Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged national-security-state

Rss Feed Group items tagged

Gary Edwards

Byron York: Justice Department demolishes case against Trump order | Washington Examiner - 1 views

  •  
    "James Robart, the U.S. district judge in Washington State, offered little explanation for his decision to stop President Trump's executive order temporarily suspending non-American entry from seven terror-plagued countries. Robart simply declared his belief that Washington State, which in its lawsuit against Trump argued that the order is both illegal and unconstitutional, would likely win the case when it is tried. Now the government has answered Robart, and unlike the judge, Justice Department lawyers have produced a point-by-point demolition of Washington State's claims. Indeed, for all except the most partisan, it is likely impossible to read the Washington State lawsuit, plus Robart's brief comments and writing on the matter, plus the Justice Department's response, and not come away with the conclusion that the Trump order is on sound legal and constitutional ground. Beginning with the big picture, the Justice Department argued that Robart's restraining order violates the separation of powers, encroaches on the president's constitutional and legal authority in the areas of foreign affairs, national security, and immigration, and "second-guesses the president's national security judgment" about risks faced by the United States. Indeed, in court last week, Robart suggested that he, Robart, knows as much, or perhaps more, than the president about the current state of the terrorist threat in Yemen, Somalia, Libya, and other violence-plagued countries. In an exchange with Justice Department lawyer Michelle Bennett, Robart asked, "How many arrests have there been of foreign nationals for those seven countries since 9/11?" "Your Honor, I don't have that information," said Bennett. "Let me tell you," said Robart. "The answer to that is none, as best I can tell. So, I mean, you're here arguing on behalf of someone [President Trump] that says: We have to protect the United States from these individuals coming from these countries, and there's no support for that."
Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Paul Merrell

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • ...14 more annotations...
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
Gary Edwards

75 Economic Numbers From 2012 That Are Almost Too Crazy To Believe - 0 views

  •  
    Thanks to Marbux we have this extraordinary collection of facts and figures describing the economic catastrophe that has hit the USA.  excerpt: "What a year 2012 has been!  The mainstream media continues to tell us what a "great job" the Obama administration and the Federal Reserve are doing of managing the economy, but meanwhile things just continue to get even worse for the poor and the middle class.  It is imperative that we educate the American people about the true condition of our economy and about why all of this is happening.  If nothing is done, our debt problems will continue to get worse, millions of jobs will continue to leave the country, small businesses will continue to be suffocated, the middle class will continue to collapse, and poverty in the United States will continue to explode.  Just "tweaking" things slightly is not going to fix our economy.  We need a fundamental change in direction.  Right now we are living in a bubble of debt-fueled false prosperity that allows us to continue to consume far more wealth than we produce, but when that bubble bursts we are going to experience the most painful economic "adjustment" that America has ever gone through.  We need to be able to explain to our fellow Americans what is coming, why it is coming and what needs to be done.  Hopefully the crazy economic numbers that I have included in this article will be shocking enough to wake some people up. The end of the year is a time when people tend to gather with family and friends more than they do during the rest of the year.  Hopefully many of you will use the list below as a tool to help start some conversations about the coming economic collapse with your loved ones.  Sadly, most Americans still tend to doubt that we are heading into economic oblivion.  So if you have someone among your family and friends that believes that everything is going to be "just fine", just show them these numbers.  They are a good summary of the problems that the U
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

BDS SOUTH AFRICA: ISRAEL INCHES CLOSER TO 'TIPPING POINT' OF SOUTH AFRICA-STYLE BOYCOTT... - 0 views

  • Analogies with apartheid regime in the wake of Mandela’s death could accelerate efforts to ostracize Israel. This has happened in recent days: The Dutch water company Vitens severed its ties with Israeli counterpart Mekorot; Canada’s largest Protestant church decided to boycott three Israeli companies; the Romanian government refused to send any more construction workers; and American Studies Association academics are voting on a measure to sever links with Israeli universities. Coming so shortly after the Israeli government effectively succumbed to a boycott of settlements in order to be eligible for the EU’s Horizon 2020 scientific cooperation agreement, it is hard to avoid the conclusion that the BDS (Boycott, Divestment and Sanctions) movement is picking up speed. And the writing on the wall, if anyone missed it, only got clearer and sharper in the wake of the death of Nelson Mandela.
  • When the United Nations passed its first non-binding resolution calling for a boycott of South Africa in 1962, it was staunchly opposed by a bloc of Western countries, led by Britain and the United States. But the grassroots campaign that had started with academic boycotts in the late 1950s gradually moved on to sports and entertainment and went on from there to institutional boycotts and divestment. Along the way, the anti-apartheid movement swept up larger and larger swaths of Western public opinion, eventually forcing even the most reluctant of governments, including Israel and the U.S., to join the international sanctions regime. 
  • We’re really great at knowing where thresholds are after we fall off the cliff, but that’s not very helpful,” as lake ecologist and “tipping point” researcher Stephen Carpenter told USA today in 2009.  Israel could very well be approaching such a threshold. Among the many developments that could be creating the required critical mass one can cite the passage of time since the Twin Towers attacks in September 2001, which placed Israel in the same camp as the U.S. and the West in the War on Terror; Israel’s isolation in the campaign against Iran’s nuclear programs; the disappearance of repelling archenemies such as Osama bin Laden, Muammar Gadhafi, Mahmoud Ahmadinejad and, to a lesser degree, Yasser Arafat; the relative security and lack of terror inside Israel coupled with its own persistent settlement drive; and the negative publicity generated by revelations of racism in Israeli society, the image of its rulers as increasingly rigid and right wing and the government’s own confrontations with illegal African immigrants and Israeli Bedouin, widely perceived as being tinged with bias and prejudice.  In recent days, American statesmen seem to be more alarmed about the looming danger of delegitimization than Israelis are. In remarks to both the Saban Forum and the American Joint Distribution Committee this week, Secretary of State John Kerry described delegitimization as “an existential danger." Vice President Joe Biden, speaking to the same JDC forum, went one step further: “The wholesale effort to delegitimize Israel is the most concentrated that I have seen in the 40 years I have served. It is the most serious threat in my view to Israel’s long-term security and viability.” 
  • ...1 more annotation...
  • One must always take into account the possibility of unforeseen developments that will turn things completely around. Barring that, the only thing that may be keeping Israel from crossing the threshold and “going over the cliff” in the international arena is Kerry’s much-maligned peace process, which is holding public opinion and foreign governments at bay and preventing a “tipping point” that would dramatically escalate the anti-Israeli boycott campaign.  Which only strengthens Jeffrey Goldberg’s argument in a Bloomberg article on Wednesday that Kerry is “Israel’s best friend." It also highlights, once again, how narrow-minded, shortsighted and dangerously delusional Kerry’s critics, peace process opponents and settlement champions really are (though you can rest assured that if and when the peace process collapses and Israel is plunged into South African isolation, they will be pointing their fingers in every direction but themselves.
  •  
    Note that this article's original is behind a paywall in Haaretz, one of Israel's market-leading newspapers.  There can be no questioning of the facts that: [i] the Palestinian Boycott, Divesment, and Sanctions ("BDS") movement is rapidly gaining strength globally; and [ii] that factor weighs heavily in the negotiations between Israel and Palestine for a two-state solution. Although not bluntly stated, the BSD movement's path runs directly to a single-state solution that would sweep Israel's present right-wing government from power and result in a secular state rather than a "Jewish state." And the E.U., Israel's largest export market, has promised to go even farther in sanctioning Israel than the considerable distance it has already gone if the negotiations do not result in a two state solution. Labeling all products produced wholly or in part in Israel-occupied Palestine territory is among the mildest of sanctions under discussion, a measure already adopted in two E.U. nations. The BSD Movement's success has also been marked by Israel attaining the pariah state status previously experienced by South Africa. Only the U.S., Canada, and a half-dozen or so tiny island nations closely aligned with the U.S. still vote in favor of Israel at the U.N. For example, the vote on granting Palestine U.N. observer state status was 138-9, with 41 abstentions.  The prospect of an end to the non-secular Jewish state has enormous ramifications for U.S. foreign policy, not the least of which is the influence of the Israel lobby in the U.S. that has thus far led the U.S. to three Treasury-draining wars in Southwest Asia and Northern Africa and host of minor military actions in other area nations, as well as a near-war in Syria, averted mainly via Russian diplomacy that outfoxed Secretary of State John Kerry. Time will tell whether the diplomatic outreach by Iran will succeed in averting war with the greatest military power remaining in the Mideast after Israel itself. "Protectin
Paul Merrell

New regs say passengers cannot fly without biometric ID card - Police State USA - 0 views

  • The ability to travel in the United States is about to become more restrictive as the TSA announces it will soon be enforcing new identification standards in American airports. Beginning in 2016, passengers attempting to pass through a federal TSA checkpoint will be subject to the requirements of the REAL ID Act. To that end, the TSA will put higher scrutiny on travelers’ identities, and will only accept a federal passport or a “REAL-ID” card, which is issued by the states to meet federal requirements. Passengers will not be allowed to fly through an American airport without submitting to the advanced federal specifications. Both federal passports and REAL-ID cards require a number of unique personal identifiers to be stored together in government databases, including his or her full name, date of birth, Social Security Number, scanned signature, and other identifiers. Both cards require biometric data: a front-facing digital photograph of the passenger’s face, which is ultimately used with a facial recognition database.
  • The enhanced security measures stem from the passage of the REAL ID Act of 2005, a U.S. law enacted by President Bush that states that a Federal agency may not accept state-issued identification cards without complying with a number of enhanced standards of the REAL ID Act. The states were given a number of years to comply, and many moved to pass their own laws to meet the benchmarks of the REAL ID Act. Due to some sluggish response, DHS extended the compliance deadline several times. Unfortunately, most states were all too willing to bend to the requirements of the federal government in order to obtain “state certifications” of compliance. To signify their compliance with the federal standards, many states are now issuing identity cards emblazoned with gold stars in the corner.
  • According to the Department of Homeland Security, only Arizona, Idaho, Louisiana, Maine, Minnesota, New Hampshire, New York, and American Samoa have not met REAL ID standards as of January 2015. By DHS estimates, 70%-80% of all U.S. drivers are already carrying around REAL ID cards or live in states that have received extensions for compliance. Some states have even gone as far as to require the applicant to present birth certificates, W-2 tax forms, bank statements, and/or pay stubs to verify one’s identity before handing out the new REAL-ID cards. Some cards have RFID chips embedded in them. Among the 39 benchmarks of the REAL ID Act, state ID cards have to be scannable with a bar code reader, and the states are required to share access to an electronic database with all other states.
  • ...4 more annotations...
  • a few rose in opposition to REAL ID, including Congressman Ron Paul (R-TX), who was perhaps its most outspoken critic. Dr. Paul, a former presidential candidate, called REAL ID a “Trojan horse” which “transform[s] state drivers licenses into de facto national ID cards.” In an impassioned speech on the House floor on February 9, 2005, Paul laid out a number of specific objections to H.R. 418: The REAL ID Act establishes a national ID card by mandating that states include certain minimum identification standards on driver’s licenses. It contains no limits on the government’s power to impose additional standards. Indeed, it gives authority to the Secretary of Homeland Security to unilaterally add requirements as he sees fit.
  • Once DHS begins enforcing the REAL ID standards, Americans without a compliant state ID will be effectively prohibited from flying at a commercial airport. Passengers would need to obtain passports even to fly on planes that never leave the United States.
  • Supporters claim it is not a national ID because it is voluntary. However, any state that opts out will automatically make non-persons out of its citizens. The citizens of that state will be unable to have any dealings with the federal government because their ID will not be accepted. They will not be able to fly or to take a train. In essence, in the eyes of the federal government they will cease to exist. It is absurd to call this voluntary. Republican Party talking points on this bill, which claim that this is not a national ID card, nevertheless endorse the idea that “the federal government should set standards for the issuance of birth certificates and sources of identification such as driver’s licenses.” So they admit that they want a national ID but at the same time pretend that this is not a national ID. This bill establishes a massive, centrally-coordinated database of highly personal information about American citizens: at a minimum their name, date of birth, place of residence, Social Security number, and physical and possibly other characteristics. What is even more disturbing is that, by mandating that states participate in the “Drivers License Agreement,” this bill creates a massive database of sensitive information on American citizens that will be shared with Canada and Mexico!
  • This bill could have a chilling effect on the exercise of our constitutionally guaranteed rights. It re-defines “terrorism” in broad new terms that could well include members of firearms rights and anti-abortion groups, or other such groups as determined by whoever is in power at the time. There are no prohibitions against including such information in the database as information about a person’s exercise of First Amendment rights or about a person’s appearance on a registry of firearms owners. REAL ID cards streamline the process for the centralization and federalization of our private biometric data, while offering very little true benefit. In the words of Congressman Ron Paul, the program “offers us a false sense of greater security at the cost of taking a gigantic step toward making America a police state.” Its difficult to argue otherwise when passports may soon be necessary to travel domestically.
  •  
    This is among the reasons I no longer fly. I refuse to be treated in that distrustful way by my government. Atthough I used to fly several hundred thousands of miles annually, if the airlines want my business, they need to actively and effectively oppose the emergence of the surveillance state. I reject the politics of fear that attempts to justify suppression of liberties. Where I travel is none of the government's business.
Paul Merrell

'This Week' Transcript: Ambassador Samantha Power - ABC News - 0 views

  • STEPHANOPOULOS: And we are joined now by the U.S. Ambassador to the United Nations Samantha Power. Thanks for coming back to This Week. And you know, the president said he's prepared to strike Syria. Those strikes could be imminent. Will the United States try to get UN Security Council authorization first? Or do you accept now that's just not going to be possible? SAMANTHA POWER, U.S. AMBASSADOR TO THE UNITED NATIONS: Well, let me say that Secretary Kerry just convened a meeting of the Security Council on Friday which showcased just how much support there is on the Security Council and in the broader international community for the anti-ISIL effort. STEPHANOPOULOS: But the Russia veto.
  • POWER: Russia has vetoed in the past, but on very different issues. I think Russia has made clear for a long time its opposition to ISIL. The Iraqis have appealed to the international community to come to their defense not only in Iraq, but also to go after safe havens in foreign countries. And what they mean by that of course is Syria. And they're quite explicit about that. So they have made an appeal to the international community for collective defense. And we think we have a legal basis we need if the president decides... STEPHANOPOULOS: Without a UN authorization. POWER: Consistent with the UN charter, we -- it will depend on the facts and circumstances of any particular strike in Syria, but we have a legal basis we need.
  •  
    Context: U.S. Ambassador to the U.N., Samantha Power, holds the U.N. Security Council's rotating chair this month. Powers'  claims a right for the U.S. to wage war against ISIL in Syria on grounds of the collective security exception to the U.N. Charter's prohibition; that is, that the U.S. has a collective security agreement with the nation of Iraq, that makes it lawful for the U.S. to strike ISIL. True enough as a matter of international law, ignoring the fact that Obama has yet to obtain permission from the U.S. Congress, which the U.S. Constitution requires him to do. But ISIL is not the nation of Syria; hence to attack ISIL in Syria, an additional exception is necessary for both Iraq and the U.S. The only other recognized exception that might seem to do deals with the situation when a nation in which a private organization inflicting harm on another nation  is "unwilling or unable" to protect the second nation (Iraq) from the depradations of the private organization. And that is where Powers' legal analysis dissembles because the U.S. has been actively attempting to overthrow the Syrian government via proxy terrorist organizations including ISIL. So the U.S. lacks clean hands in claiming any lawful right to invade Syria on the theory that the Syrian government is unwilling or unable to put down the ISIL organization. The Syrian government is certainly willing and has been attempting to do so. But its inability to do so thus far is entirely due to the U.S., its Gulf Coast state allies, and its ally Turkey continuing to supply ISIL and other terrorist groups in Syria with weapons, training, and supplies, aimed at overthrowing the Syrian government. The doctrine of unclean hands has limited applicability in international law governing human rights. See Lisa LaPlante, The Law of Remedies and the Clean Hands Doctrine: Exclusionary Reparation Policies in Peru's Political Transition, 23 Am Univ Int Law Rev 50 (2007), https://digitalcommons.wcl.american.edu/cg
Gary Edwards

Major Banksters, Governmental Officials and Their Comrade Capitalists Targets of Spire ... - 0 views

  •  
    "NEW YORK, Oct. 25, 2012 /PRNewswire via COMTEX/ -- Spire Law Group, LLP's national home owners' lawsuit, pending in the venue where the "Banksters" control their $43 trillion racketeering scheme (New York) - known as the largest money laundering and racketeering lawsuit in United States History and identifying $43 trillion ($43,000,000,000,000.00) of laundered money by the "Banksters" and their U.S. racketeering partners and joint venturers - now pinpoints the identities of the key racketeering partners of the "Banksters" located in the highest offices of government and acting for their own self-interests. In connection with the federal lawsuit now impending in the United States District Court in Brooklyn, New York (Case No. 12-cv-04269-JBW-RML) - involving, among other things, a request that the District Court enjoin all mortgage foreclosures by the Banksters nationwide, unless and until the entire $43 trillion is repaid to a court-appointed receiver - Plaintiffs now establish the location of the $43 trillion ($43,000,000,000,000.00) of laundered money in a racketeering enterprise participated in by the following individuals (without limitation): Attorney General Holder acting in his individual capacity, Assistant Attorney General Tony West, the brother in law of Defendant California Attorney General Kamala Harris (both acting in their individual capacities), Jon Corzine (former New Jersey Governor), Robert Rubin (former Treasury Secretary and Bankster), Timothy Geitner, Treasury Secretary (acting in his individual capacity), Vikram Pandit (recently resigned and disgraced Chairman of the Board of Citigroup), Valerie Jarrett (a Senior White House Advisor), Anita Dunn (a former "communications director" for the Obama Administration), Robert Bauer (husband of Anita Dunn and Chief Legal Counsel for the Obama Re-election Campaign), as well as the "Banksters" themselves, and their affiliates and conduits. The lawsuit alleges serial violations of the United States Patri
  •  
    This is the first time anyone has tried to go after the Bankster class of midievil (mediæval) elites to recover theft of funds. Charges include racketeering, fraud and international money laundering. The mass tort action is now in the Brooklyn Federal Courts. Dead bodies are starting to show up as the Banksters move to shut down press coverage. Amazing stuff.
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
Paul Merrell

WA State Bill Proposes Criminalizing Help to NSA, Turning Off Resources to Yakima Facil... - 0 views

  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • Lawmakers in Oklahoma, California and Indiana have already introduced similar legislation, and a senator in Arizona has committed to running it there, but Washington counts as the first state with an actual NSA facility within its borders to consider the Fourth Amendment Protection Act. The NSA operates a listening center on the Army’s Yakima Training Center (YTC). The NSA facility is in Taylor’s district, and he said he cannot sit idly by while a secretive facility in his own backyard violate the rights of people everywhere. “We’re running the bill to provide protection against the ever increasing surveillance into the daily lives of our citizens,” he said. “Our Founding Fathers established a series of checks and balances in the Constitution. Given the federal government’s utter failure to address the people’s concerns, it’s up to the states to stand for our citizens’ constitutional rights.”
  • ...3 more annotations...
  • According to documents made public by the US Military, as of 2008, a company called PacifiCorp serves as the primary supplier of electric power, and Cascade Natural Gas Corporation supplies natural gas to YTC. The Kittitas Public Utility District, a function of the state of Washington, provides electric power for the MPRC and the Doris site, but no documentation has yet proven that it also provides electricity used directly by the NSA facility on site. And while YTC does provide a bulk of its own water, documents also show that some of it gets there by first passing through upstream dams owned and operated by the State. The Army report states, “YTC lies within three WAUs whose boundaries coincide with WRIAs, as defined by the State of Washington natural resource agencies.” WAU’s are Washington State Water Administration Units. WRIAs are Washington State Water Resource Inventory Areas A Washington company also has a strong link to the NSA. Cray Inc. builds supercomputers for the agency.
  • If the bill passes, it would set in motion actions to stop any state support of the Yakima center as long as it remains in the state, and could make Cray ineligible for any contracts with the state or its political subdivisions. Three public universities in Washington join 166 schools nationwide partnering with the NSA. Taylor’s bill would address these schools’ status as NSA “Centers of Academic Excellence,” and would bar any new partnerships with other state colleges or universities. Tenth Amendment Center national communications director Mike Maharrey says the bills prohibition against using unconstitutionally gathered data in state court would probably have the most immediate impact. In fact, lawmakers in Kansas and Missouri will consider bills simply addressing this kind of data sharing.
  • “We know the NSA shares data with state and local law enforcement. We know from a Reuters report that most of this shared data has absolutely nothing to do with national security issues. This bill would make that information inadmissible in state court,” he said. “This data sharing shoves a dagger into the heart of the Fourth Amendment. This bill would stop that from happening. This is a no-brainer. Every state should do it.” Maharrey said he expects at least three more states to introduce the act within the next few weeks. “This idea is catching fire,” he said. “And why wouldn’t it? We have an out of control agency spying on virtually everybody in the world. We have a president and a Congress that appears poised to maybe put a band aid on it. Americans are realizing if we are going to slow down the NSA, we are going to have to take a different approach. This is it.”
Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Gary Edwards

Benghazi report: Trinkets of treason - 1 views

  •  
    The truth is dribbling out, thn=anks to Douglas J. Hagmann and Canada Free Press .....................  We've been aligned and hostage to the Saudi Royal Family ever since FDR met with King Ibn Saud, Feb 14th, 1945 near the end of WWII.  It was at this meeting that FDR promised protection for the Saudi family in exchange for the right to develop Saudi oil and sell that oil exclusively in dollars.  Hence the "petro dollar" - backed by Saudi oil instead of GOLD. That agreement, and our subsequent history of our military and state departments acting to further Saudi interests has dominated America.  Our troops and military resources ae mercenaries fighting for Saudi dominance of the Globalist ruling elites.  Our politicians are bought and paid for by the Saudi Globalist Alliance.  They have sold their souls for power and money, with the destruction of the USA Constitution the only thing standing between the Globalist and their quest to rule the world. excerpt: We are witnessing one of the biggest government cover-ups since Watergate. A cover-up that involves murder, arms trafficking, and lies by high ranking officials under oath. It involves the murderous attacks in Benghazi, and congressional investigators just released a 46-page interim progress report that at least exposes Hillary Rodham Clinton and the White House lying under oath. Where's the accountability? Where's the outrage? Where's the media? A 46-page interim progress report of an ongoing investigation across five House Committees by the U.S. House of Representatives was released on Tuesday, April 23, 2013. The executive summary states that former Secretary of State Hillary Rodham Clinton signed off on a reduction of diplomatic security forces suggesting that this reduction of security was, in large part, to blame for the attack in Benghazi on September 11, 2012.  The report emphasizes that this is "inconsistent" with her sworn testimony of January 23, 2013. Simply stated, Hillary Rod
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

Responding to Failure: Reorganizing U.S. Policies in the Middle East | Middle East Poli... - 0 views

  • I want to speak with you today about the Middle East. This is the region where Africa, Asia, and Europe come together. It is also the part of the world where we have been most compellingly reminded that some struggles cannot be won, but there are no struggles that cannot be lost. It is often said that human beings learn little useful from success but can learn a great deal from defeat. If so, the Middle East now offers a remarkably rich menu of foreign-policy failures for Americans to study. • Our four-decade-long diplomatic effort to bring peace to the Holy Land sputtered to an ignominious conclusion a year ago. • Our unconditional political, economic, and military backing of Israel has earned us the enmity of Israel’s enemies even as it has enabled egregiously contemptuous expressions of ingratitude and disrespect for us from Israel itself.
  • • Our attempts to contain the Iranian revolution have instead empowered it. • Our military campaigns to pacify the region have destabilized it, dismantled its states, and ignited ferocious wars of religion among its peoples. • Our efforts to democratize Arab societies have helped to produce anarchy, terrorism, dictatorship, or an indecisive juxtaposition of all three. • In Iraq, Libya, and Syria we have shown that war does not decide who’s right so much as determine who’s left. • Our campaign against terrorism with global reach has multiplied our enemies and continuously expanded their areas of operation. • Our opposition to nuclear proliferation did not prevent Israel from clandestinely developing nuclear weapons and related delivery systems and may not preclude Iran and others from following suit.
  • • At the global level, our policies in the Middle East have damaged our prestige, weakened our alliances, and gained us a reputation for militaristic fecklessness in the conduct of our foreign affairs. They have also distracted us from challenges elsewhere of equal or greater importance to our national interests. That’s quite a record.
  • ...12 more annotations...
  • One can only measure success or failure by reference to what one is trying achieve. So, in practice, what have U.S. objectives been? Are these objectives still valid? If we’ve failed to advance them, what went wrong? What must we do now to have a better chance of success? Our objectives in the Middle East have not changed much over the course of the past half century or more. We have sought to 1. Gain acceptance and security for a Jewish homeland from the other states and peoples of the region; 2. Ensure the uninterrupted availability of the region’s energy supplies to sustain global and U.S. security and prosperity; 3. Preserve our ability to transit the region so as to be able to project power around the world; 4. Prevent the rise of a regional hegemon or the deployment of weapons of mass destruction that might threaten any or all of these first three objectives; 5. Maximize profitable commerce; and 6. Promote stability while enhancing respect for human rights and progress toward constitutional democracy. Let’s briefly review what’s happened with respect to each of these objectives. I will not mince words.
  • Israel has come to enjoy military supremacy but it remains excluded from most participation in its region’s political, economic, and cultural life. In the 67 years since the Jewish state was proclaimed, Israel has not made a single friend in the Middle East, where it continues to be regarded as an illegitimate legacy of Western imperialism engaged in racist removal of the indigenous population. International support for Israel is down to the United States and a few of the former colonial powers that originally imposed the Zionist project on the Arabs under Sykes-Picot and the related Balfour Declaration. The two-state solution has expired as a physical or political possibility. There is no longer any peace process to distract global attention from Israel’s maltreatment of its captive Arab populations. After years of deference to American diplomacy, the Palestinians are about to challenge the legality of Israel’s cruelties to them in the International Criminal Court and other venues in which Americans have no veto, are not present, or cannot protect the Jewish state from the consequences of its own behavior as we have always been able to do in the past. Israel’s ongoing occupation of the West Bank and siege of Gaza are fueling a drive to boycott its products, disinvest in its companies, and sanction its political and cultural elite. These trends are the very opposite of what the United States has attempted to achieve for Israel.
  • In a stunning demonstration of his country’s most famous renewable resource — chutzpah — Israel’s Prime Minister chose this very moment to make America the main issue in his reelection campaign while simultaneously transforming Israel into a partisan issue in the United States. This is the very opposite of a sound survival strategy for Israel. Uncertainties about their country’s future are leading many Israelis to emigrate, not just to America but to Europe. This should disturb not just Israelis but Americans, if only because of the enormous investment we have made in attempts to gain a secure place for Israel in its region and the world. The Palestinians have been silent about Mr. Netanyahu’s recent political maneuvers. Evidently, they recall Napoleon’s adage that one should never interrupt an enemy when he is making a mistake. This brings me to an awkward but transcendently important issue. Israel was established as a haven from anti-Semitism — Jew hatred — in Europe, a disease of nationalism and Christian culture that culminated in the Holocaust. Israel’s creation was a relief for European Jews but a disaster for the Arabs of Palestine, who were either ethnically cleansed by European Jewish settlers or subjugated, or both.  But the birth of Israel also proved tragic for Jews throughout the Middle East — the Mizrahim. In a nasty irony, the implementation of Zionism in the Holy Land led to the introduction of European-style anti-Semitism — including its classic Christian libels on Jews — to the region, dividing Arab Jews from their Muslim neighbors as never before and compelling them to join European Jews in taking refuge in Israel amidst outrage over the dispossession of Palestinians from their homeland. Now, in a further irony, Israel’s pogroms and other injustices to the Muslim and Christian Arabs over whom it rules are leading not just to a rebirth of anti-Semitism in Europe but to its globalization.
  • The late King `Abdullah of Saudi Arabia engineered a reversal of decades of Arab rejectionism at Beirut in 2002. He brought all Arab countries and later all 57 Muslim countries to agree to normalize relations with Israel if it did a deal — any deal — with the Palestinians that the latter could accept. Israel spurned the offer. Its working assumption seems to be that it does not need peace with its neighbors as long as it can bomb and strafe them. Proceeding on this basis is not just a bad bet, it is one that is dividing Israel from the world, including Jews outside Israel. This does not look like a story with a happy ending. It’s hard to avoid the thought that Zionism is turning out to be bad for the Jews. If so, given the American investment in it, it will also have turned out to be bad for America. The political costs to America of support for Israel are steadily rising. We must find a way to divert Israel from the largely self-engineered isolation into which it is driving itself, while repairing our own increasing international ostracism on issues related to Israel.  
  • Despite Mr. Netanyahu’s recent public hysteria about Iran and his efforts to demonize it, Israel has traditionally seen Iran’s rivalry with the Arabs as a strategic asset. It had a very cooperative relationship with the Shah. Neither Israelis nor Arabs have forgotten the strategic logic that produced Israel's entente with Iran. Israel is very much on Daesh’s list of targets, as is Iran. For now, however, Israel’s main concern is the possible loss of its nuclear monopoly in the Middle East. Many years ago, Israel actually did what it now accuses Iran of planning to do. It clandestinely developed nuclear weapons while denying to us and others that it was doing so. Unlike Iran, Israel has not adhered to the Nuclear Non-Proliferation Treaty or subjected its nuclear facilities to international inspection. It has expressed no interest in proposals for a nuclear-free zone in the Middle East. It sees its ability to bring on nuclear Armageddon as the ultimate guarantee of its existence.
  • To many, Israel now seems to have acquired the obnoxious habit of biting the American hand that has fed it for so long. The Palestinians have despaired of American support for their self-determination. They are reaching out to the international community in ways that deliberately bypass the United States. Random acts of violence herald mayhem in the Holy Land. Daesh has proclaimed the objective of erasing the Sykes-Picot borders and the states within them. It has already expunged the border between Iraq and Syria. It is at work in Lebanon and has set its sights on Jordan, Palestine, and Israel. Lebanon, under Saudi influence, has turned to France rather than America for support. Hezbollah has intervened militarily in Iraq and Syria, both of whose governments are close to Iran. Egypt and Turkey have distanced themselves from the United States as well as from each other. Russia is back as a regional actor and arms supplier. The Gulf Arabs, Egypt, and Turkey now separately intervene in Libya, Syria, and Iraq without reference to American policy or views. Iran is the dominant influence in Iraq, Syria, parts of Lebanon, and now Yemen. It has boots on the ground in Iraq. And now Saudi Arabia seems to be organizing a coalition that will manage its own nuclear deterrence and military balancing of Ir
  • To describe this as out of control is hardly adequate. What are we to do about it? Perhaps we should start by recalling the first law of holes — “when stuck in one, stop digging.” It appears that “don’t just sit there, bomb something” isn’t much of a strategy. When he was asked last summer what our strategy for dealing with Daesh was, President Obama replied, “We don’t yet have one.” He was widely derided for that. He should have been praised for making the novel suggestion that before Washington acts, it should first think through what it hopes to accomplish and how best to do it. Sunzi once observed that “tactics without strategy is the noise before defeat." America’s noisy but strategy-free approach to the Middle East has proven him right. Again the starting point must be what we are trying to accomplish. Strategy is "the discipline of achieving desired ends through the most efficient use of available means" [John Lewis Gaddis].Our desired ends with respect to the Middle East are not in doubt. They have been and remain to gain an accepted and therefore secure place for Israel there; to keep the region's oil and gas coming at reasonable prices; to be able to pass through the area at will; to head off challenges to these interests; to do profitable business in the markets of the Middle East; and to promote stability amidst the expansion of liberty in its countries. Judging by results, we have been doing a lot wrong. Two related problems in our overall approach need correction. They are “enablement” and the creation of “moral hazard.” Both are fall-out from  relationships of codependency.
  • Enablement occurs when one party to a relationship indulges or supports and thereby enables another party’s dysfunctional behavior. A familiar example from ordinary life is giving money to a drunk or a drug addict or ignoring, explaining away, or defending their subsequent self-destructive behavior.  Moral hazard is the condition that obtains when one party is emboldened to take risks it would not otherwise take because it knows another party will shoulder the consequences and bear the costs of failure. The U.S.-Israel relationship has evolved to exemplify codependency. It now embodies both enablement and moral hazard. U.S. support for Israel is unconditional.  Israel has therefore had no need to cultivate relations with others in the Middle East, to declare its borders, or to choose peace over continued expansion into formerly Arab lands. Confidence in U.S. backing enables Israel to do whatever it likes to the Palestinians and its neighbors without having to worry about the consequences. Israel is now a rich country, but the United States continues to subsidize it with cash transfers and other fiscal privileges. The Jewish state is the most powerful country in the Middle East. It can launch attacks on its neighbors, confident that it will be resupplied by the United States. Its use of U.S. weapons in ways that violate both U.S. and international law goes unrebuked. 41 American vetoes in the United Nations Security Council have exempted Israel from censure and international law. We enable it to defy the expressed will of the international community, including, ironically, our own.
  • We Americans are facilitating Israel's indulgence in denial and avoidance of the choices it must make if it is not to jeopardize its long-term existence as a state in the Middle East. The biggest contribution we could now make to Israel's longevity would be to ration our support for it, so as to cause it to rethink and reform its often self-destructive behavior. Such peace as Israel now enjoys with Egypt, Jordan, and the Palestinians is the direct result of tough love of this kind by earlier American administrations. We Americans cannot save Israel from itself, but we can avoid killing it with uncritical kindness. We should support Israel when it makes sense to do so and it needs our support on specific issues, but not otherwise. Israel is placing itself and American interests in jeopardy. We need to discuss how to reverse this dynamic.
  • Moral hazard has also been a major problem in our relationship with our Arab partners. Why should they play an active role in countering the threat to them they perceive from Iran, if they can get America to do this for them? Similarly, why should any Muslim country rearrange its priorities to deal with Muslim renegades like Daesh when it can count on America to act for it? If America thinks it must lead, why not let it do so? But responsible foreign and defense policies begin with self-help, not outsourcing of military risks. The United States has the power-projection and war-fighting capabilities to back a Saudi-led coalition effort against Daesh. The Saudis have the religious and political credibility, leadership credentials, and diplomatic connections to organize such an effort. We do not. Since this century began, America has administered multiple disappointments to its allies and friends in the Middle East, while empowering their and our adversaries. Unlike the Gulf Arabs, Egypt, and Turkey, Washington does not have diplomatic relations with Tehran. Given our non-Muslim identity, solidarity with Israel, and recent history in the Fertile Crescent, the United States cannot hope to unite the region’s Muslims against Daesh.  Daesh is an insurgency that claims to exemplify Islam as well as a governing structure and an armed force. A coalition led by inhibited foreign forces, built on papered-over differences, and embodying hedged commitments will not defeat such an insurgency with or without boots on the ground.
  • When elections have yielded governments whose policies we oppose, we have not hesitated to conspire with their opponents to overthrow them. But the results of our efforts to coerce political change in the Middle East are not just failures but catastrophic failures. Our policies have nowhere produced democracy. They have instead contrived the destabilization of societies, the kindling of religious warfare, and the installation of dictatorships contemptuous of the rights of religious and ethnic minorities. Frankly, we have done a lot better at selling things, including armaments, to the region than we have at transplanting the ideals of the Atlantic Enlightenment there. The region’s autocrats cooperate with us to secure our protection, and they get it. When they are nonetheless overthrown, the result is not democracy or the rule of law but socio-political collapse and the emergence of  a Hobbesian state of nature in which religious and ethnic communities, families, and individuals are able to feel safe only when they are armed and have the drop on each other. Where we have engineered or attempted to engineer regime change, violent politics, partition, and ethno-religious cleansing have everywhere succeeded unjust but tranquil order. One result of our bungled interventions in Iraq and Syria is the rise of Daesh. This is yet another illustration that, in our efforts to do good in the Middle East, we have violated the principle that one should first do no harm.
  • Americans used to believe that we could best lead by example. We and those in the Middle East seeking nonviolent change would all be better off if America returned to that tradition and forswore ideologically motivated hectoring and intervention. No one willingly follows a wagging finger. Despite our unparalleled ability to use force against foreigners, the best way to inspire them to emulate us remains showing them that we have our act together. At the moment, we do not. In the end, to cure the dysfunction in our policies toward the Middle East, it comes down to this. We must cure the dysfunction and venality of our politics. If we cannot, we have no business trying to use an 8,000-mile-long screwdriver to fix things one-third of the way around the world. That doesn’t work well under the best of circumstances. But when the country wielding the screwdriver has very little idea what it’s doing, it really screws things up.
  •  
    Chas Freeman served as US ambassador to Saudi Arabia during the war to liberate Kuwait and as Assistant Secretary of Defense from 1993-94. He was the editor of the Encyclopedia Britannica entry on "diplomacy" and is the author of five books, including "America's Misadventures in the Middle East" and "Interesting Times: China, America, and the Shifting Balance of Prestige."  I have largely omitted highlighting portions of the speech dealing with Muslim nations because Freeman has apparently lost touch with the actual U.S., Saudi, UAE, Kuwait, and Turish roles in creating and expanding ISIL. But his analysis of Israel's situation and recommendations for curing it seem quite valid, as well as his overall Mideast recommendation to heed the First Law of Holes: "when stuck in one, stop digging."   I recommend reading the entire speech notwithstanding his misunderstanding of ISIL. There is a lot of very important history there ably summarized.
Paul Merrell

FBI Flouts Obama Directive to Limit Gag Orders on National Security Letters - The Inter... - 0 views

  • Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run around the Fourth Amendment since 2001 has been something called a National Security Letter. FBI agents can demand that an Internet service provider, telephone company or financial institution turn over its records on any number of people — without any judicial review whatsoever — simply by writing a letter that says the information is needed for national security purposes. The FBI at one point was cranking out over 50,000 such letters a year; by the latest count, it still issues about 60 a day. The letters look like this:
  • Recipients are legally required to comply — but it doesn’t stop there. They also aren’t allowed to mention the order to anyone, least of all the person whose data is being searched. Ever. That’s because National Security Letters almost always come with eternal gag orders. Here’s that part:
  • That means the NSL process utterly disregards the First Amendment as well. More than a year ago, President Obama announced that he was ordering the Justice Department to terminate gag orders “within a fixed time unless the government demonstrates a real need for further secrecy.” And on Feb. 3, when the Office of the Director of National Intelligence announced a handful of baby steps resulting from its “comprehensive effort to examine and enhance [its] privacy and civil liberty protections” one of the most concrete was — finally — to cap the gag orders: In response to the President’s new direction, the FBI will now presumptively terminate National Security Letter nondisclosure orders at the earlier of three years after the opening of a fully predicated investigation or the investigation’s close. Continued nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the statutory standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why continued nondisclosure is appropriate.
  • ...6 more annotations...
  • Despite the use of the word “now” in that first sentence, however, the FBI has yet to do any such thing. It has not announced any such change, nor explained how it will implement it, or when. Media inquiries were greeted with stalling and, finally, a no comment — ostensibly on advice of legal counsel. “There is pending litigation that deals with a lot of the same questions you’re asking, out of the Ninth Circuit,” FBI spokesman Chris Allen told me. “So for now, we’ll just have to decline to comment.” FBI lawyers are working on a court filing for that case, and “it will address” the new policy, he said. He would not say when to expect it.
  • There is indeed a significant case currently before the federal appeals court in San Francisco. Oral arguments were in October. A decision could come any time. But in that case, the Electronic Frontier Foundation (EFF), which is representing two unnamed communications companies that received NSLs, is calling for the entire NSL statute to be thrown out as unconstitutional — not for a tweak to the gag. And it has a March 2013 district court ruling in its favor. “The gag is a prior restraint under the First Amendment, and prior restraints have to meet an extremely high burden,” said Andrew Crocker, a legal fellow at EFF. That means going to court and meeting the burden of proof — not just signing a letter. Or as the Cato Institute’s Julian Sanchez put it, “To have such a low bar for denying persons or companies the right to speak about government orders they have been served with is anathema. And it is not very good for accountability.”
  • In a separate case, a wide range of media companies (including First Look Media, the non-profit digital media venture that produces The Intercept) are supporting a lawsuit filed by Twitter, demanding the right to say specifically how many NSLs it has received. But simply releasing companies from a gag doesn’t assure the kind of accountability that privacy advocates are saying is required by the Constitution. “What the public has to remember is a NSL is asking for your information, but it’s not asking it from you,” said Michael German, a former FBI agent who is now a fellow with the Brennan Center for Justice. “The vast majority of these things go to the very large telecommunications and financial companies who have a large stake in maintaining a good relationship with the government because they’re heavily regulated entities.”
  • So, German said, “the number of NSLs that would be exposed as a result of the release of the gag order is probably very few. The person whose records are being obtained is the one who should receive some notification.” A time limit on gags going forward also raises the question of whether past gag orders will now be withdrawn. “Obviously there are at this point literally hundreds of thousands of National Security Letters that are more than three years old,” said Sanchez. Individual review is therefore unlikely, but there ought to be some recourse, he said. And the further back you go, “it becomes increasingly implausible that a significant percentage of those are going to entail some dire national security risk.” The NSL program has a troubled history. The absolute secrecy of the program and resulting lack of accountability led to systemic abuse as documented by repeated inspector-general investigations, including improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL statutes, requests for information based on First Amendment protected activity, “after-the-fact” blanket NSLs to “cover” illegal requests, and hundreds of NSLs for “community of interest” or “calling circle” information without any determination that the telephone numbers were relevant to authorized national security investigations.
  • Obama’s own hand-selected “Review Group on Intelligence and Communications Technologies” recommended in December 2013 that NSLs should only be issued after judicial review — just like warrants — and that any gag should end within 180 days barring judicial re-approval. But FBI director James Comey objected to the idea, calling NSLs “a very important tool that is essential to the work we do.” His argument evidently prevailed with Obama.
  • NSLs have managed to stay largely under the American public’s radar. But, Crocker says, “pretty much every time I bring it up and give the thumbnail, people are shocked. Then you go into how many are issued every year, and they go crazy.” Want to send me your old NSL and see if we can set a new precedent? Here’s how to reach me. And here’s how to leak to me.
Paul Merrell

Israel decries US 'knife in back' over Palestinian govt - Yahoo News - 0 views

  • Washington's support for a new Palestinian government backed by Israel's Islamist foe Hamas, has left the Jewish state feeling betrayed, triggering a new crisis with its closest ally. Several Israeli ministers expressed public anger on Tuesday after the US State Department said it was willing to work with the new Palestinian unity government put together by the West Bank leadership and Gaza's Hamas rulers. Technocratic in nature, the new government was sworn in on Monday in front of president Mahmud Abbas, with Washington offering its backing several hours later.
  • Speaking to reporters on Monday, State Department spokeswoman Jen Psaki said the new cabinet would be judged "by its actions.""At this point, it appears that president Abbas has formed an interim technocratic government that does not include ministers affiliated with Hamas," she said. "With what we know now, we will work with this government."
  • The US endorsement was viewed as a major blow for Israeli Prime Minister Benjamin Netanyahu, who had on Sunday urged the international community not to rush into recognising the new government, which he said would only "strengthen terror."
  • ...4 more annotations...
  • "Unfortunately, American naivety has broken all records," said Communications Minister Gilad Erdan, a cabinet hardliner who is close to Netanyahu."Collaborating with Hamas, which is defined as a terror organisation in the United States, is simply unthinkable. "US capitulation to Palestinian tactics badly damages the chance of ever returning to negotiations and will cause Israel to take unilateral steps to defend its citizens from the government of terror which Abu Mazen (Abbas) has set up." Public radio said Netanyahu was feeling "betrayed and deceived," particularly as he had assured his security cabinet that US Secretary of State John Kerry had promised him Washington would not recognise the new government immediately.
  • "And it wasn't immediate -- it was five hours later that this recognition took place," the radio noted ironically. A senior political official quoted by the Israel Hayom freesheet, widely regarded as Netanyahu's mouthpiece, said the US move was "like a knife in the back." - 'Answer with annexation' - Israeli commentators said the Palestinians had chalked up a "major success" in driving a new wedge between Israel and its US ally.
  • With the peace process in tatters, hardliners within Netanyahu's rightwing coalition have been pushing for Israel to take unilateral steps such as the annexation of the main Jewish settlement blocs in the occupied West Bank.
  • The security cabinet agreed on Monday to set up a team to examine the annexation option, but Yediot Aharonot commentator Shimon Shiffer said the move was a sop to Bennett and other hardliners rather than a serious policy change.
  •  
    What's remarkable here is that Obama has apparently ratcheted down his fear of the Israel Lobby. But it's not as though Mr. Netanyahu was not warned that the world would see Israel as responsible if it blew up the Kerry-brokered negotiation between Israel and Palestine. Israel did blow it up by not delivering the last shipment of Palestinian prisoners required by the pre-negotiation agreement, attempting to gain further concessions using their release as leverage.  Palestine responded by joining a large number of U.N. treaty organizations and was thus recognized by most nations on the planet as a nation: a critically important move, because it is recognition by other nations as a nation that qualifies Palestine as a full-fledged U.N. member rather than an observer state, an application Palestine can now make at the time of its choosing. That is also important because Palestine is now positioned to join the Rome Convention that created the International Criminal Court, providing Palestine with legal standing to file war crime charges against high Israeli officials that would then obligate the Court to investigate. Palestine is holding back on that move, using it as bargaining leverage on the world stage.   Palestine also responded by forming a coalition "unity" government with Hamas, the political party that nominally rules the Gaza strip, the world's largest open-air concentration camp. At Israel's request, the U.S. had several years ago designated Hamas as a terrorist organization. But that was a purely political move. It seems that the political situation has changed. Obama is pivoting out of the Mideast as he performs his ballyhooed "pivot to Asia," which is actually a pivot to contain Russia that isn't working and a pivot to subjugate Africa and its huge store of untapped natural resources, including lots of oil. Blocking China's economic deals in Africa with military force seems to be the current top concern in the White House. Israel was already a pari
1 - 20 of 1316 Next › Last »
Showing 20 items per page