Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged page

Rss Feed Group items tagged

Paul Merrell

Tikkun Daily Blog » Blog Archive » Obama Suppressing 6,000-Page Report on CIA... - 0 views

  • Over a year ago, the Senate Intelligence Committee voted to adopt a historic, 6,000-page report which contains “startling details” about CIA misdeeds related to its torture program. The report, which cost $40 million to produce and appears to pose no national security threats, has been set for release since December 13, 2012. However, it has yet to see the light of day. The reason: the Obama administration continues to suppress its release, apparently for no reason other than to protect the reputations of the guilty. Per The Atlantic‘s Conor Friedersdorf:
  • [Over a year ago], the Senate Intelligence Committee voted to adopt a 6,000-page report on the CIA rendition, detention, and interrogation program that led to torture. Its contents include details on each prisoner in CIA custody, the conditions of their confinement, whether they were tortured, the intelligence they provided, and the degree to which the CIA lied about its behavior to overseers. Senator Dianne Feinstein declared it one of the most significant oversight efforts in American history, noting that it contains “startling details” and raises “critical questions.” But all these months later, the report is still being suppressed. The Obama Administration has no valid reason to suppress the report. Its contents do not threaten national security, as evidenced by the fact that numerous figures who normally defer to the national-security state want it released with minor redactions. The most prominent of all is Vice President Joe Biden. The Center for Victims of Torture, in advocating for the public’s right to fully understand the CIA’s lawless torture program during the Bush administration, has procured the signatures of 58 national security experts and officials. These signatures include U.S. senators, former Obama administration officials and retired military leaders. President Obama once promised that his White House would be the most transparent in history, and went so far in February to claim that such is indeed the case. This most-transparent-ever administration is now
  • marking the CIA report as classified, determined “to keep secret the most thorough accounting we have of the agency’s lawless, immoral behavior.” Is President Obama bowing to factions within the CIA? Shielding the powerful from rebuke during his own illegal drone program? Protecting past criminals as a down payment on future investigations? To answer those questions would be to speculate. However, what is known is this: if we don’t fully understand those CIA abuses perpetrated in the name of the State and national security, we are more likely to allow those abuses to happen again.
Paul Merrell

Florida congressman denied access to censored pages from Congress' 9/11 report | Browar... - 0 views

  • The U.S. House Intelligence Committee has denied a Florida congressman’s request for access to 28 classified pages from the 2002 report of Congress’ Joint Inquiry into the 9/11 terrorist attacks. Rep. Alan Grayson, D-Orlando, told BrowardBulldog.org he made his request at the suggestion of House colleagues who have read them as they consider whether to support a proposed resolution urging President Obama to open those long-censored pages to the public. “Why was I denied? I have been instrumental in publicizing the Snowden revelations regarding pervasive domestic spying by the government and this is a petty means for the spying industrial complex to lash back,” Grayson said last week, referring to National Security Agency leaker Edward Snowden.
  • In a party line vote, the House Intelligence Committee voted 8-4 on Dec. 1 to deny Democrat Grayson access to the 28 pages. The same day, the committee unanimously approved requests to access classified committee documents – not necessarily the 28 pages – by 11 other House members. Grayson, an outspoken liberal and a member of the House Committee on Foreign Affairs, said his denial was engineered by outgoing Chairman Mike Rogers, R-Mich. Rogers is a former FBI agent who did not seek re-election in November. “Congressman Rogers made serious misrepresentations to other committee members when he brought this up,” Grayson in a telephone interview. “When the Guardian reported on the fact that there was universal domestic surveillance regarding every single phone call, including this one, I went to the floor of the House and gave a lengthy speech decrying it.”
  • “Chairman Rogers told the committee that I had discussed classified information on the floor. He left out the most important part that I was discussing what was reported in the newspaper,” said Grayson. “He clearly misled the committee for an improper purpose: to deny a sitting member of Congress important classified information necessary for me to do my job.” Rogers did not respond to a request for comment. An aide in his Lansing, Michigan office referred callers to a spokeswoman for the House Intelligence Committee who could not be reached for comment.
Paul Merrell

Breaking the Silence about Colombia and Ourselves | Opinion | teleSUR - 0 views

  • The USA’s human rights record at home is terrible in some important (and quickly worsening) ways, but if one includes its victims beyond its borders then it is indisputably the most dangerous rogue state in the world. According to the UNHCR’s latest figures, there are about 200,000 Colombians living in Venezuela as refugees – but less than 237 Venezuelans living in Colombia as refugees.[1] It you rely on the international media, you can be forgiven for assuming it was the other way around – that Colombia must be hosting hundreds of thousands of Venezuelans who have fled their country.[2] Ever since the early 1990s, if one considers only crimes perpetrated within its own borders, Colombia has consistently had, by far, the worst human rights record in the Western Hemisphere (contrary to Ken Roth’s lunatic assertion that Venezuela and other ALBA bloc countries are the “most abusive”).  The Colombian military, and right wing paramilitaries with whom it is closely allied, have perpetrated the vast majority of atrocities in a civil war that has raged for decades.  In private, US officials have estimated hundreds of thousands of people killed by them. These killings have reached truly genocidal levels in the case of numerous indigenous groups who have been nearly wiped out. Colombia’s population of internally displaced people is almost 6 million, the highest in the world as of 2012.
  • If you follow Daniel Kovalik’s diligent work, you’ll understand why Colombia’s human rights record is so horrific and, at the same time, so widely ignored. Colombia has been lavishly funded and supported by the US government – and therefore depicted as one of the “good guys” by the international media. In September of last year, the New York Times editors singled out Colombia as a country that should “lead an effort to prevent Caracas from representing the region when it is fast becoming an embarrassment”. The NYT editors registered zero “embarrassment” when US General John Kelly recently told Congress “The beauty of having a Colombia – they’re such good partners, particularly in the military realm, they’re such good partners with us. When we ask them to go somewhere else and train the Mexicans, the Hondurans, the Guatemalans, the Panamanians, they will do it almost without asking. And they’ll do it on their own. They’re so appreciative of what we did for them. And what we did for them was, really, to encourage them for 20 years and they’ve done such a magnificent job.” General Kelly should add the international corporate media to his list of “magnificent partners”. It has kept most people ignorant of the mass murderers that US (and UK and Canadian) governments have been supporting for many years.
Gary Edwards

WW3 - What is the New World Order (NWO)? - 0 views

  •  
    So, i'm researching Albert Pike and his 1871 Luciferian dream wher a plan for three world wars set the stage for the rule of a New World Order is laid out and described.  And i find this incredible piece of research.  This is actually page 3 in a series of Web articles that begins with "The Conspiracy", leads to Albert Pike and how the Illuminati Luciferians infiltrated many gorups and organizations, clipping off the leadership and subsuming those select individuals into a super secret Luciferian order.  Incredible.  This page describes "The New World Order".  Chilling. excerpt: Introduction The following article is extracted from an excellent analysis of the New World Order by author Ken Adachi which can be found at educate-yourself.org . The term New World Order (NWO) has been used by numerous politicians through the ages , and is a generic term used to refer to a worldwide conspiracy being orchestrated by an extremely powerful and influential group of genetically-related individuals (at least at the highest echelons) which include many of the world's wealthiest people, top political leaders, and corporate elite, as well as members of the so-called Black Nobility of Europe (dominated by the British Crown) whose goal is to create a One World (fascist) Government, stripped of nationalistic and regional boundaries, that is obedient to their agenda. Listen to the Zionist* banker, Paul Warburg: "We will have a world government whether you like it or not. The only question is whether that government will be achieved by conquest or consent." (February 17, 1950, as he testified before the US Senate). Their intention is to effect complete and total control over every human being on the planet and to dramatically reduce the world's population by two thirds. While the name New World Order is the term most frequently used today to loosely refer to anyone involved in this conspiracy, the study of exactly who makes up this group is a complex and intricate
Gary Edwards

Alleged US Army doc: Re-education camps and psy-op missions aimed at activists - RT - 0 views

  •  
    Not sure if i had bookmarked this.  The Globalist Establishments assault on American liberty and the Constitution continues.  Now the USA Military is plotting against American liberty, and trampling the Constitution in the process!! excerpt: An American military document just uncovered appears to detail an US Army plan that calls for detaining "political activists" at re-education camps staffed by military-hired "PSYOP officers" in both America and abroad. The website Infowars.com has unearthed the smoking gun, a copy of a United States military manual entitled FM 3-39.40 Internment and Resettlement Operations, which appears to offer Defense Department insiders instructions on dealing with the imprisonment of anyone considered an enemy to the American way of life and how to go about indoctrination them with an "appreciation of US policies and actions" through psychological warfare. The PDF made available is dated February 2010 but has only now been leaked online. A copy of the document has been uploaded to the website PublicIntelligence.net for viewing, and additionally a version appears to be hosted on the US Military's Doctrine and Training Publications page at armypubs.us.army.mil, although access to papers published there are unavailable to those without the Pentagon's authorization, therefore making it impossible to verify the authenticity of the manual at this time. The military site that appears to host a copy has also implemented security measures on its servers that it cautions visitors are "not for your personal benefit or privacy." Further, the title page of the manual warns that the material contained in its 326 pages is be distributed to US Defense Department and its contractors only, and that must be "destroy[ed] by any method that will prevent disclosure of contents or construction of the document."
Gary Edwards

Google's About Me page helps users control personal info - CIO - 0 views

  • People concerned about how much information is out there about them on Google have a new way to control what everyone can see. Without any fanfare, Google has begun rolling out an About Me page to make it easier for people to control what others can see about them across Google services. The page should be welcome news to people concerned about their privacy,
  • "With this feature, there are no changes to what information people can see, but a way for people to better control what people can see about them across Google services in one place," a Google spokesperson wrote in an email to Computerworld. Google, with its myriad services like Gmail, search, YouTube and productivity apps, has been collecting a lot of information about its users.
  • The About Me page, which is tailored for each user, contains information like work history, contact information, educational background and places the user has lived, along with gender and birthday. Brand Post How is tech changing the role of the CIO? More from Lenovo ThinkFWD The page also enables users to edit or delete information that they don't want people to be able to see.
  • ...1 more annotation...
  • this should make it easier for people to take control over what information is out there about them on various Google services.
  •  
    Run, don't walk! HTTPS://aboutme.google.com
Gary Edwards

The Real Reason for the Iraq War | VICE United Kingdom - 1 views

  • Like most lefty journalists, I assumed that George Bush and Tony Blair invaded Iraq to buy up its oil fields, cheap and at gun-point, and cart off the oil. We thought we knew the neo-cons true casus belli: Blood for oil. But the truth in the Options for Iraqi Oil Industry was worse than "Blood for Oil". Much, much worse.
  • Within days, our chief of investigations, Ms Badpenny, delivered to my shack in the woods outside New York a 323-page, three-volume programme for Iraq's oil crafted by George Bush's State Department and petroleum insiders meeting secretly in Houston, Texas. I cracked open the pile of paper – and I was blown away.
  • I'd already had in my hands a 101-page document, another State Department secret scheme, first uncovered by Wall Street Journal reporter Neil King, that called for the privatisation, the complete sell-off of every single government-owned asset and industry. And in case anyone missed the point, the sales would include every derrick, pipe and barrel of oil, or, as the document put it, "especially the oil". That plan was created by a gaggle of corporate lobbyists and neo-cons working for the Heritage Foundation. In 2004, the plan's authenticity was confirmed by Washington power player Grover Norquist. (It's hard to erase the ill memory of Grover excitedly waving around his soft little hands as he boasted about turning Iraq into a free-market Disneyland, recreating Chile in Mesopotamia, complete with the Pinochet-style dictatorship necessary to lock up the assets – while behind Norquist, Richard Nixon snarled at me from a gargantuan portrait.) The neo-con idea was to break up and sell off Iraq's oil fields, ramp up production, flood the world oil market – and thereby smash OPEC and with it, the political dominance of Saudi Arabia.
  • ...6 more annotations...
  • General Jay Garner also confirmed the plan to grab the oil. Indeed, Secretary of Defense Donald Rumsfeld fired Garner, when the General, who had lived in Iraq, complained the neo-con grab would set off a civil war. It did. Nevertheless, Rumsfeld replaced Garner with a new American viceroy, Paul Bremer, a partner in Henry Kissinger's firm, to complete the corporate takeover of Iraq's assets – "especially the oil".
  • But that was not to be. While Bremer oversaw the wall-to-wall transfer of Iraqi industries to foreign corporations, he was stopped cold at the edge of the oil fields. How? I knew there was only one man who could swat away the entire neo-con army: James Baker, former Secretary of State, Bush family consiglieri and most important, counsel to Exxon-Mobil Corporation and the House of Saud.
  • There was no way in hell that Baker's clients, from Exxon to Abdullah, were going to let a gaggle of neo-con freaks smash up Iraq's oil industry, break OPEC production quotas, flood the market with six million bbd of Iraqi oil and thereby knock the price of oil back down to $13 a barrel where it was in 1998.
  • Big Oil could not allow Iraq's oil fields to be privatised and taken from state control. That would make it impossible to keep Iraq within OPEC (an avowed goal of the neo-cons) as the state could no longer limit production in accordance with the cartel's quota system. The US oil industry was using its full political mojo to prevent their being handed ownership of Iraq's oil fields. That's right: The oil companies didn't want to own the oil fields – and they sure as hell didn't want the oil. Just the opposite. They wanted to make sure there would be a limit on the amount of oil that would come out of Iraq. Saddam wasn't trying to stop the flow of oil – he was trying to sell more. The price of oil had been boosted 300 percent by sanctions and an embargo cutting Iraq's sales to two million barrels a day from four. With Saddam gone, the only way to keep the damn oil in the ground was to leave it locked up inside the busted state oil company which would remain under OPEC (i.e. Saudi) quotas. The James Baker Institute quickly and secretly started in on drafting the 323-page plan for the State Department. With authority granted from the top (i.e. Dick Cheney), ex-Shell Oil USA CEO Phil Carroll was rushed to Baghdad in May 2003 to take charge of Iraq's oil. He told Bremer, "There will be no privatisation of oil – END OF STATEMENT." Carroll then passed off control of Iraq's oil to Bob McKee of Halliburton, Cheney's old oil-services company, who implemented the Baker "enhance OPEC" option anchored in state ownership.
  • This week, VICE readers can download, for free, Greg Palast's investigation of the war in Iraq in the BBC film, Bush Family Fortunes, at www.GregPalast.com – as well as the illustrated poster of "The Secret History of War over Oil in Iraq" from Palast's international bestseller, Armed Madhouse, also at www.GregPalast.com
  • Some oil could be released, mainly to China, through limited, but lucrative, "production sharing agreements". And that's how George Bush won the war in Iraq. The invasion was not about "blood for oil", but something far more sinister: blood for no oil. War to keep supply tight and send prices skyward. Oil men, whether James Baker or George Bush or Dick Cheney, are not in the business of producing oil. They are in the business of producing profits. And they've succeeded. Iraq, capable of producing six to 12 million barrels of oil a day, still exports well under its old OPEC quota of three million barrels. The result: As we mark the tenth anniversary of the invasion this month, we also mark the fifth year of crude at $100 a barrel. As George Bush could proudly say to James Baker: Mission Accomplished!
  •  
    The Sherman Act forbids conspiracies in restraint of trade and is at its zenith in price-fixing cases. This looks to be the mother of all price-fixing cases, to say the least.   
  •  
    Wow, Marbux has it right.  This report from the legendary Greg Palast of the BBC News Network is a stunning reversal of what everyone believed to be the truth.  To wit, the militarist and global strategist - resource control hungry neocon contingent of the Repubican party was always thought to be behind the Iraqi war.  For control of cheap, plentiful oil and, the protection / destruction of Israel's enemies.   Funny, but it turns out America was fighting for higher oil prices and limited supplies.  Just as in the first Gulf War, Americans were fighting to protect Saudi and big oil profits. excerpt: Big Oil could not allow Iraq's oil fields to be privatised and taken from state control. That would make it impossible to keep Iraq within OPEC (an avowed goal of the neo-cons) as the state could no longer limit production in accordance with the cartel's quota system. The US oil industry was using its full political mojo to prevent their being handed ownership of Iraq's oil fields. That's right: The oil companies didn't want to own the oil fields - and they sure as hell didn't want the oil. Just the opposite. They wanted to make sure there would be a limit on the amount of oil that would come out of Iraq. Saddam wasn't trying to stop the flow of oil - he was trying to sell more. The price of oil had been boosted 300 percent by sanctions and an embargo cutting Iraq's sales to two million barrels a day from four. With Saddam gone, the only way to keep the damn oil in the ground was to leave it locked up inside the busted state oil company which would remain under OPEC (i.e. Saudi) quotas. The James Baker Institute quickly and secretly started in on drafting the 323-page plan for the State Department. With authority granted from the top (i.e. Dick Cheney), ex-Shell Oil USA CEO Phil Carroll was rushed to Baghdad in May 2003 to take charge of Iraq's oil. He told Bremer, "There will be no privatisation of oil - END OF STATEMENT." Carroll then passed off control
Paul Merrell

Bob Graham gets call from White House and word that declassification of secret 9/11 doc... - 1 views

  • After years of pushing to gain public release of 28 secret pages of a report on the Sept. 11, 2001, terrorist attacks, former U.S. Sen. Bob Graham said he got a call from the White House on Tuesday.
  • Graham told the Tampa Bay Times that Brett Holmgren, a senior policy adviser to the assistant to the president for Homeland Security, told him the declassification review of the documents withheld from a report issued by a Joint Congressional Commission in 2003 will soon be completed. Graham, who asked the president to declassify the records more than two years ago, said he asked how soon he could expect a decision and was told “one or two months.” Graham was co-chairman of a joint congressional committee that investigated the attacks. The 28 pages were classified at the request of the FBI. Graham has been pushing for release of the documents since 2011 when he learned that the FBI had failed to disclose part of its investigation that included reports that high-ranking Saudi Arabian officials provided financial aid and other help to the 19 hijackers who flew airplanes into the World Trade Center and the Pentagon. He says the FBI initially denied there were such reports but has since turned over 80,000 pages in a federal lawsuit seeking the release of all reports on the investigation. Graham said he believes recent news reports on the secrecy surrounding the 28 pages, including a report Sunday on 60 Minutes, prompted the White House to react. “The decisionmakers at the White House have realized the public cares about it and there is an urgency to come to a decision,’’ Graham said.
Paul Merrell

Assange: Up to 100,000 pages of Clinton documents to come | Washington Examiner - 0 views

  • WikiLeaks could release as many as 100,000 pages of new material related to Hillary Clinton before the election, Julian Assange said Thursday, thanks in part to new sources who stepped forward after the organization leaked internal emails from the Democratic National Committee. "We have tens of thousands, possibly as many as a hundred thousand, pages of documents of different types, related to the operations that Hillary Clinton is associated with," the WikiLeaks founder said in a radio interview with Sean Hannity. "There are some, several … in response to the DNC publications, a lot of people have been inspired by the impact, and so they have stepped forward with additional material."
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
Paul Merrell

Court gave NSA broad leeway in surveillance, documents show - The Washington Post - 0 views

  • Virtually no foreign government is off-limits for the National Security Agency, which has been authorized to intercept information “concerning” all but four countries, according to top-secret documents. The United States has long had broad no-spying arrangements with those four countries — Britain, Canada, Australia and New Zealand — in a group known collectively with the United States as the Five Eyes. But a classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well.
  • The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The NSA is not necessarily targeting all the countries or organizations identified in the certification, the affidavits and an accompanying exhibit; it has only been given authority to do so. Still, the privacy implications are far-reaching, civil liberties advocates say, because of the wide spectrum of people who might be engaged in communication about foreign governments and entities and whose communications might be of interest to the United States.
  • On Friday, the Office of the Director of National Intelligence released a transparency report stating that in 2013 the government targeted nearly 90,000 foreign individuals or organizations for foreign surveillance under the program. Some tech-industry lawyers say the number is relatively low, considering that several billion people use U.S. e-mail services.
  • ...4 more annotations...
  • That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules
  • Still, some lawmakers are concerned that the potential for intrusions on Americans’ privacy has grown under the 2008 law because the government is intercepting not just communications of its targets but communications about its targets as well. The expansiveness of the foreign-powers certification increases that concern.
  • In a 2011 FISA court opinion, a judge using an NSA-provided sample estimated that the agency could be collecting as many as 46,000 wholly domestic e-mails a year that mentioned a particular target’s e-mail address or phone number, in what is referred to as “about” collection. “When Congress passed Section 702 back in 2008, most members of Congress had no idea that the government was collecting Americans’ communications simply because they contained a particular individual’s contact information,” Sen. Ron Wyden (D-Ore.), who has co-sponsored ­legislation to narrow “about” collection authority, said in an e-mail to The Washington Post. “If ‘about the target’ collection were limited to genuine national security threats, there would be very little privacy impact. In fact, this collection is much broader than that, and it is scooping up huge amounts of Americans’ wholly domestic communications.”
  • The only reason the court has oversight of the NSA program is that Congress in 2008 gave the government a new authority to gather intelligence from U.S. companies that own the Internet cables running through the United States, former officials noted. Edgar, the former privacy officer at the Office of the Director of National Intelligence, said ultimately he believes the authority should be narrowed. “There are valid privacy concerns with leaving these collection decisions entirely in the executive branch,” he said. “There shouldn’t be broad collection, using this authority, of foreign government information without any meaningful judicial role that defines the limits of what can be collected.”
Paul Merrell

NSA had German spies target Euro allies - The Local - 0 views

  • German spies targeted politicians in friendly European nations and inside Germany for surveillance on behalf of the US National Security Agency (NSA), a media report revealed on Thursday. Net company drags German spies to court (23 Apr 15) Liberals: Data retention unconstitutional (17 Apr 15) Ministers want phone data stored for ten weeks (15 Apr 15)
  • Der Spiegel reported that the US spy agency sent Germany's foreign intelligence agency, the Bundesnachrictendienst (BND), huge numbers of “selectors” – computer addresses, mobile phone numbers and other identifying information – which are used to target people's digital communications. Die Zeit reported that the NSA asked for a total of 800,000 people to be targeted for surveillance. The BND simply plugged the personal details into their own systems and carried out the intimate surveillance on behalf of their American allies.
  • BND officers had noticed several times since 2008 that some of the selectors directly contradicted the rules on how the agency is supposed to work, and its co-operation agreement for the “War on Terror” Germany signed with the USA in 2002. The Americans reportedly asked for information on arms manufacturer EADS, the Eurocopter helicopter company and the French government. But this was not seen by their superiors as a reason to regularly check the lists of selectors for irregularities. It was only after leaks by NSA whistleblower Edward Snowden began in summer 2013, revealing the extent of the surveillance by the American spies against the entire world's communications, that the BND began checking in detail.
  • ...2 more annotations...
  • By October 2013, they had discovered that around 2,000 of the selectors were definitely targeted at western Europe and even Germany. Politicians were among the people picked out for the illegal spying. But the true extent of the scandal wasn't revealed until the Bundestag's (German parliament) NSA Inquiry Committee submitted a request for evidence to the BND.
  • A fresh check of the selectors supplied by the NSA showed that 40,000 of them identified western European and German targets. Chancellor Angela Merkel's office, to which the BND is directly responsible, was not informed about the spying on friendly targets until after that parliamentary question was asked, in March 2015.
Paul Merrell

Revealed: NSA pushed 9/11 as key 'sound bite' to justify surveillance | Al Jazeera America - 0 views

  • The National Security Agency advised its officials to cite the 9/11 attacks as justification for its mass surveillance activities, according to a master list of NSA talking points. The document, obtained by Al Jazeera through a Freedom of Information Act request, contains talking points and suggested statements for NSA officials (PDF) responding to the fallout from media revelations that originated with former NSA contractor Edward Snowden. Invoking the events of 9/11 to justify the controversial NSA programs, which have caused major diplomatic fallout around the world, was the top item on the talking points that agency officials were encouraged to use. Under the subheading “Sound Bites That Resonate,” the document suggests the statement “I much prefer to be here today explaining these programs, than explaining another 9/11 event that we were not able to prevent.”
  • NSA head Gen. Keith Alexander used a slightly different version of that statement when he testified before Congress on June 18 in defense of the agency’s surveillance programs. Asked to comment on the document, NSA media representative Vanee M. Vines pointed Al Jazeera to Alexander’s congressional testimony on Tuesday, and said the agency had no further comment. In keeping with the themes listed in the talking points, the NSA head told legislators that “it is much more important for this country that we defend this nation and take the beatings than it is to give up a program that would result in this nation being attacked.” Critics have long noted the tendency of senior U.S. politicians and security officials to use the fear of attacks like the one that killed almost 3,000 Americans to justify policies ranging from increased defense spending to the invasion of Iraq.
  • Al Jazeera obtained the 27 pages of talking points from the NSA this week in response to a FOIA request filed June 13. The statements had been prepared for agency officials facing questions from Congress or the media over the revelations contained in classified documents that Snowden leaked to journalists Glenn Greenwald, Barton Gellman and others. A letter accompanying the documents notes that the talking points “are prepared and approved for a speaker to use and do not necessarily represent what the speaker actually said at the event.” The NSA has not yet turned over to Al Jazeera the documents the agency used to prepare the talking points, saying those materials require additional review before they can be released.  The attacks on the World Trade Center and the Pentagon also appear at the top of another talking-points document titled “Media Leaks One Card,” which contains 13 bullet points to explain the rationale behind the surveillance programs. Those points include “First responsibility is to defend the nation” and “NSA and its partners must make sure we connect the dots so that the nation is never attacked again like it was on 9/11.”
  • ...2 more annotations...
  • The master talking points list goes on to explain, under a subheading titled “We Needed to Connect the Dots,” that “post-9/11 we made several changes and added a number of capabilities to enable us to connect the dots.” Continuing revelations from the Snowden documents reveal surveillance on a scale that appears to go far beyond the scope of monitoring potential attackers, however. The agency’s “head of state collection” program, for example, reportedly included the monitoring of German Chancellor Angela Merkel’s mobile phone. The talking points document advises officials to emphasize the word “lawful” when discussing NSA surveillance programs, and to state that “our allies have benefited … just as we have.” “We believe that over 100 nations are capable of collecting signals intelligence or operating a lawful intercept capability that enable them to monitor communications,” the document continued.
  • Critics have called into question the veracity of the claim that NSA surveillance has thwarted more than 50 “potential” attacks. They claim evidence to support such assertions is lacking. NSA officials are advised to respond to questions about any potential civil liberties violations by citing talking points that say there have not been any “willful violations” and that the NSA is committed to “upholding the privacy and civil liberties of the American people.”
  •  
    27 pages of talking points appended to the article, plus a two-page cover letter. It's the scripts for just about everything official that's been coming out of NSA and the Administration. Interesting reading; they cover some things that haven't yet come up.   
Paul Merrell

Pentagon report: scope of intelligence compromised by Snowden 'staggering' | World news... - 0 views

  • • Classified assessment describes impact of leaks as 'grave' • Report does not include specific detail to support conclusions• 12 of 39 heavily redacted pages released after Foia request• Read the full Defense Intelligence Agency report
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”.The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.”But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower.The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk.
  • ...8 more annotations...
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian.Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows.
  • The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m. Nor does the declassified portion of the report identify Snowden by name.“[Redacted] a former NSA contractor compromised [redacted] from NSA Net and the Joint Worldwide Intelligence Communications System (JWICS),” the report says. “On 6 June 2013, media groups published the first stories based on this material, and on 9 June 2013 they identified the source as an NSA contractor who had worked in Hawaii.”JWICS is identified as a “24 hour a day network designed to meet the requirements for secure [top-secret/sensitive compartmented information] multi-media intelligence communications worldwide. The Defense Intelligence Agency (DIA) has directed that all Special Security Offices (SSOs) will install the JWICS.”The Washington Post, quoting anonymous sources, reported last October that Snowden “lifted the documents from a top-secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines.” The Post further claimed that Snowden “took 30,000 documents that involve the intelligence work of one of the services” and that he gained access to the documents through JWICS.
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”. The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.” But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.
  • Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year. Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, questioned the decision to withhold specific details. "The essence of the report is contained in the statement that 'the scope of the compromised knowledge related to US intelligence capabilities is staggering'. But all elaboration of what this striking statement means has been withheld," he said. The assessment excluded NSA-related information and dealt exclusively with non-NSA defense materials. The report was distributed to multiple US military commands around the world and all four military branches.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower. The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk. In January, Rogers asserted that the report concluded that most of the documents Snowden took "concern vital operations of the US Army, Navy, Marine Corps and Air Force". "This report confirms my greatest fears — Snowden’s real acts of betrayal place America’s military men and women at greater risk. Snowden’s actions are likely to have lethal consequences for our troops in the field," Rogers said in a statement at the time.
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian. Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows. The declassified portion of the report obtained by the Guardian says only that DIA “assesses with high confidence that the information compromise by a former NSA contractor [redacted] and will have a GRAVE impact on US national defense”. The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m.
  • No evidence has surfaced to support persistent claims from pundits and lawmakers that Snowden has provided any of the NSA documents he obtained to a “foreign adversary”. Ben Wizner, Snowden’s attorney at the American Civil Liberties Union, said: "This report, which makes unsubstantiated claims about alleged harm to national security, is from December of 2013. Just this month, Keith Alexander admitted in an interview that he doesn’t 'think anybody really knows what he [Snowden] actually took with him, because the way he did it, we don’t have an accurate way of counting'. In other words, the government’s so-called damage assessment is based entirely on guesses, not on facts or evidence."
  • Steven Aftergood, of the Federation of American Scientists, pointed out that the report's finding that the Snowden leaks had a "grave" impact did not follow any of the levels defined in the annex. "That is a bit odd," he said, adding: "Within this hierarchy, it is not clear where 'grave impact' would fall."
Paul Merrell

FBI monitored and critiqued African American writers for decades | Books | The Guardian - 0 views

  • Newly declassified documents from the FBI reveal how the US federal agency under J Edgar Hoover monitored the activities of dozens of prominent African American writers for decades, devoting thousands of pages to detailing their activities and critiquing their work. Academic William Maxwell first stumbled upon the extent of the surveillance when he submitted a freedom of information request for the FBI file of Claude McKay. The Jamaican-born writer was a key figure in the Harlem Renaissance, author of the sonnet If We Must Die, supposedly recited by Winston Churchill, and Maxwell was preparing an edition of his complete poems. When the file came through from the FBI, it stretched to 193 pages and, said Maxwell, revealed “that the bureau had closely read and aggressively chased McKay” – describing him as a “notorious negro revolutionary” – “all across the Atlantic world, and into Moscow”.
  • Maxwell, associate professor of English and African American studies at Washington University in St Louis, decided to investigate further, knowing that other scholars had already found files on well-known black writers such as Langston Hughes and James Baldwin. He made 106 freedom of information requests about what he describes as “noteworthy Afro-modernists” to the FBI; 51 of those writers had files, ranging from three to 1,884 pages each. “I suspected there would be more than a few,” said Maxwell. “I knew Hoover was especially impressed and worried by the busy crossroads of black protest, leftwing politics, and literary potential. But I was surprised to learn that the FBI had read, monitored, and ‘filed’ nearly half of the nationally prominent African American authors working from 1919 (Hoover’s first year at the Bureau, and the first year of the Harlem Renaissance) to 1972 (the year of Hoover’s death and the peak of the nationalist Black Arts movement). In this, I realised, the FBI had outdone most every other major institution of US literary study, only fitfully concerned with black writing.”
  • Maxwell’s book about his discovery, FB Eyes: How J Edgar Hoover’s Ghostreaders Framed African American Literature, is out on 18 February from Princeton University Press. It argues that the FBI’s attention was fuelled by Hoover’s “personal fascination with black culture”, that “the FBI is perhaps the most dedicated and influential forgotten critic of African American literature”, and that “African American literature is characterised by a deep awareness of FBI ghostreading”.
  • ...2 more annotations...
  • Digital copies of 49 of the FBI files have been made available to the public online. “The collected files of the entire set of authors comprise 13,892 pages, or the rough equivalent of 46 300-page PhD theses,” Maxwell writes in the book. “FBI ghostreaders genuinely rivalled the productivity of their academic counterparts.” The academic told the Guardian that he believes the FBI monitoring stems from the fact that “from the beginning of his tenure at the FBI ... Hoover was exercised by what he saw as an emerging alliance between black literacy and black radicalism”.
  • The files show how the travel arrangements of black writers were closely scrutinised by the FBI, with the passport records of a long list of authors “combed for scraps of criminal behaviour and ‘derogatory information’”, writes Maxwell. Some writers were threatened by “‘stops’, instructions to advise and defer to the Bureau if a suspect tried to pass through a designated point of entry” to the US.
Paul Merrell

FBI 'Lovers' New Texts Expose Obama Complicity: He "Wants To Know Everything We're Doin... - 0 views

  • The messages include an exchange about preparing talking points for then-FBI Director James Comey to give to President Obama, who wanted “to know everything we’re doing.”
  •  
    At the time, Strzok and Page were near the top of the command chain on both investigations into Hillary's use of a private email server and into the alleged Russian "collusion." BTW, I am reserving judgment on whether Page and Strzok actually were lovers. So far there's no lovers' language in their text messages that have been released.
Paul Merrell

PRISM: Google and Facebook DID allow NSA access to data and were in talks to set up 'sp... - 0 views

  • Mark Zuckerberg and Larry Page both issued blustery statements over recent media reports they gave the National Security Agency officials access to their troves of user informationNow sources say both tech giants were in discussion about specific ways to give U.S. officials access to their data using virtual classified information reading roomsCompanies are all compelled by the Foreign Intelligence Surveillance Act to hand over any information requested under the law, but they're not required to make access easier
  • PRISM data-mining program was launched in 2007 with approval from special federal judgesApple, Facebook, Microsoft, Google, Yahoo, YouTube, Skype, AOL and PalTalk are involved in spying program The UK has had access to the PRISM data since at least 2010Details of data collection were outlined in classified 41-slide PowerPoint presentation that was leaked by intelligence officer 
  • Mark Zuckerberg of Facebook and Larry Page of Google both strongly denied giving unfettered access to user data to U.S. officials, but it turns out both companies have, in fact, cooperated with governments requests.Zuckerberg denied his company's link to secret government data-sharing scheme PRISM on Friday in a blustery posted message that described allegations that Facebook gave 'US or any other government direct access to our servers' as 'outrageous.'Now, sources tell the New York Times that both Facebook and Google discussed plans to create secure portals for the government 'like a digital version of the secure physical rooms that have long existed for classified information' with U.S. officials.
Gary Edwards

Benghazi report: Trinkets of treason - 1 views

  •  
    The truth is dribbling out, thn=anks to Douglas J. Hagmann and Canada Free Press .....................  We've been aligned and hostage to the Saudi Royal Family ever since FDR met with King Ibn Saud, Feb 14th, 1945 near the end of WWII.  It was at this meeting that FDR promised protection for the Saudi family in exchange for the right to develop Saudi oil and sell that oil exclusively in dollars.  Hence the "petro dollar" - backed by Saudi oil instead of GOLD. That agreement, and our subsequent history of our military and state departments acting to further Saudi interests has dominated America.  Our troops and military resources ae mercenaries fighting for Saudi dominance of the Globalist ruling elites.  Our politicians are bought and paid for by the Saudi Globalist Alliance.  They have sold their souls for power and money, with the destruction of the USA Constitution the only thing standing between the Globalist and their quest to rule the world. excerpt: We are witnessing one of the biggest government cover-ups since Watergate. A cover-up that involves murder, arms trafficking, and lies by high ranking officials under oath. It involves the murderous attacks in Benghazi, and congressional investigators just released a 46-page interim progress report that at least exposes Hillary Rodham Clinton and the White House lying under oath. Where's the accountability? Where's the outrage? Where's the media? A 46-page interim progress report of an ongoing investigation across five House Committees by the U.S. House of Representatives was released on Tuesday, April 23, 2013. The executive summary states that former Secretary of State Hillary Rodham Clinton signed off on a reduction of diplomatic security forces suggesting that this reduction of security was, in large part, to blame for the attack in Benghazi on September 11, 2012.  The report emphasizes that this is "inconsistent" with her sworn testimony of January 23, 2013. Simply stated, Hillary Rod
Paul Merrell

WorldLII - WorldLII: About WorldLII - 0 views

  • You are here: WorldLII >> About WorldLII   What is WorldLII? The World Legal Information Institute (WorldLII) is a free, independent and non-profit global legal research facility developed collaboratively by the following Legal Information Institutes and other organisations. Australasian Legal Information Institute (AustLII) British and Irish Legal Information Institute (BAILII) Canadian Legal Information Institute (CanLII) Hong Kong Legal Information Institute (HKLII) Legal Information Institute (Cornell) (LII (Cornell)) Pacific Islands Legal Information Institute (PacLII) Wits University School of Law (Wits Law School) For further details, see the WorldLII brochure. The LIIs, meeting in Montreal in October 2002, adopted the Montreal Declaration on public access to law. WorldLII comprises three main facilities: Databases, Catalog and Websearch.
  • WorldLII Databases WorldLII provides a single search facility for databases located on the following Legal Information Institutes: AustLII; BAILII; CanLII; HKLII; LII (Cornell); and PacLII. WorldLII also includes as part of this searchable collection its own databases not found on other LIIs. These include databases of decisions of international Courts and Tribunals, databases from a number of Asian countries, and databases from South Africa (provided by Wits Law School). Over 270 databases from 48 jurisdictions in 20 countries are included in the initial release of WorldLII. Databases of case-law, legislation, treaties, law reform reports, law journals, and other materials are included. WorldLII welcomes enquiries concerning the possible inclusion of other databases on WorldLII or on one of its collaborating LIIs. WorldLII Catalog and Websearch The WorldLII Catalog provides links to over 15,000 law-related web sites in every country in the world. WorldLII's Websearch makes searchable the full text of as many of these sites as WorldLII's web-spider can reach. WorldLII welcomes enquiries from law librarians and other legal experts who are interested to become Contributing Editors to the WorldLII Catalog.
  • Operation of WorldLII The provision of the WorldLII service is coordinated by the Australasian Legal Information Institute (AustLII), which maintains WorldLII's user interface, the WorldLII Catalog and Websearch, and the databases located only on WorldLII. Technical enhancements to WorldLII are being developed jointly by the cooperating Legal Information Institutes. Contacting WorldLII General contact: feedback@worldlii.org AustLII/WorldLII Co-Directors: Professor Andrew Mowbray, UTS <andrew@austlii.edu.au> Professor Graham Greenleaf, UNSW <graham@austlii.edu.au> Philip Chung, AustLII Executive Director <philip@austlii.edu.au> Mail: WorldLII, c/- AustLII, UTS Faculty of Law, PO Box 123 Broadway NSW 2007 Australia Telephone: +61 2 9514 4921 Fax: +61 2 9514 4908 We hope that you enjoy using WorldLII and find it to be a useful service. Feedback (particularly words of encouragement or constructive criticism) are welcome and may be sent to feedback@worldlii.org. WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback URL: http://www.worldlii.org/worldlii/
  •  
    The various Legal information Institutes that collaborate on WorldLII have the most advanced, integrated, and largest public legal research databases available on the Internet, searchable through a common interface. Still nothing like a complete university law library because so many legal source materials are copyrighted, this is the combined effort of many law schools. A companion browser extension is available for Chrome and Firefox called Jureeka. That extension causes your pages rendered in the browser to contain hyperlinks to all legal authorities cited on the page that are recognized by the extension, with the links going to case law, regulations, and statues that are in the public domain. https://chrome.google.com/webstore/detail/jureeka/ediidjmindkcaflpfjgabfaibhngadbb?utm_source=chrome-app-launcher-info-dialog Thus far, Jureeka is integrated with all legal materials published by the Legal Information Institute long located at Cornell Law School, as well as the Justia archives of U.S. case law. Rumor has it that the extension will be extended to cover materials published by other Legal Information Institutes at various law schools around the globe.
Paul Merrell

As Clapper Stalls on 28 Pages, New Poll Shows Americans Want Complete 9/11 Disclosure |... - 0 views

  • Amid surging public interest in 28 classified pages said to link Saudi Arabia to 9/11, a new Rasmussen Reports poll finds 74% of Americans want the U.S. government to release everything it knows about the attacks, other than information that would imperil national security. Only a quarter of Americans believe they know the full truth about the September 11 attacks, and most Americans are cynical about the government’s motives for keeping some details under wraps: Among those who think the government hasn’t shared all it knows, 38% think it was withheld for political reasons and 29% say the secrecy is intended to protect allies. Just 21% think the lack of disclosure is meant to protect the country’s security.
‹ Previous 21 - 40 of 603 Next › Last »
Showing 20 items per page