Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged national-security-issues

Rss Feed Group items tagged

Gary Edwards

Byron York: Justice Department demolishes case against Trump order | Washington Examiner - 1 views

  •  
    "James Robart, the U.S. district judge in Washington State, offered little explanation for his decision to stop President Trump's executive order temporarily suspending non-American entry from seven terror-plagued countries. Robart simply declared his belief that Washington State, which in its lawsuit against Trump argued that the order is both illegal and unconstitutional, would likely win the case when it is tried. Now the government has answered Robart, and unlike the judge, Justice Department lawyers have produced a point-by-point demolition of Washington State's claims. Indeed, for all except the most partisan, it is likely impossible to read the Washington State lawsuit, plus Robart's brief comments and writing on the matter, plus the Justice Department's response, and not come away with the conclusion that the Trump order is on sound legal and constitutional ground. Beginning with the big picture, the Justice Department argued that Robart's restraining order violates the separation of powers, encroaches on the president's constitutional and legal authority in the areas of foreign affairs, national security, and immigration, and "second-guesses the president's national security judgment" about risks faced by the United States. Indeed, in court last week, Robart suggested that he, Robart, knows as much, or perhaps more, than the president about the current state of the terrorist threat in Yemen, Somalia, Libya, and other violence-plagued countries. In an exchange with Justice Department lawyer Michelle Bennett, Robart asked, "How many arrests have there been of foreign nationals for those seven countries since 9/11?" "Your Honor, I don't have that information," said Bennett. "Let me tell you," said Robart. "The answer to that is none, as best I can tell. So, I mean, you're here arguing on behalf of someone [President Trump] that says: We have to protect the United States from these individuals coming from these countries, and there's no support for that."
Paul Merrell

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • ...14 more annotations...
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

FBI Flouts Obama Directive to Limit Gag Orders on National Security Letters - The Inter... - 0 views

  • Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run around the Fourth Amendment since 2001 has been something called a National Security Letter. FBI agents can demand that an Internet service provider, telephone company or financial institution turn over its records on any number of people — without any judicial review whatsoever — simply by writing a letter that says the information is needed for national security purposes. The FBI at one point was cranking out over 50,000 such letters a year; by the latest count, it still issues about 60 a day. The letters look like this:
  • Recipients are legally required to comply — but it doesn’t stop there. They also aren’t allowed to mention the order to anyone, least of all the person whose data is being searched. Ever. That’s because National Security Letters almost always come with eternal gag orders. Here’s that part:
  • That means the NSL process utterly disregards the First Amendment as well. More than a year ago, President Obama announced that he was ordering the Justice Department to terminate gag orders “within a fixed time unless the government demonstrates a real need for further secrecy.” And on Feb. 3, when the Office of the Director of National Intelligence announced a handful of baby steps resulting from its “comprehensive effort to examine and enhance [its] privacy and civil liberty protections” one of the most concrete was — finally — to cap the gag orders: In response to the President’s new direction, the FBI will now presumptively terminate National Security Letter nondisclosure orders at the earlier of three years after the opening of a fully predicated investigation or the investigation’s close. Continued nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the statutory standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why continued nondisclosure is appropriate.
  • ...6 more annotations...
  • Despite the use of the word “now” in that first sentence, however, the FBI has yet to do any such thing. It has not announced any such change, nor explained how it will implement it, or when. Media inquiries were greeted with stalling and, finally, a no comment — ostensibly on advice of legal counsel. “There is pending litigation that deals with a lot of the same questions you’re asking, out of the Ninth Circuit,” FBI spokesman Chris Allen told me. “So for now, we’ll just have to decline to comment.” FBI lawyers are working on a court filing for that case, and “it will address” the new policy, he said. He would not say when to expect it.
  • So, German said, “the number of NSLs that would be exposed as a result of the release of the gag order is probably very few. The person whose records are being obtained is the one who should receive some notification.” A time limit on gags going forward also raises the question of whether past gag orders will now be withdrawn. “Obviously there are at this point literally hundreds of thousands of National Security Letters that are more than three years old,” said Sanchez. Individual review is therefore unlikely, but there ought to be some recourse, he said. And the further back you go, “it becomes increasingly implausible that a significant percentage of those are going to entail some dire national security risk.” The NSL program has a troubled history. The absolute secrecy of the program and resulting lack of accountability led to systemic abuse as documented by repeated inspector-general investigations, including improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL statutes, requests for information based on First Amendment protected activity, “after-the-fact” blanket NSLs to “cover” illegal requests, and hundreds of NSLs for “community of interest” or “calling circle” information without any determination that the telephone numbers were relevant to authorized national security investigations.
  • In a separate case, a wide range of media companies (including First Look Media, the non-profit digital media venture that produces The Intercept) are supporting a lawsuit filed by Twitter, demanding the right to say specifically how many NSLs it has received. But simply releasing companies from a gag doesn’t assure the kind of accountability that privacy advocates are saying is required by the Constitution. “What the public has to remember is a NSL is asking for your information, but it’s not asking it from you,” said Michael German, a former FBI agent who is now a fellow with the Brennan Center for Justice. “The vast majority of these things go to the very large telecommunications and financial companies who have a large stake in maintaining a good relationship with the government because they’re heavily regulated entities.”
  • There is indeed a significant case currently before the federal appeals court in San Francisco. Oral arguments were in October. A decision could come any time. But in that case, the Electronic Frontier Foundation (EFF), which is representing two unnamed communications companies that received NSLs, is calling for the entire NSL statute to be thrown out as unconstitutional — not for a tweak to the gag. And it has a March 2013 district court ruling in its favor. “The gag is a prior restraint under the First Amendment, and prior restraints have to meet an extremely high burden,” said Andrew Crocker, a legal fellow at EFF. That means going to court and meeting the burden of proof — not just signing a letter. Or as the Cato Institute’s Julian Sanchez put it, “To have such a low bar for denying persons or companies the right to speak about government orders they have been served with is anathema. And it is not very good for accountability.”
  • Obama’s own hand-selected “Review Group on Intelligence and Communications Technologies” recommended in December 2013 that NSLs should only be issued after judicial review — just like warrants — and that any gag should end within 180 days barring judicial re-approval. But FBI director James Comey objected to the idea, calling NSLs “a very important tool that is essential to the work we do.” His argument evidently prevailed with Obama.
  • NSLs have managed to stay largely under the American public’s radar. But, Crocker says, “pretty much every time I bring it up and give the thumbnail, people are shocked. Then you go into how many are issued every year, and they go crazy.” Want to send me your old NSL and see if we can set a new precedent? Here’s how to reach me. And here’s how to leak to me.
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

'This Week' Transcript: Ambassador Samantha Power - ABC News - 0 views

  • STEPHANOPOULOS: And we are joined now by the U.S. Ambassador to the United Nations Samantha Power. Thanks for coming back to This Week. And you know, the president said he's prepared to strike Syria. Those strikes could be imminent. Will the United States try to get UN Security Council authorization first? Or do you accept now that's just not going to be possible? SAMANTHA POWER, U.S. AMBASSADOR TO THE UNITED NATIONS: Well, let me say that Secretary Kerry just convened a meeting of the Security Council on Friday which showcased just how much support there is on the Security Council and in the broader international community for the anti-ISIL effort. STEPHANOPOULOS: But the Russia veto.
  • POWER: Russia has vetoed in the past, but on very different issues. I think Russia has made clear for a long time its opposition to ISIL. The Iraqis have appealed to the international community to come to their defense not only in Iraq, but also to go after safe havens in foreign countries. And what they mean by that of course is Syria. And they're quite explicit about that. So they have made an appeal to the international community for collective defense. And we think we have a legal basis we need if the president decides... STEPHANOPOULOS: Without a UN authorization. POWER: Consistent with the UN charter, we -- it will depend on the facts and circumstances of any particular strike in Syria, but we have a legal basis we need.
  •  
    Context: U.S. Ambassador to the U.N., Samantha Power, holds the U.N. Security Council's rotating chair this month. Powers'  claims a right for the U.S. to wage war against ISIL in Syria on grounds of the collective security exception to the U.N. Charter's prohibition; that is, that the U.S. has a collective security agreement with the nation of Iraq, that makes it lawful for the U.S. to strike ISIL. True enough as a matter of international law, ignoring the fact that Obama has yet to obtain permission from the U.S. Congress, which the U.S. Constitution requires him to do. But ISIL is not the nation of Syria; hence to attack ISIL in Syria, an additional exception is necessary for both Iraq and the U.S. The only other recognized exception that might seem to do deals with the situation when a nation in which a private organization inflicting harm on another nation  is "unwilling or unable" to protect the second nation (Iraq) from the depradations of the private organization. And that is where Powers' legal analysis dissembles because the U.S. has been actively attempting to overthrow the Syrian government via proxy terrorist organizations including ISIL. So the U.S. lacks clean hands in claiming any lawful right to invade Syria on the theory that the Syrian government is unwilling or unable to put down the ISIL organization. The Syrian government is certainly willing and has been attempting to do so. But its inability to do so thus far is entirely due to the U.S., its Gulf Coast state allies, and its ally Turkey continuing to supply ISIL and other terrorist groups in Syria with weapons, training, and supplies, aimed at overthrowing the Syrian government. The doctrine of unclean hands has limited applicability in international law governing human rights. See Lisa LaPlante, The Law of Remedies and the Clean Hands Doctrine: Exclusionary Reparation Policies in Peru's Political Transition, 23 Am Univ Int Law Rev 50 (2007), https://digitalcommons.wcl.american.edu/cg
Gary Edwards

Do Obama's Executive Orders Reveal A Pattern? by Warren Beatty at American Thinker - 0 views

  •  
    The Obama Executive Orders are frightening steps on the road to the destruction of our beloved Constitution and the implementation of totalitarian tyranny. The thing is, neither Obama or Congress can issue an executive order or pass a law that compromises the Constitution, including the rights and liberty of individual citizen and the States. The Constitution is a document of strictly "enumerated powers" - NOT "implied powers". These executive orders are un Constitutional!!!!!! excerpt: President Barack Hussein "kill list" Obama has offered over 900 Executive Orders (EO), and he is not even through his first term. He is creating a wonderland of government controls covering everything imaginable, including a list of "Emergency Powers" and martial law EOs. And while Obama is busy issuing EOs to control everything inside the US, he has been issuing EOs to force us to submit to international regulations instead of our US Constitution. And comments by North Carolina governor Beverly Perdue and former OMB director Peter Orszag only contribute to this pattern. Is it now time to start connecting the dots? Obama signed EO 13603 on March 22, 2012. Then he signed EO 13617 on June 25, 2012, declaring a national emergency. Then he signed EO 13618 on July 6, 2012. In EO 13603, entitled, "National Defense Resources Preparedness," Obama says (among other things) that [we must]: be prepared, in the event of a potential threat to the security of the United States, to take actions necessary to ensure the availability of adequate resources and production capability, including services and critical technology, for national defense requirements; Obama has the power, through this EO, to "nationalize" (not seize) private assets in order to protect national interests. Further, the EO effectively states that he can: 1. "identify" requirements for emergencies 2. "assess" the capability of the country's industrial and technological base 3. "be prepared" t
Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Paul Merrell

Remarks by President Obama in Address to the United Nations General Assembly | The Whit... - 0 views

  • Remarks by President Obama in Address to the United Nations General Assembly United Nations General Assembly Hall New York City, New York 10:13 A.M. EDT PRESIDENT OBAMA:  Mr. President, Mr. Secretary General, fellow delegates, ladies and gentlemen:  We come together at a crossroads between war and peace; between disorder and integration; between fear and hope. Around the globe, there are signposts of progress.  The shadow of World War that existed at the founding of this institution has been lifted, and the prospect of war between major powers reduced.  The ranks of member states has more than tripled, and more people live under governments they elected. Hundreds of millions of human beings have been freed from the prison of poverty, with the proportion of those living in extreme poverty cut in half.  And the world economy continues to strengthen after the worst financial crisis of our lives. 
  • And yet there is a pervasive unease in our world -- a sense that the very forces that have brought us together have created new dangers and made it difficult for any single nation to insulate itself from global forces.  As we gather here, an outbreak of Ebola overwhelms public health systems in West Africa and threatens to move rapidly across borders.  Russian aggression in Europe recalls the days when large nations trampled small ones in pursuit of territorial ambition.  The brutality of terrorists in Syria and Iraq forces us to look into the heart of darkness.
  • First, all of us -- big nations and small -- must meet our responsibility to observe and enforce international norms.  We are here because others realized that we gain more from cooperation than conquest. 
  • ...14 more annotations...
  • Recently, Russia’s actions in Ukraine challenge this post-war order.  Here are the facts.  After the people of Ukraine mobilized popular protests and calls for reform, their corrupt president fled.  Against the will of the government in Kyiv, Crimea was annexed.  Russia poured arms into eastern Ukraine, fueling violent separatists and a conflict that has killed thousands.  When a civilian airliner was shot down from areas that these proxies controlled, they refused to allow access to the crash for days.  When Ukraine started to reassert control over its territory, Russia gave up the pretense of merely supporting the separatists, and moved troops across the border. This is a vision of the world in which might makes right -- a world in which one nation’s borders can be redrawn by another, and civilized people are not allowed to recover the remains of their loved ones because of the truth that might be revealed. America stands for something different.  We believe that right makes might -- that bigger nations should not be able to bully smaller ones, and that people should be able to choose their own future.
  • nd these are simple truths, but they must be defended. America and our allies will support the people of Ukraine as they develop their democracy and economy.  We will reinforce our NATO Allies and uphold our commitment to collective self-defense.  We will impose a cost on Russia for aggression, and we will counter falsehoods with the truth.  And we call upon others to join us on the right side of history -- for while small gains can be won at the barrel of a gun, they will ultimately be turned back if enough voices support the freedom of nations and peoples to make their own decisions. Moreover, a different path is available -- the path of diplomacy and peace, and the ideals this institution is designed to uphold.  The recent cease-fire agreement in Ukraine offers an opening to achieve those objectives.  If Russia takes that path -- a path that for stretches of the post-Cold War period resulted in prosperity for the Russian people -- then we will lift our sanctions and welcome Russia’s role in addressing common challenges.  After all, that’s what the United States and Russia have been able to do in past years -- from reducing our nuclear stockpiles to meeting our obligations under the Nuclear Nonproliferation Treaty, to cooperating to remove and destroy Syria’s declared chemical weapons.  And that’s the kind of cooperation we are prepared to pursue again -- if Russia changes course. 
  • This speaks to a central question of our global age -- whether we will solve our problems together, in a spirit of mutual interest and mutual respect, or whether we descend into the destructive rivalries of the past.  When nations find common ground, not simply based on power, but on principle, then we can make enormous progress.  And I stand before you today committed to investing American strength to working with all nations to address the problems we face in the 21st century.
  • America is pursuing a diplomatic resolution to the Iranian nuclear issue, as part of our commitment to stop the spread of nuclear weapons and pursue the peace and security of a world without them.  And this can only take place if Iran seizes this historic opportunity.  My message to Iran’s leaders and people has been simple and consistent:  Do not let this opportunity pass.  We can reach a solution that meets your energy needs while assuring the world that your program is peaceful.  America is and will continue to be a Pacific power, promoting peace, stability, and the free flow of commerce among nations.  But we will insist that all nations abide by the rules of the road, and resolve their territorial disputes peacefully, consistent with international law. 
  • In other words, on issue after issue, we cannot rely on a rule book written for a different century.  If we lift our eyes beyond our borders -- if we think globally and if we act cooperatively -- we can shape the course of this century, as our predecessors shaped the post-World War II age.  But as we look to the future, one issue risks a cycle of conflict that could derail so much progress, and that is the cancer of violent extremism that has ravaged so many parts of the Muslim world. Of course, terrorism is not new.  Speaking before this Assembly, President Kennedy put it well:  “Terror is not a new weapon,” he said.  “Throughout history it has been used by those who could not prevail, either by persuasion or example.”  In the 20th century, terror was used by all manner of groups who failed to come to power through public support.  But in this century, we have faced a more lethal and ideological brand of terrorists who have perverted one of the world’s great religions.  With access to technology that allows small groups to do great harm, they have embraced a nightmarish vision that would divide the world into adherents and infidels -- killing as many innocent civilians as possible, employing the most brutal methods to intimidate people within their communities.
  • I have made it clear that America will not base our entire foreign policy on reacting to terrorism.  Instead, we’ve waged a focused campaign against al Qaeda and its associated forces -- taking out their leaders, denying them the safe havens they rely on.  At the same time, we have reaffirmed again and again that the United States is not and never will be at war with Islam.  Islam teaches peace.  Muslims the world over aspire to live with dignity and a sense of justice.  And when it comes to America and Islam, there is no us and them, there is only us -- because millions of Muslim Americans are part of the fabric of our country. So we reject any suggestion of a clash of civilizations. Belief in permanent religious war is the misguided refuge of extremists who cannot build or create anything, and therefore peddle only fanaticism and hate.  And it is no exaggeration to say that humanity’s future depends on us uniting against those who would divide us along the fault lines of tribe or sect, race or religion.
  • But this is not simply a matter of words.  Collectively, we must take concrete steps to address the danger posed by religiously motivated fanatics, and the trends that fuel their recruitment.  Moreover, this campaign against extremism goes beyond a narrow security challenge.  For while we’ve degraded methodically core al Qaeda and supported a transition to a sovereign Afghan government, extremist ideology has shifted to other places -- particularly in the Middle East and North Africa, where a quarter of young people have no job, where food and water could grow scarce, where corruption is rampant and sectarian conflicts have become increasingly hard to contain.   As an international community, we must meet this challenge with a focus on four areas.  First, the terrorist group known as ISIL must be degraded and ultimately destroyed.
  • The second:  It is time for the world -- especially Muslim communities -- to explicitly, forcefully, and consistently reject the ideology of organizations like al Qaeda and ISIL.
  • Later today, the Security Council will adopt a resolution that underscores the responsibility of states to counter violent extremism.  But resolutions must be followed by tangible commitments, so we’re accountable when we fall short.  Next year, we should all be prepared to announce the concrete steps that we have taken to counter extremist ideologies in our own countries -- by getting intolerance out of schools, stopping radicalization before it spreads, and promoting institutions and programs that build new bridges of understanding.
  • Third, we must address the cycle of conflict -- especially sectarian conflict -- that creates the conditions that terrorists prey upon.
  • The good news is we also see signs that this tide could be reversed.  We have a new, inclusive government in Baghdad; a new Iraqi Prime Minister welcomed by his neighbors; Lebanese factions rejecting those who try to provoke war.  And these steps must be followed by a broader truce.  Nowhere is this more necessary than Syria.  Together with our partners, America is training and equipping the Syrian opposition to be a counterweight to the terrorists of ISIL and the brutality of the Assad regime.  But the only lasting solution to Syria’s civil war is political -- an inclusive political transition that responds to the legitimate aspirations of all Syrian citizens, regardless of ethnicity, regardless of creed.
  • My fourth and final point is a simple one:  The countries of the Arab and Muslim world must focus on the extraordinary potential of their people -- especially the youth.
  • We recognize as well that leadership will be necessary to address the conflict between Palestinians and Israelis.  As bleak as the landscape appears, America will not give up on the pursuit of peace.  Understand, the situation in Iraq and Syria and Libya should cure anybody of the illusion that the Arab-Israeli conflict is the main source of problems in the region.  For far too long, that's been used as an excuse to distract people from problems at home.  The violence engulfing the region today has made too many Israelis ready to abandon the hard work of peace.  And that's something worthy of reflection within Israel.
  • Because let’s be clear:  The status quo in the West Bank and Gaza is not sustainable.  We cannot afford to turn away from this effort -- not when rockets are fired at innocent Israelis, or the lives of so many Palestinian children are taken from us in Gaza. So long as I am President, we will stand up for the principle that Israelis, Palestinians, the region and the world will be more just and more safe with two states living side by side, in peace and security. So this is what America is prepared to do:  Taking action against immediate threats, while pursuing a world in which the need for such action is diminished.  The United States will never shy away from defending our interests, but we will also not shy away from the promise of this institution and its Universal Declaration of Human Rights -- the notion that peace is not merely the absence of war, but the presence of a better life. 
  •  
    Epic hypocrisy. He bows to international law while waging multiple wars in direct defiance of it. And that's just in the first few paragraphs. It gets worse the farther he gets in his speech.
Gary Edwards

Benghazi report: Trinkets of treason - 1 views

  •  
    The truth is dribbling out, thn=anks to Douglas J. Hagmann and Canada Free Press .....................  We've been aligned and hostage to the Saudi Royal Family ever since FDR met with King Ibn Saud, Feb 14th, 1945 near the end of WWII.  It was at this meeting that FDR promised protection for the Saudi family in exchange for the right to develop Saudi oil and sell that oil exclusively in dollars.  Hence the "petro dollar" - backed by Saudi oil instead of GOLD. That agreement, and our subsequent history of our military and state departments acting to further Saudi interests has dominated America.  Our troops and military resources ae mercenaries fighting for Saudi dominance of the Globalist ruling elites.  Our politicians are bought and paid for by the Saudi Globalist Alliance.  They have sold their souls for power and money, with the destruction of the USA Constitution the only thing standing between the Globalist and their quest to rule the world. excerpt: We are witnessing one of the biggest government cover-ups since Watergate. A cover-up that involves murder, arms trafficking, and lies by high ranking officials under oath. It involves the murderous attacks in Benghazi, and congressional investigators just released a 46-page interim progress report that at least exposes Hillary Rodham Clinton and the White House lying under oath. Where's the accountability? Where's the outrage? Where's the media? A 46-page interim progress report of an ongoing investigation across five House Committees by the U.S. House of Representatives was released on Tuesday, April 23, 2013. The executive summary states that former Secretary of State Hillary Rodham Clinton signed off on a reduction of diplomatic security forces suggesting that this reduction of security was, in large part, to blame for the attack in Benghazi on September 11, 2012.  The report emphasizes that this is "inconsistent" with her sworn testimony of January 23, 2013. Simply stated, Hillary Rod
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Gary Edwards

Obama gives himself control of all communication systems in America - RT - 0 views

  •  
    Awful stuff.  Another Obama executive order suspending the Constitution and terminating the Bill of Rights. Revoking the right of habeas corpus is unconstitutional. So is declaring a national emergency without congressional approval. The Constitution declares, "The Privilege of the Writ of Habeas Corpus shall not be suspended, unless when in cases of rebellion or invasion the public safety may require it." While Congress has passed many an unConstitutional Law regarding "National Emergency Powers", there is nothing in the Constitution granting any branch of the Federal government to tear up the Constitution and Bill of Rights.  Atrocities like FiSA, The Military Commissions Act, NSP51, HSPD20, the John Warner Defense Authorization Act, the National Emergencies Act, and the Patriot Act are un Constitutional to the core.   Only the American people, through their representatives in Congress, can declare a national emergency.  With the exception of the habeas corpus clause, the Constitution makes no allowance for the suspension of any of its provisions during a national emergency.  Many statist seeking to breach the Constitution and Bill of Rights argue that the granting of emergency powers by Congress is implicit in its Article I, section 8 authority to "provide for the common Defense and general Welfare," the commerce clause, its war, armed forces, and militia powers, and the "necessary and proper" clause empowering it to make such laws as are required to fulfill the executions of "the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." But this issue of "implied" powers defies an actual reading of the Constitution, and seeks to breach the meaning of that most basic of all Madisonian  Constitutional concepts embedded into the framework of limited government: "enumerated powers".  The United States is a government of enumerated powers.  N
Paul Merrell

FBI sharply increases use of Patriot Act provision to collect US citizens' records - Op... - 0 views

  • The FBI has dramatically increased its use of a controversial provision of the Patriot Act to secretly obtain a vast store of business records of U.S. citizens under President Barack Obama, according to recent Justice Department reports to Congress. The bureau filed 212 requests for such data to a national security court last year – a 1,000-percent increase from the number of such requests four years earlier, the reports show. Follow @openchannelblog The FBI’s increased use of the Patriot Act’s “business records” provision — and the wide ranging scope of its requests -- is getting new scrutiny in light of last week’s disclosure that that the provision was used to obtain a top-secret national security order requiring telecommunications companies to turn over records of millions of telephone calls. Advertise | AdChoices Taken together, experts say, those revelations show the government has broadly interpreted the Patriot Act provision as enabling it to collect data not just on specific individuals, but on millions of Americans with no suspected terrorist connections. And it shows that the Foreign Intelligence Surveillance Court  accepted that broad interpretation of the law.
  • “That they were using this (provision) to do mass collection of data is definitely the biggest surprise,” said Robert Chesney, a top national security lawyer at the University of Texas Law School. “Most people who followed this closely were not aware they were doing this.  We’ve gone from producing records for a particular investigation to the production of all records for a massive pre-collection database. It’s incredibly sweeping.”  
  • But little-noticed statements by FBI Director Robert Mueller in recent years – as well as interviews with former senior law enforcement officials – hint at what Chesney calls a largely unnoticed “sea change” in the way the U.S. government collects data for terrorism and other national security investigations.
  • ...5 more annotations...
  • The Patriot Act provision, known as Section 215, allows the FBI to require the production of business records and any other “tangible things” -- including “books, records, papers, documents and other items,” for an authorized terrorism or foreign intelligence investigation. The Patriot Act was a broad expansion of law enforcement powers enacted by Congress with overwhelming bipartisan support in the aftermath of the Sept. 11, 2001, terrorist attacks. In addition to Section 215, other provisions expanded the FBI’s power to issue so-called “national security letters,” requiring individuals and business to turn over a more limited set of records without any court order at all.  Advertise | AdChoices In contrast to standard grand jury subpoenas, material obtained under both Section 215 orders and national security letters must be turned over under so-called “gag orders” that forbid the business or institution that receives the order from notifying its customers or publicly referring to the matter.
  • Saying they wanted to put an end to “secret law,  eight U.S. senators — led by Sens. Jeff Merkley, D-Ore., and Mike Lee, R-Utah — on Tuesday introduced a bill to require the Justice Department to declassify national security court decisions that have permitted the use of the “business records” provision for such purposes.
  • In 2010, the number of requests jumped to 205 (all again granted, with 176 modified.) In the latest report filed on April 30, the department reported there had been 212 such requests in 2012 – all approved by the court, but 200 of them modified.These sharp increase in the use of Section 215 has drawn little attention until now because the number of national security letters (NSLs) issued by the bureau has been so much greater -- 15,229 in 2012. But FBI Director Mueller, in little-noticed written responses to Congress two years ago, explained that the bureau was encountering resistance from telecommunications companies in turning over “electronic communication transaction” records in response to national security letters.“Beginning in late 2009, certain electronic communications service providers no longer honored NSLs to obtain” records because of what their lawyers cited as “an ambiguity” in the law. (What Mueller didn’t say was this came at a time when all the major telecommunications companies were still facing lawsuits over their cooperation with the government on surveillance programs.) As a result, Mueller said, the FBI had switched over to demanding the same data under Section 215. “This change accounts for a significant increase in the volume of business records requests,” Mueller wrote.
  • From the earliest days of the Patriot Act, Section 215 was among the most hotly disputed of its provisions. Critics charged the language – “tangible things” -- was so broad that it would even permit the FBI to obtain library and bookstore records to inspect what citizens were reading.Ashcroft confronted criticismLargely to tamp down those concerns, then-Attorney General John Ashcroft declassified information about the FBI’s use of the provision in September 2003, saying in a statement that “the number of times Section 215 has been used to date is zero.” Ashcroft added that he was releasing the information “to counter the troubling amount of public distortion and misinformation” about Section 215. But in the years since, the FBI’s use of Section 215 quietly exploded, with virtually no public notice or debate. In 2009, as part of an annual report to Congress, the Justice Department reported there had been 21 applications for business records to the Foreign Intelligence Surveillance Court (FISC) under Section 215 – all of which were granted, though nine were modified by the court. (The reports do not explain how or why the orders were modified.) 
  • The motion also asks the court to consider the constitutionality of the “gag order” written into Section 215.“There should be no room for secret law,” said Jameel Jaffer, the ACLU’s deputy legal director, adding that disclosure of the FISC rulings is essential if the debate Obama called for is to take place. “The public has a right to know what limits apply to the government’s surveillance authority, and what safeguards are in place to protect individual privacy.” 
Paul Merrell

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Gary Edwards

Comey has Long History of Cases Ending Favorable to Clintons - Tea Party News - 0 views

  • Messages found stored on Clinton’s private email server show that Berger – a convicted thief of classified documents – had been advising Clinton while she served as secretary of state and had access to emails containing classified information. For example, in an email dated Sept. 22, 2009, Berger advised Clinton advised how she could leverage information to make Israeli Prime Minister Benjamin Netanyahu more cooperative in discussions with the Obama administration over a settlement freeze.
  • Law firm ties Berger, Lynch, Mills Berger worked as a partner in the Washington law firm Hogan & Hartson from 1973 to 1977, before taking a position as the deputy director of policy planning at the State Department in the Carter administration. When Carter lost his re-election bid, Berger returned to Hogan & Hartson, where he worked until he took leave in 1988 to act as foreign policy adviser in Gov. Michael Dukakis’ presidential campaign. When Dukakis was defeated, Berger returned to Hogan & Hartson until he became foreign policy adviser for Bill Clinton’s presidential campaign in 1992. On March 28, WND reported Lynch was a litigation partner for eight years at Hogan & Hartson, from March 2002 through April 2010. Mills also worked at Hogan & Hartson, for two years, starting in 1990, before she joined then President-elect Bill Clinton’s transition team, on her way to securing a position as White House deputy counsel in the Clinton administration. According to documents Hillary Clinton’s first presidential campaign made public in 2008, Hogan & Hartson’s New York-based partner Howard Topaz was the tax lawyer who filed income tax returns for Bill and Hillary Clinton beginning in 2004. In addition, Hogan & Hartson in Virginia filed a patent trademark request on May 19, 2004, for Denver-based MX Logic Inc., the computer software firm that developed the email encryption system used to manage Clinton’s private email server beginning in July 2013. A tech expert has observed that employees of MX Logic could have had access to all the emails that went through her account.
  • In 1999, President Bill Clinton nominated Lynch for the first of her two terms as U.S. attorney for the Eastern District of New York, a position she held until she joined Hogan & Hartson in March 2002 to become a partner in the firm’s Litigation Practice Group. She left Hogan & Hartson in 2010, after being nominated by President Obama for her second term as U.S. attorney for the Eastern District of New York, a position she held until Obama nominated her to serve in her current position as attorney general. A report published April 8, 2008, by The American Lawyer noted Hogan & Hartson was among Hillary Clinton’s biggest financial supporters in the legal industry during her first presidential campaign. “Firm lawyers and staff have donated nearly $123,400 to her campaign so far, according to campaign contribution data from the Center for Responsive Politics,” Nate Raymond observed in The American Lawyer article. “Christine Varney, a partner in Hogan’s Washington, D.C., office, served as chief counsel to the Clinton-Gore Campaign in 1992.” While there is no evidence that Lynch played a direct role either in the tax work done by the firm for the Clintons or in linking Hillary’s private email server to MX Logic, the ethics of the legal profession hold all partners jointly liable for the actions of other partners in a business. “If Hogan and Hartson previously represented the Clintons on tax matters, it is incumbent upon U.S. Attorney General Loretta Lynch to [disclose] what, if any, role she had in such tax matters,” said Tom Fitton, president of Washington-based Judicial Watch.
  • ...4 more annotations...
  • HSBC link When Lynch’s nomination as attorney general was considered by the Senate one year ago, as WND reported, the Senate Judiciary Committee examined her role in the Obama administration’s decision not to prosecute the banking giant HSBC for laundering funds for Mexican drug cartels and Middle Eastern terrorists. WND was first to report in a series of articles beginning in 2012 money-laundering charges brought by John Cruz, a former HSBC vice president and relationship manager, based on his more than 1,000 pages of evidence and secret audio recordings. The staff of the Senate Judiciary Committee focused on Cruz’s allegations that Lynch, acting then in her capacity as the U.S. attorney for the Eastern District of New York, engaged in a Department of Justice cover-up. Obama’s attorney general nominee allowed HSBC in December 2011 to enter into a “deferred prosecution” settlement in which the bank agreed to pay a $1.9 billion fine and admit “willful criminal conduct” in exchange for dropping criminal investigations and prosecutions of HSBC directors or employees. Cruz called the $1.92 billion fine the U.S. government imposed on HSBC “a joke” and filed a $10 million lawsuit for “retaliation and wrongful termination.” From 2002 to 2003, Comey held the position of U.S. Attorney for the Southern District of New York, the same position held by Lynch. On March 4, 2013, he joined the HSBC board of directors, agreeing to serve as an independent non-executive director and a member of the bank’s Financial System Vulnerabilities Committee, positions he held until he resigned on Aug. 3, 2013, to become head of the FBI.
  • Comey, Fitzgerald and Valerie Plame On Jan. 1, 2004, the Washington Post reported that after Attorney General John Aschroft recused himself and his staff from any involvement in the investigation of who leaked the name of CIA employee Valerie Plame after journalist Robert Novak named her in print as a CIA operative, Comey assumed the role of acting attorney general for the purposes of the investigation. Comey appointed Patrick J. Fitzgerald, a U.S. attorney in Chicago, to act as special counsel in conducting the inquiry into what became known as “Plamegate.” At the time Comey made the appointment, Fitzgerald was already godfather to one of Comey’s children. On April 13, 2015, co-authoring a USA Today op-ed piece, Plame and her husband, retired ambassador Joseph Wilson, made public their support for Hillary Clinton’s 2016 presidential campaign, openly acknowledging their political closeness to both Hillary and Bill Clinton. The first two paragraphs of the editorial read: We have known Hillary Clinton both professionally and personally for close to 20 years, dating back to before President Bill Clinton’s first trip to Africa in 1998 — a trip that they both acknowledge changed their lives, and gave considerable meaning to their post-White House years and to the activities of the Clinton Foundation. Joe, serving as the National Security Council Senior Director for African Affairs, was instrumental in arranging that historic visit. Our history became entwined with Hillary further after Valerie’s identity as a CIA officer was deliberately exposed. That criminal act was taken in retribution for Joe’s article in The New York Times in which he explained he had discovered no basis for the Bush administration’s justification for the Iraq War that Saddam Hussein was seeking yellowcake uranium to develop a nuclear weapon.
  • In January 2016, Chuck Ross in the Daily Caller reported that Hillary Clinton emails made public made clear that one of her “most frequent favor-seekers when she was secretary of state was former Ambassador Joseph Wilson, a longtime Clinton friend, an endorser of Clinton’s 2008 presidential campaign, and an Africa expert with deep business ties on the continent.” Ross noted that Wilson emailed Clinton on Dec. 22, 2009, seeking help for Symbion Power, an American engineering contractor for whom Wilson consulted, in the company’s bid to pursue a U.S. Agency of International Development contract for work in Afghanistan. In the case of the Afghanistan project, Ross noted, Clinton vouched for Wilson and Symbion as she forwarded the request to Jack Lew, who served then as deputy secretary of state for management and resources. Ross further reported Wilson’s request might also have been discussed with President Obama, as one email indicates. In 2005, Fitzgerald prosecuted Libby, a prominent adviser to then Vice President Dick Cheney, in the Plame investigation, charging him with two counts of perjury, two counts of making false statements to federal prosecutors and one count of obstruction of justice. On March 6, 2007, Libby was convicted of four of the five counts, and on June 5, 2007, was sentenced by U.S. District Judge Reggie B. Walton to two and a half years in federal prison. On April 6, 2015, the Wall Street Journal reported the publication of New York Times reporter Judith Miller’s memoir “The Story: A Reporter’s Journey” exposed “unscrupulous conduct” by Fitzgerald in the 2007 trial of Libby.
  • WSJ reporter Peter Berkowitz noted Miller “writes that Mr. Fitzgerald induced her to give what she now realizes was false testimony.” “By withholding critical information and manipulating her memory as he prepared her to testify, Ms. Miller relates, Mr. Fitzgerald ‘steered’ her ‘in the wrong direction.’” http://www.wnd.com/2016/07/comey-has-long-history-of-clinton-related-cases/
  •  
    Bend over and grab your ankles. The rats nest of Clinton operatives in Washington DC is far deeper than anyone ever imagined. "FBI Director James Comey has a long history of involvement in Department of Justice actions that arguably ended up favorable to the Clintons. In 2004, Comey, then serving as a deputy attorney general in the Justice Department, apparently limited the scope of the criminal investigation of Sandy Berger, which left out former Clinton administration officials who may have coordinated with Berger in his removal and destruction of classified records from the National Archives. The documents were relevant to accusations that the Clinton administration was negligent in the build-up to the 9/11 terrorist attack. On Tuesday, Comey announced that despite evidence of "extreme negligence by Hillary Clinton and her top aides regarding the handling of classified information through a private email server, the FBI would not refer criminal charges to Attorney General Loretta Lynch and the Justice Department. Curiously, Berger, Lynch and Cheryl Mills all worked as partners in the Washington law firm Hogan & Hartson, which prepared tax returns for the Clintons and did patent work for a software firm that played a role in the private email server Hillary Clinton used when she was secretary of state. Lynch and Comey both served as U.S. attorney for the Southern District of New York. They crossed paths in the investigation of HSBC bank, which avoided criminal charges in a massive money-laundering scandal for which the bank paid a $1.9 billion fine. After Attorney General John Aschroft recused himself in the Valerie Plame affair in 2004, Comey appointed as special counsel Patrick J. Fitzgerald, who ended up convicting "Scooter" Libby, a top aide to then Vice President Dick Cheney, of perjury and obstruction of justice. The charge affirmed the accusations of Plame and her former ambassador husband, Joe Wilson - both partisan supporters of Bill and
  •  
    The "ethical" situation is far worse than described. Attorney disciplinary rules require that a lawyer, including all lawyers in the same firm, owe a lifetime duty of loyalty to a client, a duty that does not end with representation in a particular matter. Accordingly, Lynch had what the disciplinary rules refer to as an "actual conflict of interest" between her duties of loyalty to both Hillary and the U.S. government that required her withdrawal from representing either in the decision whether to prosecute Hillary. Saying that she would rubber stamp what Comey recommended was not the required withdrawal. Comey is an investigator, not a prosecutor. This was a situation for appointment of a special counsel to represent the Department of Justice in the decision whether to prosecute, not satisfied by rubber stamping Comey's recomendation,.
Paul Merrell

Whether to Go to War Against Russia Is Top Issue in U.S. Presidential Race | Global Res... - 0 views

  • The United States government has already declared that in regards to what it alleges to be a Russian cyberattack against the U.S. Democratic Party, the U.S. reserves the right to go to war against Russia. NATO has accordingly changed its policy so as to assert that a cyberattack (in this case actually cyber-espionage, such as the U.S. government itself perpetrates against even its own allies such as Angela Merkel by tapping her phone) constitutes an act of war by the alleged cyberattacker, and so requires all NATO member nations to join any cyberattacked NATO nation in war against its alleged (cyber)attacker, if the cyberattacked member declares war against its alleged cyberattacker. Excuses are being sought for a war against Russia; and expanding the definition of “invasion,” to include mere espionage, is one such excuse. But it’s not the only one that the Obama Administration has cooked up. U.S. Senator Mike Lee has asserted that President Barack Obama must obtain a declaration of war against Syria — which is allied with and defended by Russia — before invading Syria. Syria has, for the past few years, already been invaded by tens of thousands of foreign jihadists (financed mainly by the royal Sauds and Qataris, and armed mainly with U.S. weaponry) who are trying to overthrow and replace the Syrian government so that pipelines can be built through Syria into Europe to transport Saudi oil and Qatari gas into the EU, the world’s biggest energy-market, which now is dominated by Russia’s oil and gas. Since Syria is already being defended by Russia (those royals’ major competitor in the oil and gas markets), America’s invasion of Syria would necessarily place U.S. and Russia into an air-war against each other (for the benefit of those royal Arabs — who finance jihadist groups, as even Hillary Clinton acknowledges): Syria would thus become a battleground in a broader war against Russia. So: declaring war against Syria would be a second excuse for World War III, and one which would especially serve the desires not only of U.S. ‘defense’ firms but of the U.S. aristocracy’s royal Arabic allies, who buy much of those ‘defense’ firms’ exports (weaponry), and also U.S. oilfield services firms such as pipelines by Halliburton. (It’s good business for them, no one else. Taxpayers and war-victims pay, but those corporations — and royal families — would profit.)
  • The U.S. government also declares that Russia ‘conquered’ Crimea in 2014 and that Russia must restore it to Ukraine. The U.S. government wants Ukraine to be accepted into NATO, so that all NATO nations will be at war against Russia if Russia doesn’t return Crimea to Ukraine, of which Crimea had only briefly (1954-2014) been a part, until Crimeans voted on 16 March 2014 to rejoin Russia. This Crimean issue is already the basis for America’s economic sanctions against Russia, and thus Russia’s continuing refusal to coerce Crimeans to accept again being part of Ukraine would be yet a third excuse for WW III.
  • Hillary Clinton says “As President, I will make it clear, that the United States will treat cyber attacks just like any other attack.” She alleges that when information was unauthorizedly made public from Democratic National Committee computers, the cyberattacker was Russia. She can be counted as a strong proponent of that excuse for WW3. She’s with Barack Obama and the other neocons on that. She has furthermore said that the U.S. should shoot down any Russian and Syrian bombers in Syria — the phrase for that proposed U.S. policy is to “establish a no-fly zone” there. She makes clear: “I am advocating the no-fly zone.” It would be war against not only Syria, but Russia. (After all: a no-fly zone in which the U.S. is shooting down the government’s planes and Russia’s planes, would be war by the U.S. against both Syria and Russia, but that’s what she wants to do.) She can thus be counted as a strong proponent of those two excuses for WW3.
  • ...4 more annotations...
  • On the matter of Crimea, she has said that “Putin invaded and annexed Crimea,” and “In the wake of Russia’s illegal annexation of Crimea in early 2014, some have argued that NATO expansion either caused or exacerbated Russia’s aggression. I disagree with that argument.” She believes that the expansion of NATO right up to Russia’s borders is good, not horrific and terrifying (as it is to Russians — just like USSR’s conquering of Mexico would have been terrifying to Americans if USSR did that during the Cold War). Furthermore, because Ukraine is the main transit-route for Russian gas-pipelines into Europe, the coup that in 2014 overthrew the neutralist democratically elected President of Ukraine and replaced him by leaders who seek NATO membership for Ukraine and who have the power to cut off those pipelines, was strongly supported by both Obama and Clinton. She can thus be counted as a strong proponent of all three excuses for WW3. U.S. President Obama has made unequivocally clear that he regards Russia as being by far the world’s most “aggressive” nation; and Clinton, too, commonly uses the term “aggression” as describing Russia (such as she did by her denial that “NATO expansion either caused or exacerbated Russia’s aggression”). To her, Russia’s opposing real aggression by the U.S. (in this case, America’s 2014 coup that overthrew the democratically elected Ukrainian President for whom 75% of Crimeans had voted), constitutes ‘Russia’s aggression’, somehow. Furthermore, as regards whether Crimea’s rejoining Russia was ‘illegal’ as she says: does she also deny the right of self-determination of peoples regarding the residents of Catalonia though the Spanish government accepts it there, and also by the residents of Scotland though the British government accepts it there? Or is she simply determined to have as many excuses to invade Russia as she can have? She has never condemned the independence movements in Scotland or Catalonia. The United States is clearly on a path toward war with Russia. Donald Trump opposes all aspects of that policy.
  • That’s the main difference between the two U.S. Presidential candidates. Trump makes ridiculous statements about the ‘need’ to increase ‘defense’ spending during this period of soaring federal debt, but he has consistently condemned the moves toward war against Russia and said that America’s real enemy is jihadists, and that Russia is on our side in this war — the real war — not an enemy of America such as Hillary Clinton and Barack Obama claim. Both candidates (Trump and Clinton) are war-hawks, but Hillary wants to go to war against both jihadists and Russia, whereas Trump wants to go to war only against jihadists. Trump’s charge that Hillary would be a catastrophic President is borne out not only by her past record in public office, but by her present positions on these issues.
  • Americans are being offered, by this nation’s aristocracy, a choice between a marginally competent and deeply evil psychopath Hillary Clinton, versus an incompetent but far less evil psychopath Donald Trump, and the nation’s press are reporting instead a choice between two candidates of whom one (the actually evil Clinton) is presented as being far preferable to the other (the actually incompetent Trump), and possibly as being someone who might improve this nation if not the world. Virtually none of America’s Establishment is willing to report the truth: that the nation’s rotting will get worse under either person as President, but that only under Trump might this nation (and the world) stand a reasonable likelihood of surviving at all (i.e., nuclear war with Russia being averted). Things won’t get better, but they definitely could get a hell of a lot worse — and this is the issue, the real one, in the present election: WW3, yes or no on that. Hillary Clinton argues that she, with her neoconservative backing (consisting of the same people who cheer-led the invasion of Russia-friendly Iraq, and who shared her joy in doing the same to Russia-friendly Libya — “We came, we saw, he died, ha ha!”), is the better person to have her finger on the nuclear button with Russia. This U.S. Presidential election will be decided upon the WW3-issue, unless the American electorate are incredibly stupid (or else terribly deceived): Is she correct to allege that she and not Trump should have control over the nuclear button against Russia? She’s even more of a neoconservative than Obama is, and this is why she has the endorsement of neoconservatives in this election. And that is the issue.
  • The real question isn’t whether America and the world will be improved by the next U.S. President; it’s whether America and the world will be destroyed by the next U.S. President. All else is mere distraction, by comparison. And the U.S. public now are extremely distracted — unfortunately, even by the candidates themselves. The pathetic Presidential candidates that the U.S. aristocracy has provided to Americans, for the public’s votes in the final round, don’t focus on this reality. Anyone who thinks that the majority of billionaires can’t possibly believe in a ‘winnable’ nuclear war and can’t possibly be wanting WW3 should read this. That was published by the Council on Foreign Relations, Wall Street’s international-affairs think tank. They mean business. And that’s the source of neoconservatism — the top U.S.-based international corporations, mainly in ‘defense’ and oil and Wall Street. (Clinton’s career is based upon precisely those three segments, whereas Trump’s is based instead upon real estate and entertainment, neither of which segments is neoconservative.) It doesn’t come from nowhere; it comes from the people who buy and sell politicians.
  •  
    A must-read
Paul Merrell

Brazil Looks to Break from U.S.-Centric Internet | TIME.com - 0 views

  • Brazil plans to divorce itself from the U.S.-centric Internet over Washington’s widespread online spying, a move that many experts fear will be a potentially dangerous first step toward fracturing a global network built with minimal interference by governments. President Dilma Rousseff ordered a series of measures aimed at greater Brazilian online independence and security following revelations that the U.S. National Security Agency intercepted her communications, hacked into the state-owned Petrobras oil company’s network and spied on Brazilians who entrusted their personal data to U.S. tech companies such as Facebook and Google. The leader is so angered by the espionage that on Tuesday she postponed next month’s scheduled trip to Washington, where she was to be honored with a state dinner. Internet security and policy experts say the Brazilian government’s reaction to information leaked by former NSA contractor Edward Snowden is understandable, but warn it could set the Internet on a course of Balkanization.
  • “The global backlash is only beginning and will get far more severe in coming months,” said Sascha Meinrath, director of the Open Technology Institute at the Washington-based New America Foundation think tank. “This notion of national privacy sovereignty is going to be an increasingly salient issue around the globe.” While Brazil isn’t proposing to bar its citizens from U.S.-based Web services, it wants their data to be stored locally as the nation assumes greater control over Brazilians’ Internet use to protect them from NSA snooping. The danger of mandating that kind of geographic isolation, Meinrath said, is that it could render inoperable popular software applications and services and endanger the Internet’s open, interconnected structure.
  • The effort by Latin America’s biggest economy to digitally isolate itself from U.S. spying not only could be costly and difficult, it could encourage repressive governments to seek greater technical control over the Internet to crush free expression at home, experts say. In December, countries advocating greater “cyber-sovereignty” pushed for such control at an International Telecommunications Union meeting in Dubai, with Western democracies led by the United States and the European Union in opposition.
  • ...5 more annotations...
  • Rousseff says she intends to push for international rules on privacy and security in hardware and software during the U.N. General Assembly meeting later this month. Among Snowden revelations: the NSA has created backdoors in software and Web-based services. Brazil is now pushing more aggressively than any other nation to end U.S. commercial hegemony on the Internet. More than 80 percent of online search, for example, is controlled by U.S.-based companies. Most of Brazil’s global Internet traffic passes through the United States, so Rousseff’s government plans to lay underwater fiber optic cable directly to Europe and also link to all South American nations to create what it hopes will be a network free of U.S. eavesdropping.
  • More communications integrity protection is expected when Telebras, the state-run telecom company, works with partners to oversee the launch in 2016 of Brazil’s first communications satellite, for military and public Internet traffic. Brazil’s military currently relies on a satellite run by Embratel, which Mexican billionaire Carlos Slim controls. Rousseff is urging Brazil’s Congress to compel Facebook, Google and all companies to store data generated by Brazilians on servers physically located inside Brazil in order to shield it from the NSA. If that happens, and other nations follow suit, Silicon Valley’s bottom line could be hit by lost business and higher operating costs: Brazilians rank No. 3 on Facebook and No. 2 on Twitter and YouTube. An August study by a respected U.S. technology policy nonprofit estimated the fallout from the NSA spying scandal could cost the U.S. cloud computing industry, which stores data remotely to give users easy access from any device, as much as $35 billion by 2016 in lost business.
  • Brazil also plans to build more Internet exchange points, places where vast amounts of data are relayed, in order to route Brazilians’ traffic away from potential interception. And its postal service plans by next year to create an encrypted email service that could serve as an alternative to Gmail and Yahoo!, which according to Snowden-leaked documents are among U.S. tech giants that have collaborated closely with the NSA. “Brazil intends to increase its independent Internet connections with other countries,” Rousseff’s office said in an emailed response to questions from The Associated Press on its plans. It cited a “common understanding” between Brazil and the European Union on data privacy, and said “negotiations are underway in South America for the deployment of land connections between all nations.” It said Brazil plans to boost investment in home-grown technology and buy only software and hardware that meet government data privacy specifications.
  • While the plans’ technical details are pending, experts say they will be costly for Brazil and ultimately can be circumvented. Just as people in China and Iran defeat government censors with tools such as “proxy servers,” so could Brazilians bypass their government’s controls. International spies, not just from the United States, also will adjust, experts said. Laying cable to Europe won’t make Brazil safer, they say. The NSA has reportedly tapped into undersea telecoms cables for decades. Meinrath and others argue that what’s needed instead are strong international laws that hold nations accountable for guaranteeing online privacy.
  • “There’s nothing viable that Brazil can really do to protect its citizenry without changing what the U.S. is doing,” he said. Matthew Green, a Johns Hopkins computer security expert, said Brazil won’t protect itself from intrusion by isolating itself digitally. It will also be discouraging technological innovation, he said, by encouraging the entire nation to use a state-sponsored encrypted email service. “It’s sort of like a Soviet socialism of computing,” he said, adding that the U.S. “free-for-all model works better.”
  •  
    So both Brazil and the European Union are planning to boycott the U.S.-based cloud industry, seizing on the NSA's activities as legal grounds. Under the various GATT series of trade agreements, otherwise forbidden discriminatory actions taken that restrict trade in aid of national security are exempt from redress through the World Trade Organization Dispute Resolution Process. So the NSA voyeurs can add legalizing economic digital discrimination against the U.S. to its score card.
1 - 20 of 481 Next › Last »
Showing 20 items per page