Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged majority-rule

Rss Feed Group items tagged

Paul Merrell

Exit South Stream, enter Turk Stream - RT Op-Edge - 0 views

  • So the EU “defeated” Putin by forcing him to cancel the South Stream pipeline. Thus ruled Western corporate media. Nonsense. Facts on the ground spell otherwise. This “Pipelineistan” gambit will continue to send massive geopolitical shockwaves all across Eurasia for quite some time. In a nutshell, a few years ago Russia devised Nord Stream – fully operational – and South Stream – still a project – to bypass unreliable Ukraine as a gas transit nation. Now Russia devised a new deal with Turkey to bypass the “non-constructive” (Putin’s words) approach of the European Commission (EC). Background is essential to understand the current game. Five years ago I was following in detail Pipelineistan’s ultimate opera – the war between rival pipelines South Stream and Nabucco. Nabucco eventually became road kill. South Stream may eventually resurrect, but only if the EC comes to its senses (don’t bet on it.)
  • The 3,600 kilometer long South Stream should be in place by 2016, branching out to Austria and the Balkans/Italy. Gazprom owns 50 percent of it - along with Italy’s ENI (20 percent), French EDF (15 percent) and German Wintershall, a subsidiary of BASF (15 percent). As it stands these European energy majors are not exactly beaming – to say the least. For months Gazprom and the EC were haggling about a solution. But in the end Brussels predictably succumbed to its own. Russia still gets to build a pipeline under the Black Sea – but now redirected to Turkey and, crucially, pumping the same amount of gas South Stream would. Not to mention Russia gets to build a new LNG (liquefied natural gas) central hub in the Mediterranean. Thus Gazprom has not spent $5 billion in vain (finance, engineering costs). The redirection makes total business sense. Turkey is Gazprom’s second biggest customer after Germany. And much bigger than Bulgaria, Hungary, and Austria combined. Russia also advances a unified gas distribution network capable of delivering natural gas from anywhere in Russia to any hub alongside Russia’s borders.
  • And as if it was needed, Russia gets yet another graphic proof that its real growth market in the future is Asia, especially China – not a fearful, stagnated, austerity-devastated, politically paralyzed EU. The evolving Russia-China strategic partnership implies Russia as complementary to China, excelling in major infrastructure projects from building dams to laying out pipelines. This is business with a sharp geopolitical reach – not ideology-drenched politics.
  • ...5 more annotations...
  • Turkey also made a killing. It’s not only the deal with Gazprom; Moscow will build no less than Turkey’s entire nuclear industry, apart from increased soft power interaction (more trade and tourism). Most of all, Turkey is now increasingly on the verge of becoming a full member of the Shanghai Cooperation Organization (SCO); Moscow is actively lobbying for it. This means Turkey acceding to a privileged position as a major hub simultaneously in the Eurasian Economic Belt and of course the Chinese New Silk Road(s). The EU blocks Turkey? Turkey looks east. That’s Eurasian integration on the move. Washington has tried very hard to create a New Berlin Wall from the Baltics to the Black Sea to “isolate” Russia. Now comes yet another Putin judo/chess/go counterpunch – which the opponent never saw coming. And exactly across the Black Sea. A key Turkish strategic imperative is to configure itself as the indispensable energy crossroads from East to West – transiting everything from Iraqi oil to Caspian Sea gas. Oil from Azerbaijan already transits Turkey via the Bill Clinton/Zbig Brzezinski-propelled BTC (Baku-Tblisi-Ceyhan) pipeline. Turkey would also be the crossroads if a Trans-Caspian pipeline is ever built (slim chances as it stands), pumping natural gas from Turkmenistan to Azerbaijan, then transported to Turkey and finally Europe.
  • So what Putin’s judo/chess/go counterpunch accomplished with a single move is to have stupid EU sanctions once again hurt the EU. The German economy is already hurting badly because of lost Russia business. The EC brilliant “strategy” revolves around the EU’s so-called Third Energy Package, which requires that pipelines and the natural gas flowing inside them must be owned by separate companies. The target of this package has always been Gazprom – which owns pipelines in many Central and Eastern European nations. And the target within the target has always been South Stream.
  • Now it’s up to Bulgaria and Hungary – which, by the way, have always fought the EC “strategy” – to explain the fiasco to their own populations, and to keep pressing Brussels; after all they are bound to lose a fortune, not to mention get no gas, with South Stream out of the picture. So here’s the bottom line; Russia sells even more gas – to Turkey; and the EU, pressured by the US, is reduced to dancing like a bunch of headless chickens in dark Brussels corridors wondering what hit them. The Atlanticists are back to default mode – cooking up yet more sanctions while Russia is set to keep buying more and more gold.
  • This is not the endgame – far from it. In the near future, many variables will intersect. Ankara’s game may change – but that’s far from a given. President Erdogan – the Sultan of Constantinople – has certainly identified a rival Caliph, Ibrahim of ISIS/ISIL/Daesh fame, trying to steal his mojo. Thus the Sultan may flirt with mollifying his neo-Ottoman dreams and steer Turkey back to its previously ditched “zero problems with our neighbors” foreign policy doctrine. The House of Saud is like a camel in the Arctic. The House of Saud’s lethal game in Syria always boiled down to regime change so a Saudi-sponsored oil pipeline from Syria to Turkey might be built – dethroning the proposed, $10 billion Iran-Iraq-Syria “Islamic” pipeline. Now the Saudis see Russia about to supply all of Turkey’s energy needs – and then some. And “Assad must go” still won’t go.
  • US neo-cons are also sharpening their spears. As soon as early 2015 there may be a Ukrainian Freedom Act approved by the US Congress. Translation: Ukraine as a “major US non-NATO ally” which means, in practice, a NATO annexation. Next step; more turbo-charged neo-con provocation of Russia. A possible scenario is vassal/puppies such as Romania or Bulgaria – pressed by Washington – deciding to allow full access for NATO vessels into the Black Sea. Who cares this would violate the current Black Sea agreements that affect both Russia and Turkey? And then there’s a Rumsfeldian “known unknown”; how the weak Balkans will feel subordinated to the whims of Ankara. As much as Brussels keeps Greece, Bulgaria and Serbia in a strait jacket, in energy terms they will start depending on Turkey’s goodwill. For the moment, let’s appreciate the magnitude of the geopolitical shockwaves. There will be more, when we least expect them.
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Can the AEC be a success? - nsnbc international | nsnbc international - 0 views

  • After almost two decades of discussion, the ASEAN Economic Community (AEC) will be proclaimed on 31st December. The AEC is a potentially significant and competitive economic region, should it be allowed to develop according to the aspiration of being a “single market and production base, with free flow of services, investments, and labour, by the year 2020”.
  • The ASEAN region as a composite trading block has the third highest population at 634 million, after China and India. GDP per capita is rapidly rising. The AEC would be the 4th largest exporter after China, the EU, and the United States, with still very much scope for growth from Cambodia, Myanmar, the Philippines, and Vietnam from a diverse range of activities ranging from agriculture, food, minerals and commodities, electronics, and services. The coming AEC is already the 4th largest importer of goods after the United States, EU, and China, making it one of the biggest markets in the world. Unlike the other trade regions, the AEC still has so much potential for growth with rising population, rising incomes, growing consumer sophistication, and improving infrastructure. Perhaps the biggest benefit of the upcoming AEC is the expected boost this will give to intra-ASEAN trade. Most ASEAN nations have previously put their efforts into developing external relationships with the major trading nations like the EU, Japan and the US through bilateral and free trade agreements. To some extent, the potential of intra-ASEAN trade was neglected, perhaps with the exception of the entrepot of Singapore. The AEC is an opportunity to refocus trade efforts within the region, especially when Vietnam, Cambodia, Indonesia are rapidly developing, and Myanmar is opening up for business with the rest of the region.
  • There are no integrated banking structures, no agreement on common and acceptable currencies (some ASEAN currencies are not interchangeable), no double taxation agreements, and no formal agreements on immigration. There is not even any such thing as a common ASEAN business visa. These issues are going to hinder market access for regional SMEs. Any local market operations will have to fulfil local laws and regulations which may not be easy for non-citizens to meet and adhere to. Even though there are some preferential tariffs for a number of classes of ASEAN originating goods, non-tariff barriers are still in existence, which are insurmountable in some cases like the need for import licenses (APs) in Malaysia, and the need to have a registered company which can only be formed by Thai nationals within Thailand. Some of these problems are occurring because of the very nature of ASEAN itself. ASEAN was founded on the basis of consultation, consensus, and non-interference in the internal affairs of other members. This means that no formal problem solving mechanism exists, and the ASEAN Secretariat is a facilitator rather than implementer of policy. Illegal workers, human trafficking, money laundering, and haze issues between member states have no formal mechanisms through which these issues can be solved from an ASEAN perspective. This weakens the force for regional integration.
  • ...2 more annotations...
  • However the necessary infrastructure to support intra-ASEAN trade growth is lagging behind with a delay in the completion of the Trans-Asia Highway in Cambodia, and vastly inadequate border checkpoints between Malaysia and Thailand in Sadao and Kelantan. Some infrastructure development projects have been severely hit by finance shortfalls within member states. There are a number of outstanding issues concerning the growth and development of the AEC. The ASEAN Secretariat based in Jakarta has a small staff, where the best talent is lacking due to the small salaries paid. The Secretariat unlike the EU bureaucratic apparatus in Brussels relies on cooperation between the member state governments for policy direction, funding and implementation of the AEC. Thus the frontline of AEC implementation are the individual country ministries, which presents many problems, as some issues require multi-ministry cooperation and coordination, which is not always easy to achieve as particular ministries have their own visions and agendas. Getting cooperation of these ministries isn’t easy. There are numerous structural and procedural issues yet to be contended with. At the inter-governmental level, laws and regulations are yet to be coordinated and harmonized. So in-effect there is one community with 10 sets of regulations in effect this coming January 1st. Consumer laws, intellectual property rights, company and corporate codes (no provision for ASEAN owned companies), land codes, and investment rules are all different among the individual member states.
  • One of the major issues weakening the potential development of the AEC is the apparent lack of political commitment for a common market by the leadership of the respective ASEAN members. Thailand is currently in a struggle to determine how the country should be governed. Malaysia is in the grip of corruption scandals where the prime minister is holding onto power. Myanmar is going through a massive change in the way it will be governed. Indonesia is still struggling with how its archipelago should be governed. There is a view from Vietnam that business within the country is not ready for the AEC. Intense nationalistic sentiments among for example Thais, exasperated by the recent Preach Vihear Temple conflict along the Thai-Cambodian border need to be softened to get full advantage out of the AEC. The dispute in the International Court of Justice over Pedra Branca, and the Philippine rift with China over the South China Sea show the delicacy of relationships among ASEAN members. The recent Thai court decision on the guilt of Zaw Lin and Win Zaw Tun in the murder of two young British tourists may also show how fragile intra-ASEAN relationships can be. The AEC is going to fall far short of achieving its full potential of becoming a major influence in global trade. The AEC is not intended to be the same model as the EEC. The AEC is far from being any fully integrated economic community. The lack of social, cultural, and political integration within the ASEAN region indicates the massive job ahead that Europe had been through decades ago. There is still a lot of public ignorance about what the AEC is, and lack of excitement or expectation for what should be a major event within the region. Respective national media are scant on information about the forthcoming launch of the AEC.
Gary Edwards

Why GOP Bigwigs Fear Trump - Consortiumnews - 0 views

  • An even bigger disjunction represented by the Republican Party is between the economic interests of a wealthy elite and the fears, xenophobia, and social-issue fixations of the hoi polloi whose votes the elite relies on to put its preferred economic policies in place. Not only is there no logical, substantive connection between these two aspects of what has come to be the Republican agenda; the economic policies are contrary to the interests of most of the ordinary citizens who are casting the votes.
  • The basic divide underlying this part of the Republican disjunction is between the one percent that provides the money to political candidates and that portion of the 99 percent that is the target of the campaigns that this money finances and who have been voting for those candidates.
  •  
    "A desperate Republican establishment is going all out to stop Donald Trump who has rallied the GOP "base" that the bigwigs have long manipulated and sold out, explains ex-CIA analyst Paul R. Pillar. By Paul R. Pillar The Donald Trump phenomenon and the suddenly frantic efforts within the Republican Party to try to stop Trump have led some observers to believe American politics are at a major inflection point, one where a familiar line-up of political parties and their backers could be substantially revised. Even some commentators who generally support the Republican Party are talking seriously about the possibility of the party breaking up. There is some valid basis for such talk, given that this party has come to embrace positions and interests that have no business sticking together. The political coalition has more or less worked, but it has not rested on substantive logic. So a destabilizing iconoclast with just enough political cleverness, as Trump has, can expose the artificiality of it rather easily. Republican presidential candidate Donald Trump. Foreign policy is not the main front on which the exposure is taking place, but it may be among the first places where exposure becomes too obvious to ignore. Neoconservatives, whose realization of their earlier plans, culminating in the launching of a major offensive war in the Middle East, was made possible by infiltrating the foreign policy of a Republican administration, already are looking for a new home. That process may accelerate if Marco Rubio loses the Florida primary. The fragility of this part of what has been the Republican coalition is demonstrated by how little Trump has had to do to cause the neoconservative alarm bells to sound. He has not even advanced a coherent alternative foreign policy to shoot down. All he has done is to stray slightly from neoconservative orthodoxy: pointing out that the Iraq War was a big mistake and - even though Trump declares himself to be a strong supporte
Paul Merrell

One Map That Explains the Dangerous Saudi-Iranian Conflict - 0 views

  • The Kingdom of Saudi Arabia executed Shiite Muslim cleric Nimr al-Nimr on Saturday. Hours later, Iranian protestors set fire to the Saudi embassy in Tehran. On Sunday, the Saudi government, which considers itself the guardian of Sunni Islam, cut diplomatic ties with Iran, which is a Shiite Muslim theocracy. To explain what’s going on, the New York Times provided a primer on the difference between Sunni and Shiite Islam, informing us that “a schism emerged after the death of the Prophet Muhammad in 632” — i.e., 1,383 years ago. But to the degree that the current crisis has anything to do with religion, it’s much less about whether Abu Bakr or Ali was Muhammad’s rightful successor and much more about who’s going to control something more concrete right now: oil.
  • In fact, much of the conflict can be explained by a fascinating map created by M.R. Izady, a cartographer and adjunct master professor at the U.S. Air Force Special Operations School/Joint Special Operations University in Florida. What the map shows is that, due to a peculiar correlation of religious history and anaerobic decomposition of plankton, almost all the Persian Gulf’s fossil fuels are located underneath Shiites. This is true even in Sunni Saudi Arabia, where the major oil fields are in the Eastern Province, which has a majority Shiite population. As a result, one of the Saudi royal family’s deepest fears is that one day Saudi Shiites will secede, with their oil, and ally with Shiite Iran.
  • This fear has only grown since the 2003 U.S. invasion of Iraq overturned Saddam Hussein’s minority Sunni regime, and empowered the pro-Iranian Shiite majority. Nimr himself said in 2009 that Saudi Shiites would call for secession if the Saudi government didn’t improve its treatment of them.
  • ...2 more annotations...
  • As Izady’s map so strikingly demonstrates, essentially all of the Saudi oil wealth is located in a small sliver of its territory whose occupants are predominantly Shiite. (Nimr, for instance, lived in Awamiyya, in the heart of the Saudi oil region just northwest of Bahrain.) If this section of eastern Saudi Arabia were to break away, the Saudi royals would just be some broke 80-year-olds with nothing left but a lot of beard dye and Viagra prescriptions. Nimr’s execution can be partly explained by the Saudis’ desperation to stamp out any sign of independent thinking among the country’s Shiites. The same tension explains why Saudi Arabia helped Bahrain, an oil-rich, majority-Shiite country ruled by a Sunni monarchy, crush its version of the Arab Spring in 2011. Similar calculations were behind George H.W. Bush’s decision to stand by while Saddam Hussein used chemical weapons in 1991 to put down an insurrection by Iraqi Shiites at the end of the Gulf War. As New York Times columnist Thomas Friedman explained at the time, Saddam had “held Iraq together, much to the satisfaction of the American allies Turkey and Saudi Arabia.”
  • Of course, it’s too simple to say that everything happening between Saudis and Iranians can be traced back to oil. Disdain and even hate for Shiites seem to be part of the DNA of Saudi Arabia’s peculiarly sectarian and belligerent version of Islam. In 1802, 136 years before oil was discovered in Saudi Arabia, the ideological predecessors to the modern Saudi state sacked Karbala, a city now in present-day Iraq and holy to Shiites. The attackers massacred thousands and plundered the tomb of Husayn ibn Ali, one of the most important figures in Shiite Islam. Without fossil fuels, however, this sectarianism toward Shiites would likely be less intense today. And it would definitely be less well-financed. Winston Churchill once described Iran’s oil – which the U.K. was busy stealing at the time — as “a prize from fairyland far beyond our brightest hopes.” Churchill was right, but didn’t realize that this was the kind of fairytale whose treasures carry a terrible curse.
  •  
    A very interesting map, indeed. It explains a lot the situation in the Mideast. And if Pepe Escobar is right about the U.S. moving to reduce its dependency on Saudi oil with a corresponding tilt toward Iran, the map tells a lot about why the U.S. would do so. But to make it work, I can't see the U.S. pulling it off unless a deal is cut with Iran for it to step into the Saudi's shoes in maintaining the petrodollar, i.e., Iran would have to insist on being paid in U.S. dollars for all of its oil and gas. Was a side deal made to that effect during the negotiations over Iran's nuclear energy development program? If so, that's bad news for the Saudis and for its new ally, the right-wing government of Israel, which has ambitions to be dominant military *and* economic power in the Mideast and to extend its borders from the Nile River in Egypt to the Euphrates River in Iraq and east across the Arabian Peninsula. But what Israel cannot bring to the table is large oil and gas reserves. Iran can.  
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Paul Merrell

Turkey's HDP to Boycott Vote on Constitutional "Reform" With Opposition Behind Bars - n... - 0 views

  • Turkey’s leftist HDP announced that the party will boycott a parliamentary vote on constitutional change that would introduce an executive presidential system in the country. Turkey’s CHP also opposes the constitutional change.
  • If adopted by parliament, an executive presidential system will gradually be introduced in Turkey. The constitutional change proposed by Turkey’s Islamist, governing AKP and supported by the MHP, would concentrate political power in the hands of the presidency. Moreover, it would turn parliament into a virtually powerless “rubbe stamp” institution comparable to the parliament in the Islamic Republic of Iran. On Tuesday parliament voted to press on with the debate about a constitutional reform package. The initial vote, seen as an early indicator of support for the bill, was passed with 338 votes. However, the result also showed that some MPs from the ruling AKP and the nationalist opposition MHP, had not voted in favor. Ayhan Bilgen, MP and spokesman for the Peoples’ Democratic Party (HDP), said on Twitter late Monday: “We will not use our vote for this illegitimate reform while our deputies are unjustly under arrest and prevented from carrying out their duties.”  Eleven HDP MPs are currently in prison for alleged links to the Kurdistan Workers’ Party (PKK), which is listed as a “terrorist” organisation by Turkey, the US and the EU. On Monday Turkey’s parliament began debating the draft for the new constitution. A final vote is expected within two weeks.  If the draft is approved by parliament, a referendum is expected to take place within 60 days, indicating a date in late March or early April.
  • Selahattin Demirtas, one of the HDP’s co-leaders, on Monday criticized the debates from behind bars. Demirtas said “the arrest of 11 members of the party had stripped them of their chance to challenge the draft constitution and “makes the debate and the vote controversial from the very start”. On November 4, 2016, 12 Kurdish HDP MPs, including the two co-leaders, Selahattin Demirtas and Figen Yüksekdag, were arrested on charges of links to the PKK. They deny the charges. The HDP drew unwanted attention from Turkey’s ruling AKP and “security services” after it criticized the AKP government for unilaterally ending the ceasefire and peace talks with the PKK in 2015. In May 2016, parliament voted to strip lawmakers of their legal immunity, paving the way for the HDP legislators’ arrests. The HDP was increasingly targeted after the “failed” military coup on July 15,  2016, even though the coup was blamed on Gülenists. Thousands of officials from the HDP have been detained since 2015. Turkey detained over 200 HDP members in December 2016. The AKP needs more than 330 votes a three fifths majority for the bill to be submitted to a referendum for voters’ approval. The opposition CHP also opposes the introduction of a presidential system, although it won’t boycott the vote. The launch of the talks prompted protests, despite the fact that the country still is governed by emergency laws introduced on July 20, 2016, after the “failed” military coup on July 15. Others stress that the introduction of the executive presidential system render the parliament virtually powerless and transforms it into a “rubber stamp assembly” comparable to the parliament in the Islamic Republic of Iran.
  • ...2 more annotations...
  • While most journalists have been too intimidated to report details, and media have largely been put under State control, it has transpired that police has dispersed non-violent protests throughout the country. In some cases police used disproportionate violence and water cannons. “The heads of 100 nongovernmental organizations wanted to come and make statements here (in front of the parliament). But now you see, parliament is under blockade, the roads are closed, there is a TOMA (a water cannon vehicle). We are under siege,” said Aykut Erdogdu, a lawmaker of the Republican people’s Party – CHP. He added: “It is very wrong to block parliament on the eve of such an important constitutional change that will be discussed in parliament.” Erdogdu stressed that the CHP’s parliamentary group will attempt to prolong and if possible stall the “constitutional reform” by issuing proposals and non-confidence motions in order to emphasize their opposition. CHP Deputy Group Chair Özgür Özel, for his part, told the press: “We think that the longer this process is going to be, the more useful it will be, the more likely these mistakes will be realized, and the constitutional proposal will be completely withdrawn.” He added that the discussions which prolonged the process in the parliamentary commission were fruitful in that they created awareness about the importance of the amendment. “We will give speeches on the entire constitutional amendment and then on each item. In addition, we may also propose that the material be removed from the text because it is contrary to the constitution,” Özel added. The governing, Islamist AKP Group’s Deputy Chairperson Mustafa Elitaş, for his part, criticized the CHP’s plan to suggest it would appeal the amendments on the grounds that they are anti-constitutional. He noted that: “The parliamentary spokesperson should not issue that contradiction to the constitution proposal because after the constitution has changed, it will become the material of the constitution”.
  • Semih Yalçın, the MHP deputy leader, also opposed the CHP’s criticism that the amendment would pave the way for a federal system and ultimately the division of the country. Yalçın noted in a written statement that with the efforts of the MHP, the unitary character of the country had been protected and that all the possibilities that would lead to a regime change or division had been eliminated. The AKP and Nationalist Movement Party (MHP) block is making a special effort to prevent any defections from their parties in an effort to reach the 330 votes needed to bring the constitution to the referendum. The total number of votes of the two parties reaches 355, but seven lawmakers from the MHP have already publicly declared their opposition to the package. On Monday Filiz Kerestecioğlu, the Peoples Democracy Party (HDP) Group’s Deputy Chairperson, stressed that the HDP would say “no” to the constitution, adding that the HDP would try to make sure that the lawmakers vote in a secret ballot, despite pressures from the ruling party. He added: “We believe that some lawmakers who have the possibility to say ‘no’ will be pressured by other lawmakers; the government will use man-to-man marking.” The HDP now decided to boycott the vote.
Paul Merrell

U.S. judges limit Trump immigration order; some officials ignore rulings | Reuters - 0 views

  • U.S. judges in at least five states blocked federal authorities from enforcing President Donald Trump's executive order restricting immigration from seven Muslim-majority countries.However, lawyers representing people covered by the order said some authorities were unwilling on Sunday to follow the judges' rulings.Judges in California, Massachusetts, Virginia and Washington state, each home to international airports, issued their rulings after a similar order was issued on Saturday night by U.S. District Judge Ann Donnelly in New York's Brooklyn borough.
Paul Merrell

The US government doesn't want you to know the cops are tracking you | Trevor Timm | Co... - 0 views

  • All across America, from Florida to Colorado and back again, the country's increasingly militarized local police forces are using a secretive technology to vacuum up cellphone data from entire neighborhoods – including from people inside their own homes – almost always without a warrant. This week, numerous investigations by major news agencies revealed the US government is now taking unbelievable measures to make sure you never find out about it. But a landmark court ruling for privacy could soon force the cops to stop, even as the Obama administration fights to keep its latest tool for mass surveillance a secret.So-called International Mobile Subscriber Identity (IMSI) catchers – more often called their popular brand name, "Stingray" – have long been the talk of the civil liberties crowd, for the indiscriminate and invasive way these roving devices conduct surveillance. Essentially, Stingrays act as fake cellphone towers (usually mounted in a mobile police truck) that police can point toward any given area and force every phone in the area to connect to it. So even if you're not making a call, police can find out who you've been calling, and for how long, as well as your precise location. As Nathan Freed Wessler of the ACLU explained on Thursday, "In one Florida case, a police officer explained in court that he 'quite literally stood in front of every door and window' with his stingray to track the phones inside a large apartment complex."
  • Yet these mass surveillance devices have largely stayed out of the public eye, thanks to the federal government and local police refusing to disclose they're using them in the first place – sometimes, shockingly, even to judges. As the Associated Press reported this week, the Obama administration has been telling local cops to keep information on Stingrays secret from members of the news media, even when it seems like local public records laws would mandate their disclosure. The AP noted:Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • Some of the government's tactics to hide Stingray from journalists and the public have been downright disturbing. After the ACLU had filed a records request for information on Stingrays, the local police force initially told them that, yes, they had the documents and to come on down to the station to look at them. But just before an ACLU rep was due to arrive, US Marshals seized the records and hid them away at another location, in what Wessler describes as "a blatant violation of state open-records laws".The federal government has used various other tactics around the country to prevent disclosure of similar information.USA Today also published a significant nationwide investigation about the Stingray problem, as well as what are known as "cellphone tower dumps". When police agencies don't have Stingrays at their disposal, they can go to cell phone providers to get the cellphone location information of everyone who has connected to a specific cell tower (which inevitably includes thousands of innocent people). The paper's John Kelly reported that one Colorado case shows cellphone tower dumps got police "'cellular telephone numbers, including the date, time and duration of any calls,' as well as numbers and location data for all phones that connected to the towers searched, whether calls were being made or not."
  • ...3 more annotations...
  • It's scary enough to think that the NSA is collecting so much information, but this mass location and metadata tracking at the local level all may be about to change. This week, the ACLU won a historic victory in the 11th Circuit Court of Appeals (serving Florida, Alabama and Georgia), which ruled that police need to get a warrant from a judge before extracting from your cellphone the location data obtained by way of a cell tower. This ruling will apply whether cops are going after one person, the whole tower and, one can assume, Stingrays. (The case was also argued by the aforementioned Wessler, who clearly is this month’s civil liberties Most Valuable Player.)This case has huge implications, and not just for the Stingrays secretly being used in Florida. It virtually guarantees the US supreme court will soon have to tackle the larger cellphone location question in some form – and whether police across the country have to finally start getting a warrant to find out where your precise location for days or weeks at a time. But as Stanford law professor Jennifer Granick wrote on Friday, it could also have an impact on NSA spying, which relies on the theory that indiscriminately collecting metadata is fair game until a court says otherwise.
  • You may be asking: how, exactly, are the local cops getting their hands on such advanced military technology? Well, the feds are, in many cases, giving away the technology for free. When the US government is not loaning police agencies their own Stingrays, the Defense Department and Homeland Security are giving federal grants to cops, which allow departments to purchase the gear at the cost of $400,000 a pop from defense contractors like Harris Corporation, which makes the Stingray brand.
  • Like Stingrays, and the NSA's phone dragnet before them, the militarization of America's local cops is a phenomenon that's only now getting widespread attention. As journalist Radley Balko, who wrote a seminal book on the subject two years ago, said this week, the Obama administration could easily limit these tactics to "cases of legitimate national security" – but has clearly chosen not to.No matter how much President Obama talks about how he has "maintained a healthy skepticism toward our surveillance programs", it seems the Most Transparent Administration in American History™ remains much more interested in maintaining a healthy, top-secret surveillance state.
Paul Merrell

The Strange Case of the Forgotten Gitmo Detainee - Raymond Bonner - POLITICO Magazine - 0 views

  • ince being seized in a raid in Pakistan in 2002, Abu Zubaydah has had his life controlled by American officials, first at secret sites where he was tortured, and since 2006 in a small cell in Guantanamo Bay, Cuba. And, thanks to one of the strangest—and perhaps most troubling—legal cases to grow out of the War on Terror, it appears he’s not going to be leaving anytime soon, which was exactly what the CIA always intended. Today, not even his lawyers understand what’s transpired behind closed doors in a Washington, D.C., courtroom. In June 2008, the Supreme Court ruled that detainees at Guantanamo had the right to challenge their imprisonment in federal court and that their cases should be handled “promptly” by the judicial system. The next month, lawyers for Abu Zubaydah, a detainee whose torture and waterboarding in secret prisons was among the most notorious of the Bush years, filed a lawsuit in federal court challenging his detention. The progress of that case has been anything but prompt. While more than 100 Guantanamo detainees have been released since then, and the military tribunals of even more high-profile detainees like 9/11 mastermind Khalid Sheikh Mohammed are moving forward in Guantanamo’s courtrooms, the federal judge hearing Zubaydah’s case has failed to rule on even the preliminary motions.
  • The seemingly intentional inaction has left even experienced court observers baffled. Richard W. Roberts, the U.S. District Court judge handling the suit, is not a particularly slow-moving jurist. His median time for resolving entire cases is slightly over two years; Zubaydah’s case has already been pending 6 years 9 months and 13 days. Because almost the entire file has been kept secret, it’s not possible to know why Roberts, who is the chief judge of the D.C. circuit, has let Zubaydah’s case languish. But this much is clear: Keeping Zubaydah from telling his story is exactly what the CIA wanted from the moment it began to torture him. And it’s exactly what they promised they’d do in 2002 during one of the darkest chapters of the War on Terror. Abu Zubaydah was one of the first al Qaeda suspects to face the harsh new regime implemented by the CIA following 9/11—a regime that FBI agents at the scene tried to prevent.
  • Soon after the agency’s contractors began their program of “enhanced interrogation” at the secret black site in Thailand—placing him in a coffin-size box, slamming him against wall, depriving him of sleep, bombarding him with loud music, as well as waterboarding—they sent an encrypted cable to Washington. The CIA interrogators said that if Zubaydah died during questioning, his body would be cremated. And if he survived the ordeal, the interrogators wanted assurances that he would “remain in isolation and incommunicado for the remainder of his life.” Senior officials gave the assurances. Zubaydah, a Saudi citizen, “will never be placed in a situation where he has any significant contact with others and/or has the opportunity to be released,” the head of the CIA’s ALEC Station, the code name of the Washington-based unit hunting Osama bin Laden, replied. “All major players are in concurrence,” the cable said, that he “should remain incommunicado for the remainder of his life.”
  • ...1 more annotation...
  • The decision to hold Zubaydah “incommunicado” was disclosed by the Senate report on torture, which was released last December. But the judicial inaction on his case has received virtually no public attention. In all, Roberts has failed to rule on 16 motions, 13 of which have been filed by Zubaydah’s lawyers. Several of those allege misconduct by the government.
  •  
    There's an old saying in the Anglo legal tradition, "justice delayed is justice denied." To delay a habeas corpus proceeding is the antithesis of what that writ is all about; promptly freeing those unlawfully held. 
Paul Merrell

Luxembourg: a tax haven by any other name? | nsnbc international - 0 views

  • The revelations that global and multinational businesses have been brokering “secret” tax deals with Luxembourg to avoid paying taxes in their home countries, may be the first time an entire country has been implicated in tax avoidance collusion. A cache of leaked agreements uncovered by the International Consortium of Investigative Journalism (ICIJ) appears to show that major companies have used the tiny EU state to dramatically cut their tax liabilities.
  • The ICIJ’s six-month investigation claims to have found household companies such as Aviva, HSBC, E-on, Tyco, Pepsi, IKEA and Deutsche Bank were among those which had taken advantage of legal tax avoidance schemes in Luxembourg. Luxembourg is routinely named as a tax haven on many of the world’s authoritative lists of tax havens, including the one compiled by me and my two co-authors, Richard Murphy and Christian Chavagneux. But Luxembourg has managed to remain “under the radar” not least because its politicians and bankers have been denying for years that it is, or ever was, a tax haven. The revelations suggest Luxembourg has been playing a double game. Luxembourg has been quick to comply with new regulations proposed by the Organisation for Economic Co-operation and Development (OECD) and the EU. In 2011, the OECD global forum on transparency and exchange of information commended Luxembourg for introducing new rules governing banking information or information protected by secrecy rules.
  • But at the same time, the revelations show that 340 well-known foreign companies have entered into secret agreements with the Luxembourg authorities, brokered by the accounting firm PricewaterhouseCoopers. To take a random example that applies for many of these companies, the ICIJ have a letter to the Luxembourg tax administration written on a PwC letterhead, where FedEx lays down its plan to set up a limited liability company as a tax resident in Luxembourg – so subject in principle to Luxembourg’s corporate income tax. The letter then provides details of a proposed shareholding arrangement that will ensure, I quote, that “neither that Fedex SCS nor its shareholders will be subject to corporate income tax, Municipal Business Tax and Net Wealth tax in Luxembourg”. The letter implies that Luxembourg will serve in effect as a tax haven for Fedex.
  • ...2 more annotations...
  • There have been a number of other highly publicised tax evasion and avoidance cases recently. For instance, many cases in the US involved branches or even key individuals working in branches of well-known Swiss and Israeli banks in the US, including UBS, Credit Swiss or Bank Leumi, or alternatively branches of American banks in Switzerland. But these tended to involve private firms. The Swiss government professed to have had no knowledge of such activities. Indeed, Swiss law prohibited Swiss banks, whether domestic or international, from providing any information on their clients to the Swiss state. This is a scandal with a difference. The leaked PricewaterhouseCoopers books imply there has been systemic collusion between companies from all over the world and the Luxembourg authorities in flagrant contravention of EU rules. The documents suggest that preferential tax treatments were guaranteed to these companies prior to their incorporation in Luxembourg.
  • This is the first case of suspected collusion between a government and a foreign firm in tax avoidance matters that I am aware of. In that sense, the current scandal places Luxembourg on par with Greece whose officials allegedly provided misleading data on Greek national debt to the Commission. More embarrassingly, all this took place during the time when the current president of the European Commission, Jean-Claude Juncker, served as the prime minister of Luxembourg from 1995-2013. It is difficult to imagine that the prime minister of such a small state was unaware such deals were taking place. There is a difference between the court of law and the court of public opinion. But we know from recent cases that the EU Commission has tended to follow the court of public opinion with criminal investigations of its own, as was the case of Amazon. It is likely that the Commission will now investigate these leaks and may impose fines on Luxembourg. I doubt Juncker can ride this one out.
  •  
    Woo-hoo! The IRS and Congress will be interested in this one too.  Now if someone would kindly send the docs to Wikileaks, the nations of the world can prosecute companies for tax evasion. But this time, would you all, pretty please, prosecute some human beings too and no settlements without at least a couple of years behind bars?
Paul Merrell

Yellowstone Oil Spills Expose Threat to Pipelines Under Rivers Nationwide | Inside Clim... - 0 views

  • At the time the Poplar pipeline ruptured, about 110 feet of it was completely uncovered along the bottom of the Yellowstone River, exposing it to damage.
  • Bridger Pipeline LLC was so sure its Poplar oil line was safely buried below the Yellowstone River that it planned to wait five years to recheck it. But last month, 3.5 years later, the Poplar wasn't eight feet under the river anymore. It was substantially exposed on the river bottom—and leaking more than 30,000 gallons of oil upstream from Glendive, Montana. An ExxonMobil pipeline wasn't buried deeply enough for the Yellowstone River, either. High floodwaters in 2011 uncovered the Silvertip pipe, leaving it defenseless against the fast-moving current and traveling debris. It broke apart in July, and sent 63,000 gallons of oil into the river near Laurel, Montana.
  • Both companies underestimated the river's power and its penchant for scouring away the earth that's covering and protecting their pipelines. That miscalculation led to the Exxon Silvertip spill and it's likely to be declared a significant factor, at a minimum, in the Poplar spill. Such misjudgments have potentially troubling implications nationwide, since pipelines carrying crude oil and petroleum products pass beneath rivers and other bodies of water in more than 18,000 places across America. Many of them are buried only a few feet below the water. "There were a lot of people who wanted to think that the last pipeline spill in the Yellowstone River in 2011 was a freak accident that would never happen again. After this most recent spill, no one believes that anymore," said Scott Bosse, Northern Rockies director for American Rivers. "The truth is, there are probably hundreds of pipelines across the country that are at considerable risk of rupturing under our rivers."
  • ...4 more annotations...
  • While corrosion is the No. 1 cause of pipeline spills, a sizable number of pipelines at water crossings have ruptured or been endangered by river scour. Among them: ► The Poplar (Jan. 2015) and Silvertip (July 2011) pipeline failures on the Yellowstone River. ► More than 20 pipeline river crossings in Montana were found to be "dangerously close to exposure" during inspections of nearly 90 pipeline crossings in 2011, according to one report. Many of them have since been reburied significantly deeper. The Poplar pipeline was not among the crossings tagged as being close to exposure. ► Nearly half of the 55 oil and gas pipelines that cross the Missouri River were found to have sections buried 10 feet or less below the riverbed, according to the Wall Street Journal. A study by the U.S. Geological Survey, meanwhile, found that the Missouri riverbed had deepened by nine to 41 feet in 27 places because of severe scouring during the 2011 floods. ► An Enterprise Products Partners LLP pipeline that was uncovered by river scouring and ruptured in August 2011. The line spilled more than 28,350 gallons of a gasoline additive into the Missouri River in Iowa. ► A June 2012 spill in Alberta, Canada, where an oil pipeline owned by Plains Midstream Canada failed along the Red Deer River and released more than 122,000 gallons of light crude. Investigators concluded that the pipe was uncovered by scour during high flood waters and subjected to vibrations from the river flow that led a weld to fail.
  • Three Enbridge Corp. crude oil pipelines crossing Minnesota's Tamarac River were exposed by floodwater erosion years ago, and were still exposed in mid-2014. None of the pipes had failed at that point, but one was being propped up by steel legs, according to an MPR News account. Federal regulations aren't much help. The only rule that addresses pipe burial at major river crossings requires petroleum pipelines to be laid at least four feet below the riverbed at the time of construction. Once a pipeline's installed, there are no requirements regarding burial depth. There is no rule requiring exposed pipelines to be reburied, though a spill under those conditions would invite regulatory penalties for leaving the line exposed to hazards. What's more, federal rules put the pipeline companies in charge of identifying all threats that could cause a spill in highly populated or environmentally sensitive areas, and the companies get wide latitude in deciding what to do about them, according to Rebecca Craven, program manager at the Pipeline Safety Trust, a nonprofit group that tracks pipeline risks and regulations.
  • Indeed, the required four-foot minimum initial burial depth for pipelines can be completely eliminated by natural erosion over time or by a single flood event. Active free-flowing rivers can carve with enough ferocity to lower their riverbeds by 20 feet or shift the waterway onto an entirely new path, which can add new stresses to the pipeline or put the river over pipe that has less cover or lacks reinforcement or protective cement casings. The hotly debated Keystone XL oil pipeline project would cross nearly 2,000 rivers, streams and reservoirs in Montana, South Dakota and Nebraska, according to one estimate. The route takes the pipe across the Missouri and Yellowstone rivers, where owner TransCanada has pledged to install the pipeline 35 feet below the riverbeds.
  • See Also: Ruptured Yellowstone Oil Pipeline Was Built With Faulty Welding in 1950sIce Hinders Cleanup of Yellowstone Oil Pipeline SpillExxon Overlooked, Masked Safety Threats in Years Before Pegasus Pipeline BurstDilbit in Exxon's Pegasus May Have Contributed to Pipeline's Rupture
  •  
    One of the hidden costs of oil dependence. 
Paul Merrell

Civil Rights Coalition files FCC Complaint Against Baltimore Police Department for Ille... - 0 views

  • This week the Center for Media Justice, ColorOfChange.org, and New America’s Open Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network—and are doing so in a way that has a disproportionate impact on communities of color. Stingrays operate by mimicking a cell tower and directing all cellphones in a given area to route communications through the Stingray instead of the nearby tower. They are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship. Stingrays can also be configured to capture the content of communications. Because Stingrays operate on the same spectrum as cellular networks but are not actually transmitting communications the way a cell tower would, they interfere with cell phone communications within as much as a 500 meter radius of the device (Baltimore’s devices may be limited to 200 meters). This means that any important phone call placed or text message sent within that radius may not get through. As the complaint notes, “[d]epending on the nature of an emergency, it may be urgently necessary for a caller to reach, for example, a parent or child, doctor, psychiatrist, school, hospital, poison control center, or suicide prevention hotline.” But these and even 911 calls could be blocked.
  • The Baltimore Police Department could be among the most prolific users of cell site simulator technology in the country. A Baltimore detective testified last year that the BPD used Stingrays 4,300 times between 2007 and 2015. Like other law enforcement agencies, Baltimore has used its devices for major and minor crimes—everything from trying to locate a man who had kidnapped two small children to trying to find another man who took his wife’s cellphone during an argument (and later returned it). According to logs obtained by USA Today, the Baltimore PD also used its Stingrays to locate witnesses, to investigate unarmed robberies, and for mysterious “other” purposes. And like other law enforcement agencies, the Baltimore PD has regularly withheld information about Stingrays from defense attorneys, judges, and the public. Moreover, according to the FCC complaint, the Baltimore PD’s use of Stingrays disproportionately impacts African American communities. Coming on the heels of a scathing Department of Justice report finding “BPD engages in a pattern or practice of conduct that violates the Constitution or federal law,” this may not be surprising, but it still should be shocking. The DOJ’s investigation found that BPD not only regularly makes unconstitutional stops and arrests and uses excessive force within African-American communities but also retaliates against people for constitutionally protected expression, and uses enforcement strategies that produce “severe and unjustified disparities in the rates of stops, searches and arrests of African Americans.”
  • Adding Stingrays to this mix means that these same communities are subject to more surveillance that chills speech and are less able to make 911 and other emergency calls than communities where the police aren’t regularly using Stingrays. A map included in the FCC complaint shows exactly how this is impacting Baltimore’s African-American communities. It plots hundreds of addresses where USA Today discovered BPD was using Stingrays over a map of Baltimore’s black population based on 2010 Census data included in the DOJ’s recent report:
  • ...2 more annotations...
  • The Communications Act gives the FCC the authority to regulate radio, television, wire, satellite, and cable communications in all 50 states, the District of Columbia and U.S. territories. This includes being responsible for protecting cellphone networks from disruption and ensuring that emergency calls can be completed under any circumstances. And it requires the FCC to ensure that access to networks is available “to all people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.” Considering that the spectrum law enforcement is utilizing without permission is public property leased to private companies for the purpose of providing them next generation wireless communications, it goes without saying that the FCC has a duty to act.
  • But we should not assume that the Baltimore Police Department is an outlier—EFF has found that law enforcement has been secretly using stingrays for years and across the country. No community should have to speculate as to whether such a powerful surveillance technology is being used on its residents. Thus, we also ask the FCC to engage in a rule-making proceeding that addresses not only the problem of harmful interference but also the duty of every police department to use Stingrays in a constitutional way, and to publicly disclose—not hide—the facts around acquisition and use of this powerful wireless surveillance technology.  Anyone can support the complaint by tweeting at FCC Commissioners or by signing the petitions hosted by Color of Change or MAG-Net.
  •  
    An important test case on the constitutionality of stingray mobile device surveillance.
Gary Edwards

DHS insider update: "It has begun" « Northeast Intelligence NetworkNortheast ... - 1 views

  •  
    The forced confiscation of citizen savings held in Cypress bank accounts is a test by the International Bank to see if people will roll over or fight.  The Global elites are ready to pull the trigger on world wide economic collapse, and they're testing to see what the response will be. clip: "According to the most recent information provided to me from my source within the Department of Homeland Security known as "Rosebud," the final preparations are being made to deploy heavily armed federalized forces onto the streets of America. They will be deployed under the pretext of "restoring and maintaining order from the chaos brought about by the economic collapse," adding that "many will demand and embrace their deployment on the streets of America. They will get what they ask for, and more." Much like the security theater we have seen following the attacks of 9/11, we will be subjected to the jack-booted control of a federal army whose allegiance is not to the American people, but to the very architects of the chaos. "This is the reason that drones are flying over U.S. cities and farmland, and gun control legislation is on the fast track for complete implementation," stated this source. "How can people look at the situation in Cyprus and not think it won't happen here? It will, and the blowback will be unlike this country has ever seen. Surveillance, disarming the public, and conditioning the people to believe it's for their own safety is and has been  part of the plan all along. Anyone owing a gun will be demonized and described as contributing to the problem." "What happens when the middle class loses much of their wealth, or it is confiscated, by the stroke of a pen or a keyboard? What will the stores look like when people, unprepared due to the damn lies of the corporate media and the shills for the ruling elite, run to empty out everything they can get their hands on as the world, as they know it, collapses around them?" It was
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Gary Edwards

Impeach Judge James Robart for violating sovereignty and Constitution - 0 views

  •  
    "It's still hard to believe we now live in a country where a district judge can demand that we bring in refugees from state sponsors of terror and failed states saturated with terrorists and no data systems during a time of war. It's almost unfathomable that a district judge, an institution created by Congress, can overturn long-standing refugee law and bar the federal government from prioritizing persecuted religious minorities for refugee resettlement. All in contravention to statute, numerous clauses of the Constitution, the social contract, the social compact, popular sovereignty, jurisdictional sovereignty, and 200 years of case law. If Obergefell redefined the building block of all civilization, Judge James Robart's ruling redefined the building block of a sovereign nation. It's hard to comprehend a judicial opinion more divorced from our Constitution, sovereignty, fundamental laws, founding values, history, and tradition. It's also hard to imagine an opinion that is of greater consequence - unless it is ignored. In the long run, Congress must strip the federal judiciary of their power grab and restore Congress' plenary power over immigration, as it was since our founding. However, in the meantime, it's time to make impeachment great again. Impeachment was a critical check on abuse of power   Before the growth of political parties killed the separation of powers, the tool of impeachment was regarded by our founders as one of the most effective ways of checking the executive and judicial branches of government. By my count, impeachment is referenced 58 times in the Federalist Papers and countless times during the Constitutional Convention. Impeachment [U.S.CONST. art. II, §4] was not only reserved for those who engage in criminal behavior. It was clearly designed to check abuse of power. As the Congressional Research Service observes, Congress has identified "improperly exceeding or abusing the powers of the office" as a criterion for
Gary Edwards

Can Americans Escape the Deception? - 0 views

  •  
    I've been reading Paul Craig Roberts since high school, when i used to clip his backpage columns in NewsWeek magazine. These days, you have to go to his blog to get the truth. But what a truth it is! Incredible, forceful but presented only as PCR can do. His wake up call to America is not about Republicans or Democrats. It's about our liberty and the all out assault our government, socialist and conservatives alike, has launched on the Constitution. Amerika! This is what it comes to. It's also why i'm a libertarian. Read it and weep. Excerpt is from the 9/11 section. excerpt: In a real investigation, the 9/11 evidence would not have been illegally destroyed, and the investigation would have been conducted by experts, not by government agencies assigned a cover-up and by political hacks. The NIST report is abject nonsense. It explains nothing. It is a fabricated computer simulation of a non-event. The co-chairmen and legal counsel of the 9/11 Commission later wrote books in which they stated that information was withheld from the commission, the military lied to the commission, and the commission "was set up to fail." Yet, these astounding admissions by the leaders of the 9/11 Commission had no impact on Congress, the presstitute media, or the public. All heads were in the sand. Please, whatever you do, don't make us emotional weaklings face the facts. More than one hundred firefighters, police, first responders, and building maintenance personnel report hearing and experiencing scores of explosions in the twin towers, including powerful explosions in the sub-basements prior to the collapse of the towers. Distinguished scientists, authors of many peer-reviewed scientific papers, report finding unreacted nano-thermite in the dust from the towers, tested it for its explosive and high-heat producing ability, and reported the unequivocal results. Seventeen hundred architects and engineers have testified in a petition to Congress that the th
  •  
    For a detailed and fully referenced study of how 9-11 Commission Executive Director Philip Zelikow's conflict of interest and how he kept Commission members in the dark and sabotaged the Commission report, see http://tinyurl.com/6tdfc56
Gary Edwards

Lawfare › NDAA FAQ: A Guide for the Perplexed - 1 views

  •  
    Good legal commentary on the NDAA.  A couple of things are overlooked though.  One is that neither the Senate, House or Executive Branch of government has the authority to suspend, change or alter in any way through a bill, regulation or other instrument of law, the Constitution.  The only Constitutional means of changing the Constitution (or Bill of Rights amendments) is that of amending the Constitution.  A ratification process process requiring super majorities of Congress (67%) and the States (75%).
    IMHO, both the NDAA and the Patriot-Act AUMF are un-Constitutional.  But as the Lawfare article points out, on those few occasions where this crap has been legally challenged, the Courts have upheld Habeas Corpus and the Constitution.
    The more troublesome aspect of the NDAA is twofold.  One is that Obama assumes that the AUMF has already given him legal authority to stomp on the Posse Comitatus Act, and use the federal military as his own domestic police force.  Obama has also stated that under the 2001 AUMF, he can assault, arrest and detain any citizen indefinitely, without charges, writ of Habeas Corpus, or warrant.  (See Jonathan Hurley's account of the the legal seminar where Obama representatives explained their interpretation of AUMF, the Patriot Act and NDAA).  
    That's a scary interpretation of the AUMF quite out of line with Bush understanding and actual implementation, and, more importantly, how the Courts ruled on Bush's actions in support of the Constitution. Anyone know where i can sign on to a petition presenting a Bill of Particulars for Articles of Impeachment?  It's past time. NDAA FAQ: A Guide for the Perplexed by Benjamin Wittes (Benjamin Wittes & Robert Chesney)
    The volume of sheer, unadulterated nonsense zipping around the internet about the NDAA boggles the mind. There was a time-only a few months ago-when the NDAA detention provisions were the obscure province of a small group of national security law nerds.
Gary Edwards

A First Look at the Book "The Liberty Amendments", by Mark Levin - Tea Party Command Ce... - 0 views

  •  
    Excellent youtube interview! "Mark Levin has just published his much-anticipated book The Liberty Amendments: Restoring the American Republic. Three of his eleven proposed Constitutional amendments appear below, and a Sean Hannity interview of Levin appears at the bottom of this post. Levin's book is centered around the Constitution's Article V (aka "Article 5″). That article specifies two methods for amending the Constitution. Just briefly - In the first method of creating amendments, Congress proposes and the States dispose. In the second method of creating amendments, the States propose and the States dispose. The second method has never been used successfully, although there have been many attempts.  It is that second method that the Founders provided as a remedy for an overreaching federal government. In the second method, neither Congress, nor the President, nor the Supreme Court have any voting or veto authority whatsoever.  The states are in full control. Period. It is, by design, the ultimate override for an over-spending, over-taxing, over-regulating, and increasingly dictatorial and lawless federal government. Clearly, its time has come. In that second method, Congress has at most a mere ministerial role.  Of course Congress is very protective of its power, and could, through delay and inaction, attempt to convert their mere ministerial role into a de facto veto power, halting any attempt for a state-driven amendment action. Apparently Congress has done exactly that many times, acting in bad faith and contrary to the Framers' spirit and intent for Article V which is clearly expressed in the Federalist Papers. Legal scholars have been trying to find a way around the federal government's intransigence, so far with little success. Now more than ever, it is time for We the People to bring the power of Article V to the center ring of American politics. That starts with awareness, and Levin's book will br
Gary Edwards

You Won't BELIEVE What's Going On with Government Spying on Americans - BlackListedNews... - 1 views

  •  
    "New Revelations Are Breaking Every Day" This web page is very well sourced and filled with links where you will get lost for hours. Excellent reference document ............................ Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated roundup: - Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year - 2 Senators on the intelligence committee said the violations revealed in the Post article were just the "tip of the iceberg" - Glenn Greenwald notes:  "One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing".(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes) - The government is spying on essentially everything we do. It is not just "metadata" … although that is enough to destroy your privacy - The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that "everything" is relevant … so it spies on everyone - NSA whistleblowers say that the NSA collects all of our conversations word-for-word - It's not just the NSA … Many other agencies, like the FBI and IRS - concerned only with domesticissues - spy on Americans as well - The information gained through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes.  The agencies are instructed to intentionally "launder" the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges - Top counter-terror experts say that the government's mass spying doesn't keep us
« First ‹ Previous 61 - 80 of 238 Next › Last »
Showing 20 items per page