American whistleblower who exposed evidence of a global surveillance regime conducted by US and UK intelligence agencies, has left Hong Kong legally. He is bound for the Republic of Ecuador via a safe route for the purposes of asylum, and is being escorted by diplomats and legal advisors from WikiLeaks. Mr Snowden requested that WikiLeaks use its legal expertise and experience to secure his safety. Once Mr Snowden arrives in Ecuador his request will be formally processed. Former Spanish Judge Mr Baltasar Garzon, legal director of Wikileaks and lawyer for Julian Assange has made the following statement: "The WikiLeaks legal team and I are interested in preserving Mr Snowden’s rights and protecting him as a person. What is being done to Mr Snowden and to Mr Julian Assange - for making or facilitating disclosures in the public interest - is an assault against the people".
  • It’s past midnight in Hong Kong and late evening in Moscow, so time for a summary of the events so far on a day of extraordinary drama: • Edward Snowden, the NSA contractor whose revelations to the Guardian about the scale and scope of US spying and hacking activities has prompted global headlines, has fled Hong Kong and is now in Moscow. • His plane arrived in Russia shortly after 5pm local time. Snowden is not believed to have a Russian visa and is thought to be staying overnight at a capsule hotel inside Moscow's Sheremetyevo airport after reportedly being met on the tarmac by diplomatic cars.
  • ...2 more annotations...
  • • Snowden was allowed to leave despite the US having filed a request for Hong Kong to arrest him. Hong Kong’s government said the documents sent by Washington did not fully meet legal requirements, the statement added, so Snowden was allowed to leave. It has since been reported that the US revoked Snowden’s passport on Saturday. It is not clear how he was allowed to leave Hong Kong if this happened. • Snowden is reportedly booked on a flight on Monday from Moscow to Havana, after which he is believed to be heading for another Latin American destination, reported variously as Venezuela or Ecuador. • The Ecuadorean ambassador to Russia is at the airport but said he had not met Snowden and was not entirely sure where he is.  • WikiLeaks has claimed in tweets it "assisted Mr Snowden's political asylum in a democratic country" and that its "legal advisers" are with him, including Sarah Harrison, a WikiLeaks staffer.
  • • There has been an angry reaction in the US to news of Snowden’s departure. Keith Alexander, head of the NSA, called Snowden “an individual who is not acting, in my opinion, with noble intent". • Snowden's departure came on the same day the South China Morning Post carried detailed reports of claims from him about US actions against China, including allegations of the hacking of phone text messages. China has said it is “gravely concerned” about the revelations. The country’s Xinhua news agency called the US “the biggest villain in our age" when it comes to hacking.
  •  
    My favorite part so far, NSA head Gen. Keith Alexander called Snowden "an individual who is not acting, in my opinion, with noble intent". Let's consider for a moment that as a U.S. Army officer, Gen. Alexander, initially and upon each promotion, was required to "solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic, that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservations or purpose of evasion; and that I will well and faithfully discharge the duties of the office upon which I am about to enter; So help me God."  http://www.army.mil/values/officers.html So what part of "support and defend the Constitution of the United States" is it that he didn't catch? U.S. military officers are required by law to disobey illegal commands. Can this man seriously believe that his mission does not violate the U.S. Constitution?  The Fourth and Fifth Amendments were direct reactions to the British Army's practice of invading Colonist's homes at will. destroying their privacy and seizing anything in sight including its residents, their papers, their personal effects, and their property without judicial warrant or due process and just compensation. But that is just what Gen. Alexander assists in. He is a usurper of our Constitution. But let's compare the courage of Edward Snowden and Keith Alexander: "Common experience shows how much rarer is moral courage than physical bravery.  A thousand men will march to the mouth of the cannon where one man will dare espouse an unpopular cause." - Clarence Darrow   "Few are willing to brave the disapproval of their fellows, the censure of the colleagues, the wrath of their society. Moral courage is a rarer commodity than bravery in battle or great intelligence. Yet it is the one essential, vital quality for those who seek to change a world that yields most painfully to change." -
Paul Merrell

Sanctuary Cities Have Upper Hand in Legal Battle Against Trump | News | teleSUR English - 0 views

  • As U.S. President Donald Trump ramps up his attack on immigration, his executive order to cut federal funding to so-called “sanctuary cities” protecting immigrants could face a number of legal and logistical loopholes.
  • The executive order signed on Wednesday orders federal agencies to withhold grant money from around 300 cities and counties that block local law enforcement from targeting undocumented immigrants, or as White House Press Secretary Sean Spice put it, “harbor illegal immigrants.” Spicer said that Trump will look at means to strip funding to cities and counties that “willfully refuse to comply” with his new plan to crack down on immigration, which also included ordering the construction of the infamous border wall between Mexico and the U.S. and increasing immigration authorities' power to deport people from the U.S., often without due process. These measures have sparked outrage among many immigrant rights organizations and caused city mayors to speak out against them. Opponents likely have the law on their side. Politico reported that the White House failed to consult the proper federal agencies and lawmakers before signing the executive orders. This means the orders are likely fraught with contradictions to current laws that can be easily exploited by opponents to dismantle them. The legal fight has already begun. Mayors of targeted cities are teaming up with immigration advocacy groups and attorneys to gear up for a legal battle against the presidential orders. Opponents of Trump’s order say that federal money allocated to cities can only be cut if the funding is directly linked to behavior that opposes the federal government’s plan for immigration.
  • Trump's plan to make police and other key services exempt from any funding cuts has also sparked legal debate. Trump had previously stated that even if a city was stripped of funding for non-compliance, police departments' funding would not be cut. Opponents also say that making police exempt would make it possible for a judge to deem parts of the order unconstitutional. Richard Doyle, city attorney in San Jose, California, argues that Trump cannot cut a city's funding for healthcare and education while protecting the police force from cuts because its function relates more closely to immigration enforcement, adding that it was uncertain whether only future or existing federal funding would be targeted under the order. Others have argued that there would be significant barriers and a long process for the federal government to cut off funding to sanctuary cities that would first have to go through states and local government where targeted jurisdictions have rights to appeal. Edward Waters from Feldesman Tucker Leifer Fidell in Washington told Reuters that for the Trump administration, “It’s fair to say that they don't understand the scope and reach of federal grants law.”
  • ...2 more annotations...
  • “The president has very limited power to exercise any kind of significant defunding,” Peter L. Markowitz from the Immigration Justice Clinic told The New York Times. Referring to a 2012 Supreme Court ruling, Markowitz argued that Congress cannot coerce states or localities to unwillfully participate in federal programs. “You can’t say ‘if you don’t use your police officers to go after unauthorized immigrants, you don’t get any money for your hospitals.’ They can’t impose conditions that are totally unrelated,” Markowitz said.
  • As U.S. President Donald Trump ramps up his attack on immigration, his executive order to cut federal funding to so-called “sanctuary cities” protecting immigrants could face a number of legal and logistical loopholes.
  •  
    Trump needs lawyers. He's screwing up right and left.
Paul Merrell

Court Grants Secrecy for Memo on Phone Data - NYTimes.com - 0 views

  • A federal appeals court on Friday ruled that the Obama administration may continue to withhold a Justice Department memo that apparently opened a loophole in laws protecting the privacy of consumer data.The memo establishes the legal basis for telephone companies to hand over customers’ calling records to the government without a subpoena or court order, even when there is no emergency, according to a 2010 report by the Justice Department’s inspector general. The details of the legal theory, and the circumstances in which it could be invoked, remain unclear. Related Coverage F.B.I. Made ‘Blanket’ Demands for Phone RecordsMARCH 13, 2008 F.B.I. Violated Rules in Obtaining Phone Records, Report SaysJAN. 20, 2010 C.I.A. Is Said to Pay AT&T for Call DataNOV. 7, 2013 The ruling, by the United States Court of Appeals for the District of Columbia Circuit, came down on the side of a broad conception of the executive branch’s power to keep secret its interpretation of what the law permits it to do. The ruling may make it easier for the government to shield other memos by the Justice Department’s powerful Office of Legal Counsel from disclosure under the Freedom of Information Act.
  • The document at issue is a classified memo issued by the Office of Legal Counsel on Jan. 8, 2010. A report later that year by the Justice Department’s inspector general at the time, Glenn A. Fine, disclosed the memo’s existence and its broad conclusion that telephone companies may voluntarily provide records to the government “without legal process or a qualifying emergency,” notwithstanding the Electronic Communications Privacy Act.
  • The F.B.I. had asked for the memo as part of an investigation by Mr. Fine into problems with the bureau’s use of so-called exigent letters to obtain telephone and financial records without following any legal procedures.
Paul Merrell

ICC Threats: Worst-Case Scenario for Israel and PA - Global Agenda - News - Arutz Sheva - 0 views

  • Abbas pledged to join the ICC and lodge charges against Israel there. On Wednesday evening he took the first step, signing the request along with applications to join 20 other international conventions during a meeting broadcast live on PA television, despite US criticism. Speaking to Arutz Sheva, Shurat Hadin legal center's director Nitsana Darshan-Leitner said that if Abbas follows through on his threats, the PA's case would likely center around alleged war crimes committed by the IDF during the past summer's war with Gazan terrorists, as well as "settlement-building" - a euphemism for any Jewish communities built in Judea, Samaria, and large parts of Jerusalem. The veteran attorney and legal campaigner warns that if such a case is launched the prospects for Israel are bleak. "Israel will of course try to defend itself, but chances are they will lose. And if they lose and they're convicted for war crimes, it would be a game-changer. It would drop Israel to the bottom tier internationally," she said.
  • The ICC has faced serious criticism over the years for only focusing on "third-world" countries, and particularly the African continent, (since its founding in 1998 all eight cases handled by the ICC have been in African states,) and there is heavy pressure for the court to also try a "western" or allied country as well to dispel those allegations. "They need to take a different type of case, and they would gladly take upon themselves the Arab-Israeli conflict... it's a more interesting and sexier issue to be involved with, and there is tremendous pressure from countries all over the world for the court to get involved." Despite that pressure, until now the ICC has been unable to get involved due to a lack of jurisdiction.
  • But could the move be a blessing in disguise, providing Israel with an opportunity to decisively knock down the many allegations against it in the international arena - including both the legality of "settlements" and alleged war crimes - once and for all? "No, this is a biased court," Darshan-Leitner answers bluntly. "Of course Israel will bring international legal experts and explain why the territories (Judea-Samaria) are only disputed, not occupied, and how Jordan never had a right to them in the first place, for example - but Europe, and many other countries, have a different perspective," and it's from that political perspective that the ICC will analyse the case. "Once Israel is charged with war crimes it's the 'end of the game' - that's why Israel should do whatever it can not to be charged." If found guilty, "Israel would have to extradite to the court those individuals or officials, IDF commanders, etc, who will be individually charged for war crimes. Israel will obviously refuse to do so - Israel is not insane, so it's not going to extradite its own people to be blamed for war crimes - and then as a result Israel will be sanctioned... then there will be a real boycott against Israel from the court's member states.
  • ...4 more annotations...
  • Speaking to Arutz Sheva, Shurat Hadin legal center's director Nitsana Darshan-Leitner said that if Abbas follows through on his threats, the PA's case would likely center around alleged war crimes committed by the IDF during the past summer's war with Gazan terrorists, as well as "settlement-building" - a euphemism for any Jewish communities built in Judea, Samaria, and large parts of Jerusalem. The veteran attorney and legal campaigner warns that if such a case is launched the prospects for Israel are bleak. "Israel will of course try to defend itself, but chances are they will lose. And if they lose and they're convicted for war crimes, it would be a game-changer. It would drop Israel to the bottom tier internationally," she said. Darshan-Leitner emphasizes that her pessimistic prediction is not borne out of a lack of confidence in Israel's legal position. On the contrary, she believes Israel can - and would - make a very strong defense case on either issue were it forced to do so. The problem, she says, is a political one.
  • "In addition, the court will issue arrest warrants against those individuals; Interpol will make it international and those people won't be able to leave the country - it will snowball." There is hope, however. If the ICC is Abbas's "doomsday weapon", Israel's hope lies in deterrence. "That's what were working on."
  • Indeed, Shurat HaDin has already threatened a "tsunami" of prosecutions if the PA chooses to file charges against Israel at the ICC. The NGO has already made good on its threats following unilateral actions by the PA in recent months, launching charges against Mahmoud Abbas himself as well as Hamas's Qatar-based terror chief Khaled Meshaal - both of whom are Jordanian citizens and thus already covered by the ICC's jurisdiction. Should the PA succeed in joining the Court, Shurat HaDin is already preparing a long list of other Palestinian leaders to target with a wide range of charges. "It could be crimes committed during the Intifada against Israelis - all the suicide bombings, all the drive-by shooting attacks. All the heads of the different armed factions have superior liability over what was done by their forces," Darshan-Leitner explains. "And there are also crimes committed against the Palestinian people themselves," from torture to public executions and the use of human shields, she adds. But won't the ICC just dismiss such cases for the same political reasons she cited?
  • "Nobody knows for sure - and that's why it's a deterrent for the Palestinians, because they don't know how the court will take these cases. I find it hard to believe though that the court would agree to prosecute Israel and not the Palestinians." But she cautions that, even though Palestinian leaders will also likely end up in the dock, it wouldn't undo the damage done to Israel. Short of coaxing the Palestinian Authority back to the negotiating table, the only way to stave off an ICC prosecution would be via a combination of threats of counter-prosecution, and concerted political pressure. "The US has threatened to cut all funding to the PA and even UNRWA if they go through with such a move, and obviously Israel will cut off all funding as well," she notes. "And the Palestinian Authority relies almost entirely on American and Israeli funding." The many vocal backers of the PA such as Arab states and the European Union have a poor track record of coughing up the goods, "so if that happens it will essentially collapse." With those considerations in mind, an ICC prosecution is Abbas's "weapon of last resort." And it appears the only real deterrent Israel currently holds in the threat of mutually-assured destruction.
  •  
    Note that according to a leaked U.S. State Dept. cable on Wikileaks, Ms. Darshan-Leitner confessed to officials of the U.S. Embassy that Shurat HaDin has "accepted direction" from the Israeli government and works closely with Mossad. https://cablegatesearch.wikileaks.org/cable.php?id=07TELAVIV2636
Paul Merrell

Former Vice President Dick Cheney Says CIA Torture Report Is 'Full of Crap' - ABC News - 0 views

  • "I think it is a terrible report, deeply flawed," Cheney said on Fox News, his first televised interview since the report's release. "It's a classic example of where politicians get together and throw professionals under the bus." Cheney said he had not read the entire 6,000-page classified document, drafted by Democrats and their staffs on the Senate Intelligence Committee, or the 500-page declassified and redacted executive summary. But he unequivocally said its findings were flawed and an affront to members of the CIA.
  • “The notion that the agency was operating on a rogue basis was just a flat out lie," Cheney said. He insisted the so-called enhanced interrogation techniques were all legally justified and inconsistent with "torture," though he conceded that the practice of "rectal rehydration" mentioned in the report, "was not one of the authorized or approved techniques." Cheney said he also rejects the allegation that his boss, President George W. Bush, was kept in the dark. “He was in fact an integral part of the program. He had to approve it before we moved forward with it,“ Cheney said. “He knew everything he needed to know and wanted to know about the program."
  • While the brutal and graphic descriptions of the techniques have dominated headlines and been labeled "torture" by President Obama, Cheney says critics have lost sight of the context. The former vice president said he's particularly bothered by criticism over the treatment of Khalid Sheilk Mohammad, the alleged mastermind of 9/11. “He is in our possession, we know he’s the architect [of the attacks], what are we supposed to do? Kiss him on both cheeks?“ Cheney said. “How nice do you want to be to the murderers of 3,000 people on 9/11?” Asked whether the ends justify the means when it comes to brutal interrogations, Cheney said, "absolutely.” “I’d do it again in a minute,” he said.
  •  
    A bunch of statements that Cheney and George W. Bush will regret if they are ever brought before a tribunal for their war crimes.  Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, Article 2: "2. No exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political instability or any other public emergency, may be invoked as a justification of torture. "3. An order from a superior officer or a public authority may not be invoked as a justification of torture." Article 4: "1. Each State Party shall ensure that all acts of torture are offences under its criminal law. The same shall apply to an attempt to commit torture and to an act by any person which constitutes complicity or participation in torture. 2. Each State Party shall make these offences punishable by appropriate penalties which take into account their grave nature." Article 6: "1. Upon being satisfied, after an examination of information available to it, that the circumstances so warrant, any State Party in whose territory a person alleged to have committed any offence referred to in article 4 is present shall take him into custody or take other legal measures to ensure his presence. The custody and other legal measures shall be as provided in the law of that State but may be continued only for such time as is necessary to enable any criminal or extradition proceedings to be instituted." Or in other words, every defense being raised to excuse the CIA torture is foreclosed by a treaty that through the Constitution's Treaty Clause is "the law of this land." The Obama Administration is legally compelled to prosecute.
Paul Merrell

Virginia state agency cancels Jerusalem trip citing Israeli discrimination | The Electr... - 0 views

  • The state agency that regulates the legal profession in Virginia has canceled a planned seminar in Jerusalem following objections over Israel’s discrimination against Americans of Palestinian, Arab and Muslim ancestry. “Certain members of the Virginia State Bar and other individuals have expressed objections to the VSB’s plan to take the Midyear Legal Seminar trip in November to Jerusalem,” Kevin E. Martingayle, the agency’s president, wrote in an email to members today. “It was stated that there are some unacceptable discriminatory policies and practices pertaining to border security that affect travelers to the nation.” “Upon review of US State Department advisories and other research, and after consultation with our leaders, it has been determined that there is enough legitimate concern to warrant cancellation of the Israel trip and exploration of alternative locations,” Martingayle said.
  • “Undoubtedly, this news will disappoint some VSB members,” Martingayle added, “But we are a state agency that strives for maximum inclusion and equality, and that explains this action.” Dozens of lawyers who are members of the VSB had signed an open letter detailing Israel’s discriminatory practices, citing reports from the US government and Amnesty International. The Electronic Intifada has also reported extensively on Israel’s discriminatory denial of entry and other forms of abuse and harassment of Palestinian Americans and other travelers.
  •  
    The practical result of this is that Israel will be off-limits for all bar association activities in the U.S., its territories, and possessions. Not even for the old Continuing Legal Education scam where a CLE session is held in a vacation resort, the lawyers show up, sign in, and skip all the classes.  Less obviously, this will bring Israel's discriminatory border regulation to the attention of virtually all lawyers in the U.S., which will likely seed many lawsuits against, e.g., non-essential U.S. government travel to Israel. It will also stiffen resistance to Congressional junkets to Israel, which are funded by Israel and Zionist organizations in the U.S. The last thing Israel's governing Zionists want is the U.S. legal profession all over them like white on rice. 
Paul Merrell

Chicago students get death threat over Palestine protest | The Electronic Intifada - 0 views

  • Students in Chicago received a death threat after taking part in a Palestine solidarity protest. Another student activist in Santa Barbara, California, was physically assaulted during an argument with an Israel supporter. These are just two of dozens of on-campus incidents reported across the United States over the last four weeks, according to Palestine Legal.
  • Five days later, one of the students received a threatening email message directed at Students for Justice in Palestine. The message stated: “If there is one more demonstration in the quad from your petty organization, consider it to be your real bodies falling next time. What you did was downright anti-Semitism. Don’t underestimate the Jewish presence on campus. #jewhater.”
  • Meanwhile, a member of SJP at the University of California at Santa Barbara was physically assaulted during a peaceful protest as part of the international day of action. Daniel Mogtaderi said he was filming the demonstration on his phone as a matter of protocol, so that SJP can document any harassment or violence it might encounter. A young man who appeared to be another student began arguing with Mogtaderi about the 13-year-old Palestinian boy who was accused of a stabbing attack and critically injured and taunted by Israeli settlers as he lay bleeding on the ground two weeks ago. The assailant became aggressive when he realized Mogtaderi was recording the encounter. “At that point he forcibly took hold of the phone, held on to the phone for some time, and shoved Mogtaderi two times before returning the phone and leaving the scene,” SJP stated. Mogtaderi’s video recording of the argument between himself and the assailant can be viewed here.
  • ...3 more annotations...
  • University spokesperson Bill Burton told The Electronic Intifada that the matter is under investigation and had no further comment. Saadeh said that although the death threat is frightening and is being taken seriously, SJP members will not stop organizing. “They’re not going to shut us up with this,” she said. She said that students have created ways to protect each other on campus, such as making sure members of SJP do not have to walk alone to class, or sit alone at the library.
  • Mogtaderi told The Electronic Intifada that when he filed a report, campus police blamed him for “escalating the situation” and claimed that he could have avoided being assaulted if he hadn’t argued with the assailant. He added that campus police insist they cannot find the assailant and have not contacted Mogtaderi for additional information. UC Santa Barbara told The Electronic Intifada that the matter is being investigated. “There are so many stories around the country [of attempts] to try and silence people as much as possible,” Mogtaderi said. “My voice won’t be silenced, nor will the voices of other SJPers.”
  • Palestine Legal stated last week that it has responded to more than 35 campus incidents over the last month. “The pattern persists: with a rise in activism comes a rise in suppression,” the group said. Flush with new injections of cash, Israel-aligned organizations are stepping up their efforts to smear and intimidate students involved in Palestine activism. Palestine Legal says it has responded to more than 300 incidents of “censorship, punishment, or other burdening of advocacy” reported by Palestine solidarity activists on more than 65 US campuses in the last 18 months. The legal group calls on university administrations to protect the speech rights and physical safety of students who speak out in favor of Palestinian rights.
Gary Edwards

CHILDREN KILLED OF KEVIN KRIM, CHIEF EXECUTIVE OF CNBC DIGITAL, AFTER RELEASING INFORMA... - 0 views

  •  
    Incredible article about the behind-the-scenes story of the nanny murder of two small children in NYC.   First, it's a staged murder meant to send a clear message to ALL media.  The children were the offspring of Kevin Krim, CEO of CNBC digital.  His website had published a story about the Spire Law Group suing an entire class of bigshot BANKSTERS for the theft of $43 TRILLION dollars of tax payer money.  Second, this involves the US Government.  The Spire allegation is that the Feds actively helped and assisted the Bankster theft. Third, the story describes the historical background of these Bankster hits, assassination and threats.  Although not covered in the article, Presidential assassinations in particular have an unmistakable link to Executive Orders that the Treasury print Silver Certificates that would compete against Bankster notes.  In one way or another, it's all about control of the money system.  This list of Presidents includes Jackson, Lincoln, Garfield, McKinley, Kennedy and Reagan. Original Press Release from the Spire Law Group:  ... http://goo.gl/ynV6O .... Wow! ................................... excerpt:: "On 10/25/2012 two corporate financial media bastions,  MarketWatch  (an affiliate of the Wall Street Journal) and CNBC, presented their readers with a bombshell.  In a too-good-to-be-true lawsuit, the top echelons of the USA's banking and civilian government had been sued for "racketeering and money laundering."  The suit requested "the return of $43 trillion to the United States Treasury."  Yes, you've read that right: 43 trillion-roughly 3 years worth of America's GDP or 3 times America's underestimate of its own national debt. The suit characterizes itself, according to these two corporate media tabloids, as the largest money laundering and racketeering lawsuit in United States History.  [It identifies] $43 trillion ($43,000,000,000,000.00) of laundered money by the 'Banksters' and their U.S. r
Gary Edwards

Applying Conservative Principles To Immigration | Marco Rubio @ RedState - 0 views

  •  
    Excellent explanation of Senator Rubio's Immigration plan. excerpts: First, we would modernize our legal immigration system. In essence, we create one that meets the needs this country has in this new century. For example, while I support our family-based system of immigration, we can no longer afford to have less than ten percent of our immigration based on skill and talent. We need a functional guest worker program so that, in times of low unemployment and rapid economic growth, our industries have the labor they need to continue growing. And we need an agricultural worker program that allows our growers to contract the seasonal and year round labor they need legally. Second, we need real enforcement mechanisms. An employment verification system is the key to this. We have the technology to implement such a system, so we just need to do it. Over 40 percent of our illegal immigrants entered legally and overstayed their visas. That's why we need to have a complete system of tracking the entry and exit of visitors, using the technologies available to us today. And we need to achieve control of our borders. This is not just an immigration issue; this is a national security and sovereignty issue. And it can be done. The southern border is actually divided into nine separate sectors. There has been progress made in some sectors and not enough on others. We need to establish the high probability of intercepting illegal crossings in each of these sectors in a timely and effective manner. And third, we have to deal with those who are here now without documents. I am not happy about the fact that we face this problem. But we do. Most of these are people who will be here for the rest of their lives with or without documents, so it is in our best interest to deal with them and to make sure this never happens again." "As I have clearly stated, I will not engage in a bidding war with the President to see who can come up with the fastest and cheapest path to citizenship. T
Gary Edwards

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
Paul Merrell

Facebook, Apple, Microsoft, Skype & Yahoo Hit With Prism Data Protection Complaints In ... - 0 views

  • The European data protection activists behind the Europe v Facebook (evf) campaign group, that has long been a thorn in Facebook’s side in Europe, have filed new complaints under regional data protection law targeting Facebook, Apple, Microsoft, Skype and Yahoo for their alleged collaboration with the NSA’s Prism data collection program. The student activist organisation is targeting the European subsidiaries of these five U.S. companies, arguing that their corporate structure means they fall fully under European privacy laws despite being U.S. headquartered companies. And yet, being as they are U.S. companies, they are required to comply with U.S. surveillance laws — putting them in the “tricky” situation of having to comply with potentially conflicting legal requirements. It’s that legal conflict evf is now probing.
  • Evf takes the view that the law needs clarifying — and it using these new data protection complaints as the vehicle to obtain clarification from the various regional data protection agencies. Facebook and Apple; Microsoft and Skype; and Yahoo have subsidiaries in Ireland, Luxembourg and Germany respectively. ”We want a clear statement by the authorities if a European company may simply give foreign intelligence agencies access to its customer data. If this turns out to be legal, then we might have to change the laws,” noted evf speaker, Max Schrems, in a statement. The key question, as evf sees it, is whether “mass transfer” of personal data from to a foreign intelligence agency is legal under European law.  ”Many journalists have asked us in recent weeks if PRISM is legal from a EU perspective. We have looked at that a little closer. The result was – after consulting with legal experts – that it is very likely illegal under EU data protection laws, because of the corporate structure of the companies,” added Schrems. Google and YouTube have not been included in this first round of evf complaints being as they have a different corporate structure that does not include European subsidiaries. However it notes they do have datacenters in European countries, which will give evf a route to filing Prism-related data protection complaints against both at a later date.
  • Writing in a press notice announcing its new action, evf added: If a European subsidiary sends user data to the American parent company, this is considered an “export” of personal data. Under EU law, an export of data is only allowed if the European subsidiary can ensure an “adequate level or protection” in the foreign country. After the recent disclosures on the “PRISM” program such trust in an “adequate level of protection” by the involved companies can hardly be upheld. There can in no way be an adequate level of protection if they cooperate with the NSA on the other end of the line. Right now an export of data to the US must be seen as illegal if the involved companies cannot disprove the reports on the PRISM program. According to evf, the subsidiaries being targeted by these complaints have “the burden of proof” — to either “credibly assure” that the Prism program is a hoax, or “explain how mass access by a foreign intelligence agency interplays with EU data protection laws”. Evf cites a 2006 case precedent involving payment processor SWIFT which had forwarded transaction details to U.S. authorities. In that case it says a group of EU data protection authorities decided that such a mass data transfer is illegal under EU law, leading to SWIFT to move European data to a server in Switzerland. The case also led to an agreement between the U.S. and the EU on the use of payment data to combat crime.
Gary Edwards

Is The US Finally Ready For Revolution? - Democratic Underground - 1 views

  •  
    Written in June of 2012, before the national elections, this commentary remains the ringing truth.  Maybe more Americans are ready to listen this fourth of July? ........................... "Is America Ready For Revolution? I have always strongly believed that it's not possible to be a good Christian without standing up against social injustice and government corruption in all its forms. As I take a look around me today I find a lot of things wrong with our country. In fact, I have been a proponent for radical change for several years now, and I have written and published 2 books on this very topic. Where shall I begin? In God-blessed America, the land of the free where everyone is an economic slave, our founding fathers' sacred idea of a government "of the people, by the people, for the people" has become but a cruel joke. Former president George W. Bush has notoriously called our Constitution - our supreme law of the land - "that (expletive) piece of paper". The federal government is currently spending at least $60 billion per month on military excursions in Afghanistan, the Middle East, and northern and western Africa - including operating between 800 and 1,000 foreign military bases all over the world. Our country's over-used flying drone aircraft kills hundreds daily overseas, many of whom are only innocent bystanders. Meanwhile here on the home front, one in seven people are on food stamps, and at any given time one in four American children are going hungry today. Our country spends more money incarcerating people than it does on education. What's up with that? Our political system is openly rigged against the best interests of the American people. A massive market mechanism is securely entrenched in our political system where political influence is openly bought and sold. Tens of thousands of highly-paid middlemen called "lobbyists" facilitate the legal transfer of billions between moneyed special interests and our so-called "representatives" i
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
‹ Previous 21 - 40 of 907 Next › Last »
Showing 20 items per page