Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged prohibition

Rss Feed Group items tagged

Gary Edwards

What the hell just happened? 'Tyranny By Executive Order' | by Constitutional Attorney ... - 0 views

  •  
    "What the hell just happened? That is the question that many Americans should be asking themselves following the news conference where Obama unveiled his plan for destroying the Bill of Rights to the U.S. Constitution. At first glance it appeared to be a case of Obama shamelessly using the deaths of innocents, and some live children as a backdrop, to push for the passage of radical gun control measures by Congress. Most of these have no chance of passing, yet, Obama's signing of Executive orders initiating 23 so called Executive actions on gun control seemed like an afterthought. Unfortunately, that is the real story, but it is generally being overlooked. The fact is that with a few strokes of his pen Obama set up the mechanisms he will personally use to not only destroy the Second Amendment to the Constitution, but also the First, Fourth, and Fifth Amendments. It will not matter what Congress does, Obama can and will act on his own, using these Executive actions, and will be violating both the Constitution and his oath of office when he does it. Here are the sections of the Executive Order that he will use: "1. Issue a Presidential Memorandum to require federal agencies to make relevant data available to the federal background-check system." What exactly is relevant data? Does it include our medical records obtained through Obamacare, our tax returns, our political affiliations, our military background, and our credit history? I suggest that all of the above, even if it violates our fourth Amendment right to privacy will now be relevant data for determining if we are allowed to purchase a firearm. "2. Address unnecessary legal barriers, particularly relating to the Health Insurance Portability and Accountability Act, that may prevent states from making information available to the background-check system." This should be read in conjunction with section 16 of the order that says: "16. Clarify that the Affordable Care Act does not prohibit doctors
Paul Merrell

The Stop Arming Terrorists Act     : Information Clearing House - ICH - 0 views

  • Rep. Tulsi Gabbard (HI-02) introduced the Stop Arming Terrorists Act today. The legislation would prohibit the U.S. government from using American taxpayer dollars to provide funding, weapons, training, and intelligence support to groups like the Levant Front, Fursan al Ha and other allies of Jabhat Fateh al-Sham, al-Qaeda and ISIS, or to countries who are providing direct or indirect support to those same groups.
  • Rep. Tulsi Gabbard said, “Under U.S. law it is illegal for any American to provide money or assistance to al-Qaeda, ISIS or other terrorist groups. If you or I gave money, weapons or support to al-Qaeda or ISIS, we would be thrown in jail. Yet the U.S. government has been violating this law for years, quietly supporting allies and partners of al-Qaeda, ISIL, Jabhat Fateh al Sham and other terrorist groups with money, weapons, and intelligence support, in their fight to overthrow the Syrian government.[i] “The CIA has also been funneling weapons and money through Saudi Arabia, Turkey, Qatar and others who provide direct and indirect support to groups like ISIS and al-Qaeda. This support has allowed al-Qaeda and their fellow terrorist organizations to establish strongholds throughout Syria, including in Aleppo.   “A recent New York Times article confirmed that ‘rebel groups’ supported by the U.S. ‘have entered into battlefield alliances with the affiliate of al-Qaeda in Syria, formerly known as al Nusra.’ This alliance has rendered the phrase ‘moderate rebels’ meaningless. Reports confirm that ‘every armed anti-Assad organization unit in those provinces [of Idlib and Aleppo] is engaged in a military structure controlled by [al-Qaeda’s] Nusra militants.’
  • “A recent Wall Street Journal article reported that many rebel groups are ‘doubling down on their alliance’ with al Nusra. Some rebel groups are renewing their alliance, while others, like Nour al-Din al-Zinki, a former CIA-backed group and one of the largest factions in Aleppo are joining for the first time. “The Syria Conquest Front—formerly known as the al-Qaeda-linked Nusra Front—is deeply intermingled with armed opposition groups of all stripes across Syria’s battlefields.”  “The CIA has long been supporting a group called Fursan al Haqq, providing them with salaries, weapons and support, including surface to air missiles.  This group is cooperating with and fighting alongside an al-Qaeda affiliated group trying to overthrow the Syrian government. The Levant Front is another so-called moderate umbrella group of Syrian opposition fighters. Over the past year, the United States has been working with Turkey to give this group intelligence support and other forms of military assistance. This group has joined forces with al-Qaeda’s offshoot group in Syria.  “This madness must end. We must stop arming terrorists. The Government must end this hypocrisy and abide by the same laws that apply to its’ citizens.  “That is why I’ve introduced the Stop Arming Terrorists bill—legislation based on congressional action during the Iran-Contra affair to stop the CIA’s illegal arming of rebels in Nicaragua. It will prohibit any Federal agency from using taxpayer dollars to provide weapons, cash, intelligence, or any support to al-Qaeda, ISIS and other terrorist groups, and it will prohibit the government from funneling money and weapons through other countries who are directly or indirectly supporting terrorists,” concluded Rep. Tulsi Gabbard.
  • ...1 more annotation...
  • Background: The Stop Arming Terrorists bill prohibits U.S. government funds from being used to support al-Qaeda, ISIS or other terrorist groups. In the same way that Congress passed the Boland Amendment to prohibit the funding and support to CIA backed-Nicaraguan Contras during the 1980’s, this bill would stop CIA or other Federal government activities in places like Syria by ensuring U.S. funds are not used to support al-Qaeda, Jabhat Fateh al-Sham, ISIS, or other terrorist groups working with them. It would also prohibit the Federal government from funding assistance to countries that are directly or indirectly supporting those terrorist groups. The bill achieves this by: Making it illegal for any U.S. Federal government funds to be used to provide assistance covered in this bill to terrorists. The assistance covered includes weapons, munitions, weapons platforms, intelligence, logistics, training, and cash. Making it illegal for the U.S. government to provide assistance covered in the bill to any nation that has given or continues to give such assistance to terrorists. Requiring the Director of National Intelligence (DNI) to determine the individual and groups that should be considered terrorists, for the purposes of this bill, by determining: (a) the individuals and groups that are associated with, affiliated with, adherents to or cooperating with al-Qaeda, Jabhat Fateh al-Sham, or ISIS; (b) the countries that are providing assistance covered in this bill to those individuals or groups. Requiring the DNI to review and update the list of countries and groups to which assistance is prohibited every six months, in consultation with the House Foreign Affairs and Armed Services Committees, as well as the House Permanent Select Committee on Intelligence. Requiring the DNI to brief Congress on the determinations.
Paul Merrell

VIDEO: Rep. Tulsi Gabbard Introduces Legislation to Stop Arming Terrorists | Congresswo... - 0 views

  • Rep. Tulsi Gabbard (HI-02) introduced the Stop Arming Terrorists Act today. The legislation would prohibit the U.S. government from using American taxpayer dollars to provide funding, weapons, training, and intelligence support to groups like the Levant Front, Fursan al Ha and other allies of Jabhat Fateh al-Sham, al-Qaeda and ISIS, or to countries who are providing direct or indirect support to those same groups. The legislation is cosponsored by Reps. Peter Welch (D-VT-AL), Barbara Lee (D-CA-13), Dana Rohrabacher (R-CA-48), and Thomas Massie (R-KT-04), and supported by the Progressive Democrats of America (PDA) and the U.S. Peace Council. Video of Rep. Tulsi Gabbard’s speech on the House floor is available here Rep. Tulsi Gabbard said, “Under U.S. law it is illegal for any American to provide money or assistance to al-Qaeda, ISIS or other terrorist groups. If you or I gave money, weapons or support to al-Qaeda or ISIS, we would be thrown in jail. Yet the U.S. government has been violating this law for years, quietly supporting allies and partners of al-Qaeda, ISIL, Jabhat Fateh al Sham and other terrorist groups with money, weapons, and intelligence support, in their fight to overthrow the Syrian government.[i] “The CIA has also been funneling weapons and money through Saudi Arabia, Turkey, Qatar and others who provide direct and indirect support to groups like ISIS and al-Qaeda. This support has allowed al-Qaeda and their fellow terrorist organizations to establish strongholds throughout Syria, including in Aleppo.
  • “A recent New York Times article confirmed that ‘rebel groups’ supported by the U.S. ‘have entered into battlefield alliances with the affiliate of al-Qaeda in Syria, formerly known as al Nusra.’ This alliance has rendered the phrase ‘moderate rebels’ meaningless. Reports confirm that ‘every armed anti-Assad organization unit in those provinces [of Idlib and Aleppo] is engaged in a military structure controlled by [al-Qaeda’s] Nusra militants.’ “A recent Wall Street Journal article reported that many rebel groups are ‘doubling down on their alliance’ with al Nusra. Some rebel groups are renewing their alliance, while others, like Nour al-Din al-Zinki, a former CIA-backed group and one of the largest factions in Aleppo are joining for the first time. “The Syria Conquest Front—formerly known as the al-Qaeda-linked Nusra Front—is deeply intermingled with armed opposition groups of all stripes across Syria’s battlefields.”  “The CIA has long been supporting a group called Fursan al Haqq, providing them with salaries, weapons and support, including surface to air missiles.  This group is cooperating with and fighting alongside an al-Qaeda affiliated group trying to overthrow the Syrian government. The Levant Front is another so-called moderate umbrella group of Syrian opposition fighters. Over the past year, the United States has been working with Turkey to give this group intelligence support and other forms of military assistance. This group has joined forces with al-Qaeda’s offshoot group in Syria.  “This madness must end. We must stop arming terrorists. The Government must end this hypocrisy and abide by the same laws that apply to its’ citizens. 
  • “That is why I’ve introduced the Stop Arming Terrorists bill—legislation based on congressional action during the Iran-Contra affair to stop the CIA’s illegal arming of rebels in Nicaragua. It will prohibit any Federal agency from using taxpayer dollars to provide weapons, cash, intelligence, or any support to al-Qaeda, ISIS and other terrorist groups, and it will prohibit the government from funneling money and weapons through other countries who are directly or indirectly supporting terrorists,” concluded Rep. Tulsi Gabbard.
  • ...2 more annotations...
  • Background: The Stop Arming Terrorists bill prohibits U.S. government funds from being used to support al-Qaeda, ISIS or other terrorist groups. In the same way that Congress passed the Boland Amendment to prohibit the funding and support to CIA backed-Nicaraguan Contras during the 1980’s, this bill would stop CIA or other Federal government activities in places like Syria by ensuring U.S. funds are not used to support al-Qaeda, Jabhat Fateh al-Sham, ISIS, or other terrorist groups working with them. It would also prohibit the Federal government from funding assistance to countries that are directly or indirectly supporting those terrorist groups. The bill achieves this by: Making it illegal for any U.S. Federal government funds to be used to provide assistance covered in this bill to terrorists. The assistance covered includes weapons, munitions, weapons platforms, intelligence, logistics, training, and cash. Making it illegal for the U.S. government to provide assistance covered in the bill to any nation that has given or continues to give such assistance to terrorists. Requiring the Director of National Intelligence (DNI) to determine the individual and groups that should be considered terrorists, for the purposes of this bill, by determining: (a) the individuals and groups that are associated with, affiliated with, adherents to or cooperating with al-Qaeda, Jabhat Fateh al-Sham, or ISIS; (b) the countries that are providing assistance covered in this bill to those individuals or groups. Requiring the DNI to review and update the list of countries and groups to which assistance is prohibited every six months, in consultation with the House Foreign Affairs and Armed Services Committees, as well as the House Permanent Select Committee on Intelligence. Requiring the DNI to brief Congress on the determinations.
  • [i] Levant Front (U.S. backed, via the MOC in Turkey) is working under an Ahrar al Sham led umbrella group: http://www.understandingwar.org/sites/default/files/December%202%20EDITS%20COT_2.pdf ; U.S. support for Levant Front: http://carnegie-mec.org/diwan/57605?lang=en ; CIA groups cooperated with Jayesh al-Fateh http://www.thedailybeast.com/articles/2016/01/19/the-cia-s-syria-program-and-the-perils-of-proxies.html; U.S. weapons arriving in Syria through covert, CIA-led program, via Saudi Arabia and Turkey; CIA can provide support http://www.reuters.com/article/us-usa-syria-obama-order-idUSBRE8701OK20120802
  •  
    A member of Congress who has actually discovered hyperlinks? Amazing.
Gary Edwards

Obama To Americans: You Don't Deserve To Be Free - Forbes - 1 views

  • President Obama’s Kansas speech is a remarkable document. In calling for more government controls, more taxation, more collectivism, he has two paragraphs that give the show away. Take a look at them. there is a certain crowd in Washington who, for the last few decades, have said, let’s respond to this economic challenge with the same old tune. “The market will take care of everything,” they tell us. If we just cut more regulations and cut more taxes–especially for the wealthy–our economy will grow stronger. Sure, they say, there will be winners and losers. But if the winners do really well, then jobs and prosperity will eventually trickle down to everybody else. And, they argue, even if prosperity doesn’t trickle down, well, that’s the price of liberty. Now, it’s a simple theory. And we have to admit, it’s one that speaks to our rugged individualism and our healthy skepticism of too much government. That’s in America’s DNA. And that theory fits well on a bumper sticker. (Laughter.) But here’s the problem: It doesn’t work. It has never worked. (Applause.) It didn’t work when it was tried in the decade before the Great Depression. It’s not what led to the incredible postwar booms of the ’50s and ’60s. And it didn’t work when we tried it during the last decade. (Applause.) I mean, understand, it’s not as if we haven’t tried this theory.
  • The typical Republican would never, ever say “the market will take care of everything.” He’d say, “the market will take care of most things, and for the other things, we need the regulatory-welfare state.” They are for individualism–except when they are against it. They are against free markets and individualism not only when they agree with the Left that we must have antitrust laws and the Federal Reserve, but also when they demand immigration controls, government schools, regulatory agencies, Medicare, laws prohibiting abortion, Social Security, “public works” projects, the “social safety net,” laws against insider trading, banking regulation, and the whole system of fiat money.
  • I pick 100 years deliberately, because it was exactly 100 years ago that a gigantic anti-capitalist measure was put into effect: the Federal Reserve System. For 100 years, government, not the free market, has controlled money and banking. How’s that worked out? How’s the value of the dollar held up since 1913? Is it worth one-fiftieth of its value then or only one-one-hundredth? You be the judge. How did the dollar hold up over the 100 years before this government take-over of money and banking? It actually gained slightly in value.
  • ...5 more annotations...
  • Laissez-faire hasn’t existed since the Sherman Antitrust Act of 1890. That was the first of a plethora of government crimes against the free market.
  • Though not in Washington, I’m in that “certain crowd” that has been saying for decades that the market will take care of everything. It’s not really a crowd, it’s a tiny group of radicals–radicals for capitalism, in Ayn Rand’s well-turned phrase. The only thing that the market doesn’t take care of is anti-market acts: acts that initiate physical force. That’s why we need government: to wield retaliatory force to defend individual rights. Radicals for capitalism would, as the Declaration of Independence says, use government only “to secure these rights”–the rights to life, liberty, property, and the pursuit of happiness. (Yes, I added “property” in there–property rights are inseparable from the other three.) That’s the political philosophy on which Obama is trying to hang the blame for the recent financial crisis and every other social ill. But ask yourself, are we few radical capitalists in charge? Have radical capitalists been in charge at any time in the last, oh, say 100 years?
  • Even you, dear reader, are probably wondering how on earth anyone could challenge things like Social Security, government schools, and the FDA. But that’s not the point. The point is: these statist, anti-capitalist programs exist and have existed for about a century. The point is: Obama is pretending that the Progressive PGR -2.02% Era, the New Deal, and the Great Society were repealed, so that he can blame the financial crisis on capitalism. He’s pretending that George Bush was George Washington.
  • What Obama is indeed responsible for is the injustice of robbing some to (allegedly) benefit others. To the extent that cronyism, not the free market, sets income, that is an injustice to be laid at the statists’ door.
  • There is no such problem as “unemployment” under capitalism. Prices fall to clear the market. Twice the work force could be employed if average wages dropped in half. But that’s nominal wages; with a constant money supply, prices would also fall in half–or slightly more than that. This isn’t just theory. America’s workforce has grown steadily decade after decade, yet the standard of living has risen at the same time. I grant you that the rise has slowed as statist intervention has grown. Think of the phenomenal progress between, say 1900 and 1920 as compared to the minor progress from 1993 to 2013. Most of the progress in the last 20 years has come in the freest area of the economy: electronics and computing.
  •  
    Harry Binswanger defends laissez-faire capitalism, using Ayn Rand Objectivism.
  •  
    The major problem with Ayn Rand Objectivism is that it's an "ism." The Utopian ideal it is based on has never existed in reality and likely never will; its principles have never been tested. Moreover, I will argue that Binswanger is incorrect in arguing that the anti-capitalist phenomenon in America began with creation of the Federal Reserve; it dates much farther back. The economic basis for the Revolutionary War was largely the Crown-granted monopolies granted to the first great British "companies" (corporations), which had the effect of forcing North American colonists to pay monopoly rents for common goods and kept American ship owners from importing those goods from elsewhere to sell at a lower price. The Founding Fathers were strongly against privately-owned corporations and government-granted monopolies, with only two exceptions, copyrights for literary works and patents for inventions. The Constitution's prohibition against government-granted monopolies is implicit in its allowance for only two narrowly-defined types. The Founding Fathers' writings explicitly discussed the difference between "natural" monopolies and those created by government or anti-competitive conduct. During the early years of the nation corporations were permitted by the States, but only for public purposes, usually for public works such as bridges or roads for which there was a need to amass capital. These early American corporations were usually chartered only for the time required to complete the public work and to recover the invesment and a small profit, e.g., from tolls for using a bridge or road. Many of the early state constitutions explicitly limited the lifetime of corporations. However, such early opposition to corporations gradually eroded; corporate purposes were expanded, corporations were granted perpetual life, and the corporate form of doing business became much more widespread. Here, it is important to recognize that corporations are market artificialities c
Gary Edwards

James Madison and the States Natural Right of Nullification ; Publius-Huldah's Blog - 0 views

  • What are the Two Conditions Precedent for Nullification?
  • The act of the federal government must be unconstitutional –  usually a usurpation of a power not delegated to the federal government in the Constitution; and
  • The act must be something The States or The People can “nullify”- i.e., refuse to obey:  the act must order them to do something or not do something.
  • ...38 more annotations...
  • If the federal government should overpass the just bounds of its authority and make a tyrannical use of its powers, the people, whose creature it is, must appeal to the standard [the Constitution] they have formed, and take such measures to redress the injury done to the Constitution as the exigency may suggest and prudence justify.”
  • When the act of the federal government is unconstitutional and orders The States or The People to do – or not do – something, nullification is the proper form of interposition.
  • When the act of the federal government is unconstitutional, but doesn’t order The States or The People to do – or not do – something (the alien & sedition acts), nullification is not possible. The States may interpose by objecting, as in The Virginia & Kentucky Resolutions of 1798.
  • When the act of the federal government is constitutional, but unjust (the Tariff Act of 1828), the States may not nullify it; but may interpose by objecting and trying to get the Tariff Act changed.
  • Our Founding Principles in a Nutshell
  • Rights come from God;
  • People create governments;
  • The purpose of government is to secure the rights God gave us; and
  • When a government We created seeks to take away our God given rights, We have the Right – We have the Duty – to alter, abolish, or throw off such government.
  • The former will be exercised principally on external objects, as war, peace, negotiation, and foreign commerce; with which last the power of taxation will, for the most part, be connected.
  • It is to secure our rights to life and liberty by:
  • These enumerated powers concern: Military defense, international commerce & relations; Control of immigration and naturalization of new citizens; Creation of a uniform commercial system: Weights & measures, patents & copyrights, money based on gold & silver, bankruptcy laws, mail delivery & some road building; and With some of the Amendments, protect certain civil rights and voting rights (for blacks, women, citizens who don’t pay taxes, and citizens 18 years and older).
  • It is only with respect to the enumerated powers that the federal government has lawful authority over the Country at large. All other powers are “reserved to the several States” and The People.
  • The powers reserved to the several States will extend to all the objects which … concern the lives, liberties, and properties of the people, and the internal order, improvement, and prosperity of the State.”
  • Military defense (Art. I, Sec. 8, cl. 11-16); Laws against piracy and other felonies committed on the high seas (Art. I, Sec. 8, cl. 10); Protecting us from invasion (Art IV, Sec. 4); Prosecuting traitors (Art III, Sec. 3); and Restrictive immigration policies (Art. I, Sec. 9, cl. 1).
  • It is to secure our property rights by:
  • Regulating trade & commerce so we can produce, sell & prosper (Art. I, Sec. 8, cl.3). The original intent of the interstate commerce clause is to prohibit States from levying tolls & taxes on articles of commerce as they are transported thru the States for buying & selling. Establishing uniform weights & measures and a money system based on gold & silver (Art I, Sec. 8, cl. 5) – inflation via paper currency & fractional reserve lending is theft! Punishing counterfeiters (Art I, Sec. 8, cl. 6); Making bankruptcy laws to permit the orderly dissolution or reorganization of debtors’ estates with fair treatment of creditors (Art I, Sec 8, cl. 4); and Issuing patents & copyrights to protect ownership of intellectual labors (Art I, Sec 8, cl 8)
  • Madison answers the objection “that the judicial authority is to be regarded as the sole expositor of the Constitution, in the last resort”.
  • Laws against slavery (13th Amendment); Providing fair trials in federal courts (4th, 5th, 6th, 7th, and 8th Amendments); and          Obeying the Constitution!
  • The fourth Founding Principle in our Declaration is this: When government takes away our God given rights, We have the Right & the Duty to alter, abolish, or throw off such government. Nullification is thus a natural right of self-defense:
  • 1. As we have just seen, Jefferson, Madison, and Hamilton saw nullification of unconstitutional acts of the federal government as a “natural right” – not a “constitutional right”. And since Rights come from God, there is no such thing as a “constitutional right”!
  • 2. The Right of Nullification, transcending as it does, the Constitution; and being nowhere prohibited by the Constitution to the States, is a reserved power.
  • The 10th Amendment says: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”
  • Madison’s Report on the Virginia Resolutions (1799-1800)
  • Now! Note Well:  Madison actually says, in the same Report Barnett cites, that it is “a plain principle, founded in common sense” that The States are the final authority on whether the federal government has violated our Constitution! Under his discussion of the 3rd Resolution, Madison says:
  • “It appears to your committee to be a plain principle, founded in common sense, illustrated by common practice, and essential to the nature of compacts; that where resort can be had to no tribunal superior to the authority of the parties, the parties themselves must be the rightful judges in the last resort, whether the bargain made, has been pursued or violated. The Constitution of the United States was formed by the sanction of the States, given by each in its sovereign capacity. It adds to the stability and dignity, as well as to the authority of the Constitution, that it rests on this legitimate and solid foundation. The States then being the parties to the constitutional compact, and in their sovereign capacity, it follows of necessity, that there can be no tribunal above their authority, to decide in the last resort, whether the compact made by them be violated; and consequently that as the parties to it, they must themselves decide in the last resort, such questions as may be of sufficient magnitude to require their interposition.” [emphasis mine]
  • Madison explains that if, when the federal government usurps power, the States cannot act so as to stop the usurpation, and thereby preserve the Constitution as well as the safety of The States; there would be no relief from usurped power. 
  • This would subvert the Rights of the People as well as betray the fundamental principle of our Founding:
  • …If the deliberate exercise, of dangerous power, palpably withheld by the Constitution, could not justify the parties to it, in interposing even so far as to arrest the progress of the evil, and thereby to preserve the Constitution itself as well as to provide for the safety of the parties to it; there would be an end to all relief from usurped power, and a direct subversion of the rights specified or recognized under all the State constitutions, as well as a plain denial of the fundamental principle on which our independence itself was declared.” [emphasis mine]
  • It is to secure our right to liberty by:
  • Madison explains that when the federal government acts outside the Constitution by usurping powers, and when the Constitution affords no remedy to that usurpation; then the Sovereign States who are the Parties to the Constitution must likewise step outside the Constitution and appeal to that original natural right of self-defense.
  • Madison goes on to say that all three Branches of the federal government obtain their delegated powers from the Constitution; and they may not annul the authority of their Creator.
  • but, where powers are assumed which have not been delegated, a nullification of the act is the rightful remedy: that every State has a natural right in cases not within the compact, (casus non foederis,) to nullify of their own authority all assumptions of power by others within their limits: that without this right, they would be under the dominion, absolute and unlimited, of whosoever might exercise this right of judgment for them…” [boldface mine]
  • Application Today
  • When WE THE PEOPLE ratified our Constitution, and thereby created the federal government, WE did not delegate to our “creature” power to control our medical care, restrict guns and ammunition, dictate what is done in the public schools, dictate how we use our lands, and all the thousands of things they do WE never gave them authority in our Constitution to do.
  • Accordingly, each State has a natural right to nullify these unconstitutional dictates within its borders.  These dictates are outside the compact The Sovereign States made with each other –WE never gave our “creature” power over these objects.
  • To sum this up:
  • Nullification is a natural right of self-defense. Rights don’t come from the Constitution. Like all Rights, the right of self-defense comes from God (The Declaration of Independence, 2nd para). Nullification is a reserved power within the meaning of the 10th Amendment. The Constitution doesn’t prohibit States from nullifying, and We reserved the power to do it. God requires us to disobey civil authorities when they violate God’s Law. That’s why the 2nd para of the Declaration of Independence says we have the duty to overthrow tyrannical government. See: The Biblical Foundation of our Constitution. Nullification is required by Oath of Office:  Article VI, cl. 3 requires all State officers and judges to “support” the federal Constitution. Therefore, when the federal government violates the Constitution, the States must smack them down.
  •  
    Incredible and passionate argument concerning the States natural God given right to nullify and render unenforceable un-Constitutional actions of the Federal Government.  As "creators" of the Federal Government, the States are obligated to nullify un-Constitutional actions and interpose Constitutional alternatives.  Huldah sites Jefferson, Madison and Hamilton as the primary Constitutional authorities for her rock solid argument.   If ever you want to learn about the Constitution, Publius Huldah is clearly the place to go.  
Paul Merrell

John Kerry peace plan "to recognise Israel as a Jewish state" - Telegraph - 0 views

  • An outline Middle East peace agreement being drawn up by John Kerry will propose recognising Israel as a Jewish state, according to a leaked report, in a development that represents a major coup for the Israeli leadership but which risks an outright Palestinian rejection. Mr Kerry, the US secretary of state, has overridden vocal Palestinian objections in stipulating that Israel's Jewish character should be an explicit part of a final status accord, the conservative Israeli newspaper, Maariv reported.
  •  
    What exactly is it that John Kerry does not understand about "Congress shall make no law respecting an establishment of religion[?]" See e.g., Board of Education of Kiryas Joel Village School District v. Grumet,  512 U.S. 687 (1994) (establishment of a Satmar Hasidim Jewish school district violated the First Amendment's Establishment Clause). http://supreme.justia.com/us/512/687/case.html. Notice that the Court there faced a school district that was in effect a Jewish school district, not a school district that had an ostensibly religious purpose. Does Kerry believe that the U.S. government may do abroad what the Constitution squarely prohibits, creating a Jewish State? And where does that leave the approximate 20 per cent of the Israel population that is not Jewish, not to mention the right of return to their property secured by the Fourth Geneva Convention for those Palestinians (and their descendants) driven out of what is now Israel in the late 1940s? The Convention provides, for example: "Art. 47. Protected persons who are in occupied territory shall not be deprived, in any case or in any manner whatsoever, of the benefits of the present Convention by any change introduced, as the result of the occupation of a territory, into the institutions or government of the said territory, *nor by any agreement concluded between the authorities of the occupied territories and the Occupying Power,* nor by any annexation by the latter of the whole or part of the occupied territory." And -- "Art. 49. Individual or mass forcible transfers, as well as deportations of protected persons from occupied territory to the territory of the Occupying Power or to that of any other country, occupied or not, are prohibited, regardless of their motive."
Gary Edwards

Liberty's backlash -- why we should be grateful to Edward Snowden | Fox News - 1 views

  •  
    Liberty's backlash -- why we should be grateful to Edward Snowden By Judge Andrew P. Napolitano Published August 01, 2013 FoxNews.com Last week, Justin Amash, the two-term libertarian Republican congressman from Michigan, joined with John Conyers, the 25-term liberal Democratic congressman from the same state, to offer an amendment to legislation funding the National Security Agency (NSA). If enacted, the Amash-Conyers amendment would have forced the government's domestic spies when seeking search warrants to capture Americans' phone calls, texts and emails first to identify their targets and produce evidence of their terror-related activities before a judge may issue a warrant. The support they garnered had a surprising result that stunned the Washington establishment. It almost passed. The final vote, in which the Amash-Conyers amendment was defeated by 205 to 217, was delayed for a few hours by the House Republican leadership, which opposed the measure. The Republican leadership team, in conjunction with President Obama and House Minority Leader Nancy Pelosi, needed more time for arm-twisting so as to avoid a humiliating loss. But the House rank-and-file did succeed in sending a message to the big-government types in both parties: Nearly half of the House of Representatives has had enough of government spying and then lying about it, and understands that spying on every American simply cannot withstand minimal legal scrutiny or basic constitutional analysis. The president is deeply into this and no doubt wishes he wasn't. He now says he welcomed the debate in the House on whether his spies can have all they want from us or whether they are subject to constitutional requirements for their warrants. Surely he knows that the Supreme Court has ruled consistently since the time of the Civil War that the government is always subject to the Constitution, wherever it goes and whatever it does. As basic as that sounds, it is not a universally held belief am
Gary Edwards

Obama's secret TPP scheme will criminalize saving seeds, push biotech patent monopolies... - 0 views

  • TPP will allow evil corporations like Monsanto to rule over national governments One major aim of TPP is to punish countries that attempt to mandate the labeling of genetically-modified organisms (GMOs) or ban them outright. Key provisions in the international decree would allow corporations like Monsanto to actually sue governments for trying to protect their people against GMOs, all in the name of fostering "free trade."Farmers would also be prohibited from saving seeds under the plan as countries are forcibly grafted into a regulatory paradigm governed by patent monopolies. Although not every country attending the TPP meetings is on board with this agenda, the stated goal is to force all negotiating parties to make patents on plants available as well as to protect plant varieties under the 1991 Protection of New Varieties of Plants Act (UPOV 1991).
  • "The TPP will eliminate all nation states as the ruling authority and it will be supplanted by corporate authority," adds Hodges. "This will be made possible because of an obscure provision of the TPP known as the Investor State Dispute Settlement (ISDS).""ISDS allows corporations to sue governments, for any government action (at any level, including local government level) which hinders a corporation's future profits. Literally, Monsanto could provably be poisoning the entire population of a nation and the nation could do nothing which might result in the loss of profits to Monsanto."
  • The existing patent monopoly provisions of UPOV 1991 combined with TPP's even stricter one will create an agricultural nightmare for farmers who wish to grow clean, patent-free foods as well as save the seeds of their crops year after year. This will hit poorer farmers particularly hard. The new-found power of multinational corporations under TPP to dictate the agricultural destinies of signatory countries represents yet another plank in the establishment of corporations eventually holding absolute control over food.
  • ...1 more annotation...
  • "[T]he new TPP language will prohibit farmers from saving and exchanging many varieties of seeds -- a practice vital to the livelihood and welfare of traditional farming communities -- and most likely increase multinational control of the farming industry in TPP nations," reads a review of TPP's provisions published in the Harvard Law School Human Rights Journal.
  •  
    "TPP will allow evil corporations like Monsanto to rule over national governments One major aim of TPP is to punish countries that attempt to mandate the labeling of genetically-modified organisms (GMOs) or ban them outright. Key provisions in the international decree would allow corporations like Monsanto to actually sue governments for trying to protect their people against GMOs, all in the name of fostering "free trade." Farmers would also be prohibited from saving seeds under the plan as countries are forcibly grafted into a regulatory paradigm governed by patent monopolies. Although not every country attending the TPP meetings is on board with this agenda, the stated goal is to force all negotiating parties to make patents on plants available as well as to protect plant varieties under the 1991 Protection of New Varieties of Plants Act (UPOV 1991). "
Gary Edwards

U.S. reverses stance on treaty to regulate arms trade | Reuters - 0 views

  •  
    This article is more than 2-1/2 months old yet this is the first I've heard of it.  Pretty frightening "end-run" the administration is trying. Obama Finds Legal Way Around The 2nd. Amendment and Uses It. http://www.reuters.com/article/politicsNews/idUSTRE59E0Q920091015 On Wednesday the Obama administration took its first major step in a plan to ban all firearms in the United States . The Obama administration intends to force gun control and a complete ban on all weapons for US citizens through the signing of international treaties with foreign nations. By signing international treaties on gun control, the Obama administration can use the US State Department to bypass the normal legislative process in Congress. Once the US Government signs these international treaties, all US citizens will be subject to those gun laws created by foreign governments. These are laws that have been developed and promoted by organizations such as the United Nations and individuals such as George Soros and Michael Bloomberg. The laws are designed and intended to lead to the complete ban and confiscation of all firearms.  The Obama administration is attempting to use tactics and methods of gun control that will inflict major damage to our 2nd Amendment before US citizens even understand what has happened. Obama can appear before the public and tell them that he does not intend to pursue any legislation (in the United States) that will lead to new gun control laws, while cloaked in secrecy, his Secretary of State, Hillary Clinton is committing the US to international treaties and foreign gun control laws. Does that mean Obama is telling the truth? What it means is that there will be no publicized gun control debates in the media or votes in Congress. We will wake up one morning and find that the United States has signed a treaty that prohibits firearm and ammunition manufacturers from selling to the public. We will wake up another morning and find that the US has signed a treaty that pro
Gary Edwards

Seth Lipsky: 'Pieces of Eight': The Constitution and the Dollar - WSJ.com - 0 views

  •  
    "Pieces of Eight." It is a two-volume treatise on the monetary powers of the Constitution. Now out of print, it has become a kind of cult classic, selling on the Internet for hundreds of dollars a set. It addresses questions that, with the value of the dollar having collapsed to 1,200th of an ounce of gold, are suddenly timely. What is a dollar? How did it become our money of account? What powers in respect of money were given to the federal government in 1787? What disabilities, or prohibitions, are in the Constitution? How have we managed to get so far from the law as the Founders wrote it? And what can be done to bring us back from the brink? The title of the book comes from the nickname for the coin the Founding Fathers were referring to when, in the Constitution, they twice used the word "dollars." Its definition was codified in the Coinage Act of 1792, which provided for minting gold and silver coins and defined a dollar as having "the value of a Spanish milled dollar as the same is now current, and to contain three hundred and seventy-one grains and four sixteenth parts of a grain of pure, or four hundred and sixteen grains of standard silver." Mr. Vieira speaks for a school of thought-it goes back to James Madison and Alexander Hamilton and comes together today in, among other places, the Foundation for the Advancement of Monetary Education-that reckons such dollars, and their free-market equivalent in gold, are the only constitutional money in America. Lately he has been arguing for the establishment by the states of separate monetary systems. The authority to do so is in Article 1, Section 10, of the Constitution, which prohibits the states from making "any Thing but gold and silver Coin a Tender in Payment of Debts."
Paul Merrell

Text - H.Con.Res.105 - 113th Congress (2013-2014): Prohibiting the President from deplo... - 0 views

  • 113th CONGRESS 2d Session H. CON. RES. 105 _______________________________________________________________________ CONCURRENT RESOLUTION Resolved by the House of Representatives (the Senate concurring), SECTION 1. PROHIBITION REGARDING UNITED STATES ARMED FORCES IN IRAQ. The President shall not deploy or maintain United States Armed Forces in a sustained combat role in Iraq without specific statutory authorization for such use enacted after the date of the adoption of this concurrent resolution. SEC. 2. RULE OF CONSTRUCTION. Nothing in this concurrent resolution supersedes the requirements of the War Powers Resolution (50 U.S.C. 1541 et seq.). Passed the House of Representatives July 25, 2014. Attest: Clerk. 113th CONGRESS 2d Session H. CON. RES. 105
  •  
    Passed the House today overwhelmingly, 370-40. Watered down from the original bill, which set firm dates for withdrawal of all U.S. military forces not needed for protection of U.S. Embassy, diplomats, and contractor staff. The key phrase of the prohibition, "sustained combat role," is incredibly vague and open- ended. Moreover, it can be read as authorizing use of our Armed Forces in a combat role multiple times for any period that is shorter than "sustained."   E.g., a period of air strikes, take a break for a few days, start another period of air strikes, then argue that it's allowed because the first series of air strikes was not sustained.  Let's hope that the Senate fixes it.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

WA State Bill Proposes Criminalizing Help to NSA, Turning Off Resources to Yakima Facil... - 0 views

  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • The state level campaign to turn off power and electricity to the NSA got a big boost Wednesday. In a bipartisan effort, Washington became first state with a physical NSA location to consider the Fourth Amendment Protection Act, designed to make life extremely difficult for the massive spy agency. Rep. David Taylor (R-Moxee) and Rep Rep. Luis Moscoso (D- Mountlake Terrace) introduced HB2272 late Tuesday night. Based on model language drafted by the OffNow coalition, it would make it the policy of Washington “to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant.” Practically speaking, the bill prohibits state and local agencies from providing any material support to the NSA within their jurisdiction. This includes barring government-owned utilities from providing water and electricity. It makes information gathered without a warrant by the NSA and shared with law enforcement inadmissible in state court. It blocks public universities from serving as NSA research facilities or recruiting grounds. And it disincentivizes corporations attempting to fill needs not met in the absence of state cooperation.
  • Lawmakers in Oklahoma, California and Indiana have already introduced similar legislation, and a senator in Arizona has committed to running it there, but Washington counts as the first state with an actual NSA facility within its borders to consider the Fourth Amendment Protection Act. The NSA operates a listening center on the Army’s Yakima Training Center (YTC). The NSA facility is in Taylor’s district, and he said he cannot sit idly by while a secretive facility in his own backyard violate the rights of people everywhere. “We’re running the bill to provide protection against the ever increasing surveillance into the daily lives of our citizens,” he said. “Our Founding Fathers established a series of checks and balances in the Constitution. Given the federal government’s utter failure to address the people’s concerns, it’s up to the states to stand for our citizens’ constitutional rights.”
  • ...3 more annotations...
  • According to documents made public by the US Military, as of 2008, a company called PacifiCorp serves as the primary supplier of electric power, and Cascade Natural Gas Corporation supplies natural gas to YTC. The Kittitas Public Utility District, a function of the state of Washington, provides electric power for the MPRC and the Doris site, but no documentation has yet proven that it also provides electricity used directly by the NSA facility on site. And while YTC does provide a bulk of its own water, documents also show that some of it gets there by first passing through upstream dams owned and operated by the State. The Army report states, “YTC lies within three WAUs whose boundaries coincide with WRIAs, as defined by the State of Washington natural resource agencies.” WAU’s are Washington State Water Administration Units. WRIAs are Washington State Water Resource Inventory Areas A Washington company also has a strong link to the NSA. Cray Inc. builds supercomputers for the agency.
  • If the bill passes, it would set in motion actions to stop any state support of the Yakima center as long as it remains in the state, and could make Cray ineligible for any contracts with the state or its political subdivisions. Three public universities in Washington join 166 schools nationwide partnering with the NSA. Taylor’s bill would address these schools’ status as NSA “Centers of Academic Excellence,” and would bar any new partnerships with other state colleges or universities. Tenth Amendment Center national communications director Mike Maharrey says the bills prohibition against using unconstitutionally gathered data in state court would probably have the most immediate impact. In fact, lawmakers in Kansas and Missouri will consider bills simply addressing this kind of data sharing.
  • “We know the NSA shares data with state and local law enforcement. We know from a Reuters report that most of this shared data has absolutely nothing to do with national security issues. This bill would make that information inadmissible in state court,” he said. “This data sharing shoves a dagger into the heart of the Fourth Amendment. This bill would stop that from happening. This is a no-brainer. Every state should do it.” Maharrey said he expects at least three more states to introduce the act within the next few weeks. “This idea is catching fire,” he said. “And why wouldn’t it? We have an out of control agency spying on virtually everybody in the world. We have a president and a Congress that appears poised to maybe put a band aid on it. Americans are realizing if we are going to slow down the NSA, we are going to have to take a different approach. This is it.”
Paul Merrell

The NSA is turning the internet into a total surveillance system | Alexander Abdo and P... - 0 views

  • Another burst of sunlight permeated the National Security Agency's black box of domestic surveillance last week.According to the New York Times, the NSA is searching the content of virtually every email that comes into or goes out of the United States without a warrant. To accomplish this astonishing invasion of Americans' privacy, the NSA reportedly is making a copy of nearly every international email. It then searches that cloned data, keeping all of the emails containing certain keywords and deleting the rest – all in a matter of seconds.
  • The NSA appears to believe this general monitoring of our electronic communications is justified because the entire process takes, in one official's words, "a small number of seconds". Translation: the NSA thinks it can intercept and then read Americans' emails so long as the intrusion is swift, efficient and silent.That is not how the fourth amendment works.Whether the NSA inspects and retains these messages for years, or only searches through them once before moving on, the invasion of Americans' privacy is real and immediate. There is no "five-second rule" for fourth amendment violations: the US constitution does not excuse these bulk searches simply because they happen in the blink of an eye.The government claims that this program is authorized by a surveillance statute passed in 2008 that allows the government to target foreigners for surveillance. Although the government has frequently defended that law as a necessary tool in gathering foreign intelligence, the government has repeatedly misled the public about the extent to which the statute implicates Americans' communications.
  • There should no longer be any doubt: the US government has for years relied upon its authority to collect foreigners' communications as a useful cover for its sweeping surveillance of Americans' communications. The surveillance program revealed last week confirms that the interception of American communications under this law is neither "targeted" at foreigners (in any ordinary sense of that word) nor "inadvertent", as officials have repeatedly claimed.Last week's revelations are a disturbing harbinger of future surveillance. Two months ago, this newspaper reported that the US government has been forcing American telecommunications companies to turn over the call records of every one of their customers "on an ongoing daily basis", to allow the NSA to later search those records when it has a reason to do so. The government has since defended the program, in part on the theory that Americans' right to privacy is not implicated by the initial acquisition of their phone records, only by their later searching.That legal theory is extraordinarily dangerous because it would allow the NSA to acquire virtually all digital information today simply because it might possibly become relevant tomorrow. The surveillance program revealed by the New York Times report goes one step further still. No longer is the government simply collecting information now so that the data is available to search, should a reasonable suspicion arise at some point in the future; the NSA is searching everything now – in real time and without suspicion – merely on the chance that it finds something of interest.
  • ...1 more annotation...
  • That principle of pre-emptive surveillance threatens to subvert the most basic protections of the fourth amendment, which generally prohibit the government from conducting suspicion-less fishing expeditions through our private affairs. If the government is correct that it can search our every communication in case we say or type something suspicious, there is little to prevent the NSA from converting the internet into a tool of pervasive surveillance.
  •  
    Obama was apparently technically accurate but materially misleading when he he said that no one is reading your email. But government computers are reading every email. "Although conduct by law enforcement officials prior to trial may ultimately impair that right, a constitutional violation occurs only at trial. Kastigar v. United States, 406 U. S. 441, 453 (1972). The Fourth Amendment functions differently. It prohibits 'unreasonable searches and seizures' whether or not the evidence is sought to be used in a criminal trial, and a violation of the Amendment is 'fully accomplished' at the time of an unreasonable governmental intrusion. United States v. Calandra, 414 U. S. 338, 354 (1974); United States v. Leon, 468 U. S. 897, 906 (1984)." United States v. Verdugo-Urquidez, 494 US 259, 265 (1990), http://scholar.google.com/scholar_case?case=10167007390100843851  
Paul Merrell

The Trans-Pacific Partnership and the Death of the Republic | WEB OF DEBT BLOG - 0 views

  • On April 22, 2015, the Senate Finance Committee approved a bill to fast-track the Trans-Pacific Partnership (TPP), a massive trade agreement that would override our republican form of government and hand judicial and legislative authority to a foreign three-person panel of corporate lawyers. The secretive TPP is an agreement with Mexico, Canada, Japan, Singapore and seven other countries that affects 40% of global markets. Fast-track authority could now go to the full Senate for a vote as early as next week. Fast-track means Congress will be prohibited from amending the trade deal, which will be put to a simple up or down majority vote. Negotiating the TPP in secret and fast-tracking it through Congress is considered necessary to secure its passage, since if the public had time to review its onerous provisions, opposition would mount and defeat it.
  • The most controversial provision of the TPP is the Investor-State Dispute Settlement (ISDS) section, which strengthens existing ISDS  procedures. ISDS first appeared in a bilateral trade agreement in 1959. According to The Economist, ISDS gives foreign firms a special right to apply to a secretive tribunal of highly paid corporate lawyers for compensation whenever the government passes a law to do things that hurt corporate profits — such things as discouraging smoking, protecting the environment or preventing a nuclear catastrophe. Arbitrators are paid $600-700 an hour, giving them little incentive to dismiss cases; and the secretive nature of the arbitration process and the lack of any requirement to consider precedent gives wide scope for creative judgments. To date, the highest ISDS award has been for $2.3 billion to Occidental Oil Company against the government of Ecuador over its termination of an oil-concession contract, this although the termination was apparently legal. Still in arbitration is a demand by Vattenfall, a Swedish utility that operates two nuclear plants in Germany, for compensation of €3.7 billion ($4.7 billion) under the ISDS clause of a treaty on energy investments, after the German government decided to shut down its nuclear power industry following the Fukushima disaster in Japan in 2011.
  • Under the TPP, however, even larger judgments can be anticipated, since the sort of “investment” it protects includes not just “the commitment of capital or other resources” but “the expectation of gain or profit.” That means the rights of corporations in other countries extend not just to their factories and other “capital” but to the profits they expect to receive there.
  • ...6 more annotations...
  • Under the TPP, could the US government be sued and be held liable if it decided to stop issuing Treasury debt and financed deficit spending in some other way (perhaps by quantitative easing or by issuing trillion dollar coins)? Why not, since some private companies would lose profits as a result? Under the TPP or the TTIP (the Transatlantic Trade and Investment Partnership under negotiation with the European Union), would the Federal Reserve be sued if it failed to bail out banks that were too big to fail? Firestone notes that under the Netherlands-Czech trade agreement, the Czech Republic was sued in an investor-state dispute for failing to bail out an insolvent bank in which the complainant had an interest. The investor company was awarded $236 million in the dispute settlement. What might the damages be, asks Firestone, if the Fed decided to let the Bank of America fail, and a Saudi-based investment company decided to sue?
  • Just the threat of this sort of massive damage award could be enough to block prospective legislation. But the TPP goes further and takes on the legislative function directly, by forbidding specific forms of regulation. Public Citizen observes that the TPP would provide big banks with a backdoor means of watering down efforts to re-regulate Wall Street, after deregulation triggered the worst financial crisis since the Great Depression: The TPP would forbid countries from banning particularly risky financial products, such as the toxic derivatives that led to the $183 billion government bailout of AIG. It would prohibit policies to prevent banks from becoming “too big to fail,” and threaten the use of “firewalls” to prevent banks that keep our savings accounts from taking hedge-fund-style bets. The TPP would also restrict capital controls, an essential policy tool to counter destabilizing flows of speculative money. . . . And the deal would prohibit taxes on Wall Street speculation, such as the proposed Robin Hood Tax that would generate billions of dollars’ worth of revenue for social, health, or environmental causes.
  • Clauses on dispute settlement in earlier free trade agreements have been invoked to challenge efforts to regulate big business. The fossil fuel industry is seeking to overturn Quebec’s ban on the ecologically destructive practice of fracking. Veolia, the French behemoth known for building a tram network to serve Israeli settlements in occupied East Jerusalem, is contesting increases in Egypt’s minimum wage. The tobacco maker Philip Morris is suing against anti-smoking initiatives in Uruguay and Australia. The TPP would empower not just foreign manufacturers but foreign financial firms to attack financial policies in foreign tribunals, demanding taxpayer compensation for regulations that they claim frustrate their expectations and inhibit their profits.
  • What is the justification for this encroachment on the sovereign rights of government? Allegedly, ISDS is necessary in order to increase foreign investment. But as noted in The Economist, investors can protect themselves by purchasing political-risk insurance. Moreover, Brazil continues to receive sizable foreign investment despite its long-standing refusal to sign any treaty with an ISDS mechanism. Other countries are beginning to follow Brazil’s lead. In an April 22nd report from the Center for Economic and Policy Research, gains from multilateral trade liberalization were shown to be very small, equal to only about 0.014% of consumption, or about $.43 per person per month. And that assumes that any benefits are distributed uniformly across the economic spectrum. In fact, transnational corporations get the bulk of the benefits, at the expense of most of the world’s population.
  • Something else besides attracting investment money and encouraging foreign trade seems to be going on. The TPP would destroy our republican form of government under the rule of law, by elevating the rights of investors – also called the rights of “capital” – above the rights of the citizens. That means that TPP is blatantly unconstitutional. But as Joe Firestone observes, neo-liberalism and corporate contributions seem to have blinded the deal’s proponents so much that they cannot see they are selling out the sovereignty of the United States to foreign and multinational corporations.
  • For more information and to get involved, visit: Flush the TPP The Citizens Trade Campaign Public Citizen’s Global Trade Watch Eyes on Trade
Paul Merrell

The Latest European Court of Human Rights Ruling on Accountability for Torture | Just S... - 0 views

  • In another important decision on European participation in the US war on terrorism, the European Court of Human Rights (ECtHR) issued a judgment late last month against Italy for its role in the extraordinary rendition of Egyptian cleric Osama Mustafa Hassan Nasr, better known as Abu Omar. (An English-language summary of ruling is here; the full decision, presently available only in French, is here.) The ruling not only represents a further contribution to the Strasbourg Court’s growing accountability jurisprudence, but also highlights the United States’ own failure to provide any redress to victims of the torture program that it primarily created and operated. The ECtHR’s decision in Nasr v. Italy concerns one of the most notorious instances of extraordinary rendition (i.e., the extrajudicial transfer of an individual to another country for purposes of abusive interrogation). In 2003, Nasr, who had been granted political asylum in Italy, was abducted in broad daylight from a street in Milan and taken to Aviano air base, which is operated by the US Air Force. Nasr was subsequently taken, by way of the US’s Ramstein air base in Germany, to Cairo where he was interrogated by Egyptian intelligence services. Egyptian authorities held Nasr in secret for more than a year and subjected him to repeated torture before releasing him in April 2004. Approximately 20 days after his release — and after submitting a statement to Milan’s public prosecutor describing his abuse — Nasr was rearrested and detained without charges. He was released in 2007, but prohibited from leaving Egypt.
  • The ECtHR ruling centers on Italy’s role in Nasr’s abduction in Milan, his rendition to Egypt where he faced a real risk of abuse, and its subsequent failure to conduct an effective domestic investigation or to provide any redress. The ECtHR found Italy liable for multiple violations of the European Convention on Human Rights (ECHR), including article 3 (the prohibition on inhuman or degrading treatment), article 5 (the right to liberty and security), and article 13 (the right to an adequate remedy). It ordered Italy to pay €70,000 to Nasr and €15,000 to his wife, Nabila Ghali, for the suffering and anguish caused by her husband’s enforced disappearance. The Milan public prosecutor had previously investigated and prosecuted 25 CIA officers, including the agency’s Milan station chief, Robert Seldon Lady, and seven Italian military intelligence officers, for aiding and abetting in Nasr’s abduction and rendition. The United States strenuously opposed the prosecution, warning that it would harm US-Italian relations, and the Italian government successfully challenged much of the evidence on the grounds it could jeopardize national security. The trial court convicted 22 CIA agents in absentia and gave them prison sentences of between six to nine years; a Milan appeals court upheld the convictions and overturned the acquittals of the other three US defendants. Italy’s highest court, however, overturned the conviction of five of the Italian military intelligence agents based on state secrecy grounds. The Italian government has refused to seek the extradition of the convicted US nationals. (For more details, Human Rights Watch has an excellent summary of the proceedings in Italy here.)
  • The ECtHR’s ruling in Nasr strengthens accountability by reinforcing state responsibility for participation in abuses committed during the war on terrorism. It builds on the Strasbourg Court’s prior decisions in El-Masri v. Macedonia and Al-Nashiri v. Poland/Husayn (Abu Zubaydah) v. Poland, which held Macedonia and Poland, respectively, liable for their role in CIA torture and rendition, including (in the case of Poland) for hosting a CIA black site. Nasr, together with El-Masri and al-Nashiri/Husayn, should help discourage a state’s future participation in cross-border counterterrorism operations conducted in flagrant violation of human rights guarantees. While the deterrent value of legal judgments may be uncertain, the recent line of Strasbourg Court decisions raises the costs of aiding and abetting illegal operations, even in the national security context.
  • ...2 more annotations...
  • Nasr also advances the jurisprudence surrounding a state’s duty to conduct an effective domestic investigation into torture. The Strasbourg Court noted that Italian courts had conducted a detailed investigation and that the evidence disregarded by Italy’s highest court on grounds of state secrecy had been sufficient to convict the five Italian military intelligence defendants. It further observed that because the evidence inculpating those defendants had been widely available in the press and on the Internet, the court’s invocation of state secrecy doctrine was not only unpersuasive, but designed to grant impunity to the defendants. Further, the Strasbourg Court noted that the Italian government had never sought the extradition of the convicted CIA agents. As result, the court ruled that despite the efforts of Italian investigators and judges, which had identified the responsible individuals and secured their convictions, the domestic proceedings failed to satisfy the procedural requirements of article 3 of the European Convention (prohibiting torture and other ill-treatment), due to the actions of the executive. This ruling is important because it imposes liability not only where a state takes no steps towards a genuine domestic investigation and prosecution (as in El-Masri and Al-Nashiri/Husayn), but also where efforts by a state’s judges and prosecutors are thwarted in the name of state secrecy.
  • The ECtHR’s rulings on the CIA torture program also highlight the continued absence of accountability in the United States. The US has failed both to conduct an effective criminal investigation of those most responsible for CIA torture and to provide any remedies to victims. In fact, the Obama administration has vigorously opposed the latter at every turn, invoking the same sweeping state secrecy doctrines the ECtHR rejected in El-Masri and Nasr. These rulings will likely catalyze future litigation before the Strasbourg Court and in European domestic courts as well. (Recent actions filed against Germany for its participation in US targeted killings through use of the Ramstein Air Base provide one example of such litigation.) While the ECtHR’s rulings may not spur further efforts in the United States, they reinforce the perception of the United States as an outlier on the important question of accountability for human rights violations.
Paul Merrell

TASS: Military & Defense - Syrian army finds UK and US chemical agents at depots captur... - 0 views

  • DAMASCUS, August 16. /TASS/. Chemical agents found at arms depots abandoned by militants suggest they were delivered to terrorists in Syria from the United States and the United Kingdom, Syrian Deputy Foreign Minister Faisal Mekdad said at a press conference in Damascus on Wednesday. "All the special means that have been found include hand grenades and rocket projectiles for grenade launchers, which are supplied with CS and CN irritant agents [they are shown in transparencies]. The discovered chemical munitions shown in the transparency were produced by Federal Laboratories on the US territory. And the chemical agents were produced by Cherming Defence UK and NonLethal Technologies (the USA)," Mekdad said.
  • According to the Syrian deputy foreign minister, the chemical agents were found at terrorists’ depots both in Aleppo and in liberated districts in the eastern suburb of Damascus. As Mekdad said, in compliance with article 5 of the convention on the prohibition of chemical weapons, the use of irritant agents is allowed only for fighting riots. They are prohibited for use as warfare means. "Therefore, it can be said with confidence that the United States and the United Kingdom, and also their allies in the region, are rendering all possible support to terrorist organizations active in Syria, thus violating the convention on the prohibition of chemical weapons. They are supplying terrorists not only with conventional arms but also with banned chemical agents," Mekdad said.
Gary Edwards

The Manifesto : Porter Stansberry and the Project to Restore America - 1 views

  • First, we should have a balanced budget amendment.
  • Next, we need a constitutional amendment that ensures sound money.
  • Finally... we need a logical way to put a stop to the narrowing of the tax base.
  • ...5 more annotations...
  • a constitutional amendment that limits state and federal taxation to 20% of income (from whatever the source) and abolishes all other forms of taxation at the state and local level. Give each household a $24,000 annual exemption.
  • We could eliminate the IRS.
  • How much did you make? Send the government 20% of it.
  • we should word the constitutional amendment to make clear our intentions:
  • Every U.S. citizen has the right to keep 80% of his income.
  •  
    I've been following and reading Porter's publications since September of 2008, when the mighty Marbux pointed me to Porter and the libertarian economists as a first step to understanding the financial collapse of 2008, and the incredible role the Federal government / Federal Reserve Bankster Cartel played. Porter started the Project to Restore Americqa, and wrote this very concise and well thought out manifesto explaining a new direction for America to consider.  If you love your country, please take a few minutes to read this.  Rarely has the truth been so clearly stated, and a solution so precisely, yet simply, presented.  Good stuff.  +1 "We have to stop giving our citizens improper incentives. We have to increase the "skin" voters have in the game by spreading the burden of government more equally. And we have to ensure the government doesn't have the power to destroy our currency. Americans now owe $56 trillion in total debt, much of it held by foreign investors. We must spend $3.5 trillion each year on interest. That is already more than the federal government spends, in total. We will never be able to repay these debts - already equal to roughly four times our country's GDP. The largest components of the debts we owe are government debts... and they are growing rapidly and show no signs of stopping. Do you think it's more likely we'll find a way to actually pay down these debts... or simply choose to print more money to pay these debts? That's what we're doing right now. So far, the Federal Reserve has printed more than $2 trillion of new money and used it to finance our government's borrowing binge. So the question is, what can we do to change the direction in which we are headed? We have to fundamentally restructure our system. There must be more balance between rights and responsibilities. There must be some fundamental limit on spending and on taxes. And we need sound money to prohibit the government from taxing us silently via inflation an
Gary Edwards

Why the GOP won't challenge vote fraud | Fellowship of the Minds - 0 views

  •  
    The Consent Decree of 1982 is an agreement between the Republican and Democrat parties that prohibits the Republican party from enforcing, providing oversight, or challenging allegations of voter fraud.  The Judge who signed the Consent Decree is retired, but comes out of retirement every election year to renew the decree..... Excerpt: The RNC and DNC made their Consent Decree 30 years ago, in 1982. The agreement in effect gives a carte blanche to the Democrat Party to commit vote fraud in every voting district across America that has, in the language of the Consent Decree, "a substantial proportion of racial or ethnic populations." The term "substantial proportion" is not defined. "Guy Benson of Townhall.com points out that in last Tuesday's election, Obama only won by 406,348 votes in 4 states: Florida: 73,858 Ohio: 103,481 Virginia: 115,910 Colorado: 113,099 Those four states, with a collective margin of 406,348 votes for Obama, add up to 69 electoral votes. Had Romney won 407,000 or so additional votes in the right proportion in those states, he would have 275 electoral votes. All four states showed Romney ahead in the days leading up to the election. But on November 6, Romney lost all four states by a substantial margin, all of which have precincts that inexplicably went 99% for Obama, had voter registrations that exceeded their population, and had experienced  problems with voting machines. This election was stolen by the Democrats via vote fraud. Despite all the evidence of fraud, the Republican Party has been strangely silent about it. Now you know why." Aftermath: It doesn't matter if this "perfect candidate" has dubious Constitutional eligibility to be president. They would see to it that his original birth certificate (if there is one) would never see the light of day. The same with his other documents - his passports, school and college records, draft registration, and medical records (so we'll never know why Obama has that v
Paul Merrell

Federal Judge Finds National Security Letters Unconstitutional, Bans Them | Threat Leve... - 0 views

  • Ultra-secret national security letters that come with a gag order on the recipient are an unconstitutional impingement on free speech, a federal judge in California ruled in a decision released Friday. U.S. District Judge Susan Illston ordered the government to stop issuing so-called NSLs across the board, in a stunning defeat for the Obama administration’s surveillance practices. She also ordered the government to cease enforcing the gag provision in any other cases. However, she stayed her order for 90 days to give the government a chance to appeal to the Ninth Circuit Court of Appeals.
  • “We are very pleased that the Court recognized the fatal constitutional shortcomings of the NSL statute,” said Matt Zimmerman, senior staff attorney for the Electronic Frontier Foundation, which filed a challenge to NSLs on behalf of an unknown telecom that received an NSL in 2011. “The government’s gags have truncated the public debate on these controversial surveillance tools. Our client looks forward to the day when it can publicly discuss its experience.” The telecommunications company received the ultra-secret demand letter in 2011 from the FBI seeking information about a customer or customers. The company took the extraordinary and rare step of challenging the underlying authority of the National Security Letter, as well as the legitimacy of the gag order that came with it.
  • Both challenges are allowed under a federal law that governs NSLs, a power greatly expanded under the Patriot Act that allows the government to get detailed information on Americans’ finances and communications without oversight from a judge. The FBI has issued hundreds of thousands of NSLs over the years and has been reprimanded for abusing them — though almost none of the requests have been challenged by the recipients. After the telecom challenged the NSL, the Justice Department took its own extraordinary measure and sued the company, arguing in court documents that the company was violating the law by challenging its authority. The move stunned EFF at the time.
  • ...2 more annotations...
  • Illston found that although the government made a strong argument for prohibiting the recipients of NSLs from disclosing to the target of an investigation or the public the specific information being sought by an NSL, the government did not provide compelling argument that the mere fact of disclosing that an NSL was received harmed national security interests. A blanket prohibition on disclosure, she found, was overly broad and “creates too large a danger that speech is being unnecessarily restricted.” She noted that 97 percent of the more than 200,000 NSLs that have been issued by the government were issued with nondisclosure orders.
  • NSLs are written demands from the FBI that compel internet service providers, credit companies, financial institutions and others to hand over confidential records about their customers, such as subscriber information, phone numbers and e-mail addresses, websites visited and more. NSLs are a powerful tool because they do not require court approval, and they come with a built-in gag order, preventing recipients from disclosing to anyone that they have even received an NSL. An FBI agent looking into a possible anti-terrorism case can self-issue an NSL to a credit bureau, ISP or phone company with only the sign-off of the Special Agent in Charge of their office. The FBI has to merely assert that the information is “relevant” to an investigation into international terrorism or clandestine intelligence activities.
1 - 20 of 213 Next › Last »
Showing 20 items per page