Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged proposes

Rss Feed Group items tagged

Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Gary Edwards

Reinventing Banking: From Russia to Iceland to Ecuador - 1 views

  • Global developments in finance and geopolitics are prompting a rethinking of the structure of banking and of the nature of money itself. Among other interesting news items: * In Russia, vulnerability to Western sanctions has led to proposals for a banking system that is not only independent of the West but is based on different design principles. * In Iceland, the booms and busts culminating in the banking crisis of 2008-09 have prompted lawmakers to consider a plan to remove the power to create money from private banks. * In Ireland, Iceland and the UK, a recession-induced shortage of local credit has prompted proposals for a system of public interest banks on the model of the Sparkassen of Germany. * In Ecuador, the central bank is responding to a shortage of US dollars (the official Ecuadorian currency) by issuing digital dollars through accounts to which everyone has access, effectively making it a bank of the people.
  • A major concern with stripping private banks of the power to create money as deposits when they make loans is that it will seriously reduce the availability of credit in an already sluggish economy. One solution is to make the banks, or some of them, public institutions. They would still be creating money when they made loans, but it would be as agents of the government; and the profits would be available for public use, on the model of the US Bank of North Dakota and the German Sparkassen (public savings banks). In Ireland, three political parties – Sinn Fein, the Green Party and Renua Ireland (a new party) — are now supporting initiatives for a network of local publicly-owned banks on the Sparkassen model. In the UK, the New Economy Foundation (NEF) is proposing that the failed Royal Bank of Scotland be transformed into a network of public interest banks on that model. And in Iceland, public banking is part of the platform of a new political party called the Dawn Party.
  • Particularly interesting is a proposal to provide targeted lending for businesses and industries by providing them with low-interest loans at 1-4 percent, financed through the central bank with quantitative easing (digital money creation). The proposal is to issue 20 trillion rubles for this purpose over a five year period. Using quantitative easing for economic development mirrors the proposal of UK Labour Leader Jeremy Corbin for “quantitative easing for people.”
  • ...8 more annotations...
  • William Engdahl concludes that Russia is in “a fascinating process of rethinking every aspect of her national economic survival because of the reality of the western attacks,” one that “could produce a very healthy transformation away from the deadly defects” of the current banking model.
  • Iceland’s Radical Money Plan Iceland, too, is looking at a radical transformation of its money system, after suffering the crushing boom/bust cycle of the private banking model that bankrupted its largest banks in 2008. According to a March 2015 article in the UK Telegraph: Iceland’s government is considering a revolutionary monetary proposal – removing the power of commercial banks to create money and handing it to the central bank. The proposal, which would be a turnaround in the history of modern finance, was part of a report written by a lawmaker from the ruling centrist Progress Party, Frosti Sigurjonsson, entitled “A better monetary system for Iceland”.
  • Under this “Sovereign Money” proposal, the country’s central bank would become the only creator of money. Banks would continue to manage accounts and payments and would serve as intermediaries between savers and lenders. The proposal is a variant of the Chicago Plan promoted by Kumhof and Benes of the IMF and the Positive Money group in the UK.
  • Ever since 2000, when Ecuador agreed to use the US dollar as its official legal tender, it has had to ship boatloads of paper dollars into the country just to conduct trade. In order to “seek efficiency in payment systems [and] to promote and contribute to the economic stability of the country,” the government of President Rafael Correa has therefore established the world’s first national digitally-issued currency.
  • Unlike Bitcoin and similar private crypto-currencies (which have been outlawed in the country), Ecuador’s dinero electronico is operated and backed by the government. The Ecuadorian digital currency is less like Bitcoin than like M-Pesa, a private mobile phone-based money transfer service started by Vodafone, which has generated a “mobile money” revolution in Kenya.
  • According to a National Assembly statement: Electronic money will stimulate the economy; it will be possible to attract more Ecuadorian citizens, especially those who do not have checking or savings accounts and credit cards alone. The electronic currency will be backed by the assets of the Central Bank of Ecuador.
  • That means there is no fear of the bank going bankrupt or of bank runs or bail-ins. Nor can the digital currency be devalued by speculative short selling. The government has declared that these are digital US dollars trading at 1 to 1 – take it or leave it – and the people are taking it. According to an October 2015 article titled “
  • Banking Moves into the 21st Century The catastrophic failures of the Western banking system mandate a new vision. These transformations, current and proposed, are constructive steps toward streamlining the banking system, eliminating the risks that have devastated individuals and governments, democratizing money, and promoting sustainable and prosperous economies.
  •  
    Excellent article on banking, lending, and currency reform initiatives.  Thanks to Marbux!
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
Paul Merrell

Why You Need a Passport Now! by Robert Wenzel - 0 views

  • At a future point, it may be impossible to get one. PapersPlease.org reports on what the State Department is planning for future passport applicants: The new U.S. passport application forms are back, worse than ever. Ignoring massive public opposition, and despite having recently admitted that it is already using the “proposed” forms illegally without approval, the State Department is trying again to get approval for a pair of impossible-to-complete new passport application forms that would, in effect, allow the State Department to deny you a passport simply by choosing to send you either or both of the new “long forms”. Early last year, the State Department proposed a new “Biographical Questionnaire” for passport applicants, which would have required anyone selected to receive the new long-form DS-5513 to answer bizarre and intrusive personal trivia questions about everything from whether you were circumcised (and if so, with what accompanying religious rituals) to the dates of all of your mother’s pre- and post-natal medical appointments, your parents’ addresses one year before you were born, every address at which you have ever resided, and your lifetime employment history including the names and phone numbers of each of your supervisors at every job you have ever held.
  • Most people would be unable to complete the proposed new form no matter how much time and money they invested in research. Requiring someone to complete Form DS-5513 would amount to de facto denial of their application for a passport — which, as we told the State Department, appeared to be the point of the form. The State Department’s notice of the proposal in the Federal Register didn’t include the form itself. After we published the proposed Form DS-5513, the story went viral and more than 3,000 public comments objecting to the proposal were filed with the State Department in the final 24 hours of the comment period. After that fiasco, the State Department went dark for several months, and claimed that they would “revise” the form. But they didn’t give up, and apparently they didn’t listen to (or didn’t care) what they had been told by members of the public in our comments. The State Department is now seeking approval for a (slightly)revised Form DS-5513 as well as a new Form DS-5520, also for passport applicants, containing many of the same questions.
  • The State Department no longer wants you to tell the passport examiner about the circumstances of your circumcision, but does still want to know the dates and locations of all of your mother’s pre- and post-natal medical appointments, how long she was hospitalized for your birth, and a complete list of everyone who was in the room when you were born. The revised forms no longer ask for all the addresses at which you have lived, but only for those addresses you are least likely to know: all the places you lived from birth until age 18. And so on, as you can see for yourself on the proposed Form DS-5513 and Form DS-5520. Read more here.
Paul Merrell

The Western Alliance Is Crumbling: EU Is Abandoning U.S. on Overthrowing Assad | Global... - 0 views

  • Europe is being overrun by refugees from American bombing campaigns in Libya and Syria, which created a failed state in Libya, and which threaten to do the same in Syria. Europe is thus being forced to separate itself from endorsing the U.S. bombing campaign that focuses against the Syrian government forces of the secular Shiite Syrian President Bashar al-Assad, instead of against his fundamentalist Sunni Islamic opponents, the jihadist groups (all of which are Sunni), such as ISIS, and Al Qaeda in Syria (al-Nusra).
  • Russia announced on October 2nd that their bombing campaign against America’s allies in Syria — ISIS and Al Nusra (the latter being Al Qaeda in Syria) — will intensify and will last “three or four months.” U.S. President Barack Obama is insisting upon excluding Russia from any peace talks on Syria; the U.S. will not move forward with peace talks unless Syria’s President Bashar al-Assad first steps down. But Russia is the only serious military power against the jihadists who are trying to defeat Assad, and Russia is now committing itself also to providing Lebanon with weapons against the jihadists, who are America’s allies in Lebanon too.
  • That’s hardly the only ‘legacy’ issue for Obama — his war against Russia, via overthrowing Gaddafi, then Yanukovych, and his still trying to overthrow Assad — which is now forcing the break-up of the Western Alliance, over the resulting refugee-crisis. An even bigger such conflict within the Alliance concerns Obama’s proposed treaty with European states, the TTIP, which would give international corporations rights to sue national governments in non-appealable global private arbitration panels, the dictates from which will stand above any member-nation’s laws. Elected government officials will have no control over them. This supra-national mega-corporate effort by Obama is also part of his similar effort in his proposed TPP treaty with Asian nations, both of which are additionally aimed to isolate from international trade not just Russia, but China, so as to leave America’s large international corporations controlling virtually the entire world. As things now stand regarding these ‘trade’ deals, Obama will either need to eliminate some of his demands, or else the European Commission won’t be able to muster enough of its members to support Obama’s proposed treaty with the EU, the TTIP (Transatlantic Trade and Investment Partnership). Also, some key European nations might reject Obama’s proposed treaty on regulations regarding financial and other services: TISA (Trade In Services Agreement). All three of Obama’s proposed ‘trade’ deals, including the TPP (Trans-Pacific Partnership) between the U.S. and Asian countries, are the actual culmination of Obama’s Presidency, and they’re all about far more than just trade and economics. The main proposed deal with Europe might now be dead.
  • ...4 more annotations...
  • On September 27th, France’s newspaper SouthWest featured an exclusive interview with Matthias Fekl, France’s Secretary of State for Foreign Trade, in which he said that “France is considering all options, including outright termination of negotiations” on the TTIP. He explained that, ever since the negotiations began in 2013, “These negotiations have been and are being conducted in a total lack of transparency,” and that France has, as of yet, received “no serious offer from the Americans.” The reasons for this stunning public rejection had probably already been accurately listed more than a year ago. After all, France has, throughout all of the negotiations, received “no serious offer from the Americans”; not now, and not back at the start of the negotiations in 2013. The U.S. has been steadfast. Jean Arthuis, a member of the European Parliament, and formerly France’s Minister of Economy and Finance, headlined in Le Figaro, on 10 April 2014, “7 good reasons to oppose the transatlantic treaty”. There is no indication that the situation has changed since then, as regards the basic demands that President Obama is making. Arthuis said at that time: First, I am opposed to private arbitration of disputes between States and businesses. [It would place corporate arbitrators above any nation’s laws and enable them to make unappealable decisions whenever a corporation sues a nation for alleged damages for alleged violations of its rights by that nation of the trade-treaty.] Such a procedure is strictly contrary to the idea that I have of the sovereignty of States. … Secondly, I am opposed to any questioning of the European system of appellations of origin. Tomorrow, according to the US proposal, there would be a non-binding register, and only for wines and spirits. Such a reform would kill many European local products, whose value is based on their certified origin.
  • Thirdly, I am opposed to the signing of an agreement with a power that legalizes widespread and systematic spying on my fellow European citizens and European businesses. Edward Snowden’s revelations are instructive in this regard. As long as the agreement does not protect the personal data of European and US citizens, it cannot be signed. Fourth, the United States proposes a transatlantic common financial space, but they adamantly refuse a common regulation of finance, and they refuse to abolish systematic discrimination by the US financial markets against European financial services. They want to have their cake and eat it too: I object to the idea of a common area without common rules, and I reject commercial discrimination. Fifth, I object to the questioning of European health protections. Washington must understand once and for all that notwithstanding its insistence, we do not want our plates or animals treated with growth hormones nor products derived from GMOs, or chemical decontamination of meat, or of genetically modified seeds or non-therapeutic antibiotics in animal feed. Sixth, I object to the signing of an agreement if it does not include the end of the US monetary dumping. Since the abolition of the gold convertibility of the dollar and the transition to the system of floating exchange rates, the dollar is both American national currency and the main unit for exchange reserves in the world. The Federal Reserve then continually practices monetary dumping, by influencing the amount of dollars available to facilitate exports from the United States. China proposes to eliminate this unfair advantage by making “special drawing rights” of the IMF the new global reference currency. But as things now stand, America’s monetary weapon has the same effect as customs duties against every other nation. [And he will not sign unless it’s removed.]
  • Seventh, beyond the audiovisual sector alone, which is the current standard of government that serves as a loincloth to its cowardice on all other European interests in these negotiations, I want all the cultural exceptions prohibited. In particular, it is unacceptable to allow the emerging digital services in Europe to be swept up by US giants such as Google, Amazon or Netflix. They’re giant absolute masters in tax optimization, which make Europe a “digital colony.” President Obama’s negotiator is his close personal friend, Michael Froman, a man who is even trying to force Europe to reduce its fuel standards against global warming and whose back-room actions run exactly contrary to Obama’s public rhetoric. Froman and Obama have been buddies since they worked together as editors on Harvard Law Review. He knows what Obama’s real goals are. Also: “Froman introduced Mr. Obama to Robert E. Rubin, the former Treasury secretary,” who had brought into the Clinton Administration Timothy Geithner and Larry Summers, and had championed (along with them) the ending of the regulations on banks that the previous Democratic President, Franklin Delano Roosevelt, had put into place. (President Bill Clinton signed that legislation just as he left office, and this enabled the long process to occur with MBS securities and with financial derivatives, which culminated with the 2008 crash, and this same legislation also enabled the mega-banks to get bailed out by U.S. taxpayers for their crash — on exactly the basis that FDR had outlawed.)
  • Froman has always been a pro-mega-corporate, pro-mega-bank champion, who favors only regulations which benefit America’s super-rich, no regulations which benefit the public. Froman’s introducing the Wall Street king Robert Rubin to the then-Senator Obama was crucial to Obama’s becoming enabled to win the U.S. Presidency; Robert Rubin’s contacts among the super-rich were essential in order for that — Obama’s getting a real chance to win the Presidency — to happen. It enabled Obama to compete effectively against Hillary Clinton. Otherwise, he wouldn’t have been able to do that. His winning Robert Rubin’s support was crucial to his becoming President. The chances, that President Obama will now be able to get the support from any entity but the U.S. Congress for his proposed TTIP treaty with Europe, are reducing by the day. Europe seems to be less corrupt than is the United States, after all. The only independent economic analysis that has been done of the proposed TTIP finds that the only beneficiaries from it will be large international corporations, especially ones that are based in the United States. Workers, consumers, and everybody else, will lose from it, if it passes into law. Apparently, enough European officials care about that, so as to be able to block the deal. Or else: Obama will cede on all seven of the grounds for Europe’s saying no. At this late date, that seems extremely unlikely.
Paul Merrell

Obama to Call for End to N.S.A.'s Bulk Data Collection - NYTimes.com - 0 views

  • The Obama administration is preparing to unveil a legislative proposal for a far-reaching overhaul of the National Security Agency’s once-secret bulk phone records program in a way that — if approved by Congress — would end the aspect that has most alarmed privacy advocates since its existence was leaked last year, according to senior administration officials.Under the proposal, they said, the N.S.A. would end its systematic collection of data about Americans’ calling habits. The bulk records would stay in the hands of phone companies, which would not be required to retain the data for any longer than they normally would. And the N.S.A. could obtain specific records only with permission from a judge, using a new kind of court order. In a speech in January, President Obama said he wanted to get the N.S.A. out of the business of collecting call records in bulk while preserving the program’s abilities. He acknowledged, however, that there was no easy way to do so, and had instructed Justice Department and intelligence officials to come up with a plan by March 28 — Friday — when the current court order authorizing the program expires.
  • As part of the proposal, the administration has decided to ask the Foreign Intelligence Surveillance Court to renew the program as it exists for at least one more 90-day cycle, senior administration officials said. But under the plan the administration has developed and now advocates, the officials said, it would later undergo major changes. The new type of surveillance court orders envisioned by the administration would require phone companies to swiftly provide records in a technologically compatible data format, including making available, on a continuing basis, data about any new calls placed or received after the order is received, the officials said. They would also allow the government to swiftly seek related records for callers up to two phone calls, or “hops,” removed from the number that has come under suspicion, even if those callers are customers of other companies.
  • The N.S.A. now retains the phone data for five years. But the administration considered and rejected imposing a mandate on phone companies that they hold on to their customers’ calling records for a period longer than the 18 months that federal regulations already generally require — a burden that the companies had resisted shouldering and that was seen as a major obstacle to keeping the data in their hands. A senior administration official said that intelligence agencies had concluded that the operational impact of that change would be small because older data is less important.The N.S.A. uses the once-secret call records program — sometimes known as the 215 program, after Section 215 of the Patriot Act — to analyze links between callers in an effort to identify hidden terrorist associates, if they exist. It was part of the secret surveillance program that President George W. Bush unilaterally put in place after the terrorist attacks of Sept. 11, 2001, outside of any legal framework or court oversight.
  • ...4 more annotations...
  • Marc Rotenberg, the executive director of the Electronic Privacy Information Center, called the administration’s proposal a “sensible outcome, given that the 215 program likely exceeded current legal authority and has not proved to be effective.” While he said that he would like to see more overhauls to other surveillance authorities, he said the proposal was “significant” and addressed the major concerns with the N.S.A.’s bulk records program. Jameel Jaffer of the American Civil Liberties Union said, “We have many questions about the details, but we agree with the administration that the N.S.A.’s bulk collection of call records should end.” He added, “As we’ve argued since the program was disclosed, the government can track suspected terrorists without placing millions of people under permanent surveillance.”
  • In recent days, attention in Congress has shifted to legislation developed by leaders of the House Intelligence Committee. That bill, according to people familiar with a draft proposal, would have the court issue an overarching order authorizing the program, but allow the N.S.A. to issue subpoenas for specific phone records without prior judicial approval.
  • The Obama administration proposal, by contrast, would retain a judicial role in determining whether the standard of suspicion was met for a particular phone number before the N.S.A. could obtain associated records.The administration’s proposal would also include a provision clarifying whether Section 215 of the Patriot Act, due to expire next year unless Congress reauthorizes it, may in the future be legitimately interpreted as allowing bulk data collection of telephone data.The proposal would not, however, affect other forms of bulk collection under the same provision. The C.I.A., for example, has obtained orders for bulk collection of records about international money transfers handled by companies like Western Union.
  • The government has been unable to point to any thwarted terrorist attacks that would have been carried out if the program had not existed, but has argued that it is a useful tool.
  •  
    "The N.S.A. uses the once-secret call records program ... to analyze links between callers in an effort to identify hidden terrorist associates, if they exist." Correction: "The N.S.A. *claims* to use the ..." 
Gary Edwards

Regulations.gov - 0 views

  •  
    excerpt from the Tea Party Command Center: Whenever a new regulation, or change to a current regulation, is proposed there is an announcement on a website called the Federal Register (Link to this page).   Here we can view everything from proposed regulations to presidential documents (executive orders). There is usually a public comment period during which time the public can comment in support or opposition to these proposed regulations. There is a separate website set up for this, it is called Regulations.gov Regulations With Comments Due Soon: Next 3 Days(91) Next 7 Days(171) Next 15 Days(394) Next 30 Days(693) Next 90 Days(1,017) The Patriot-Tea Party groups across the Nation need to take action on some of these items.  Obviously almost 200 proposed regulations with comments due within the next week is way too much for the Tea Party Command Center to cover alone.  Obviously we need help.  Every Patriot has that special area in which you have a keen interest.  Be it the healthcare, immigration, FDA, Social Security, Medicare, Medicaid...  The list goes on. However, the responses must be well written and productive.  Spelling, grammar and counterpoints must be given to effectively argue the points. Who can we count on?  Who is willing to step up and help us out.  Editors?  Fact finders?  Do we need to set up a group?  What can we do to help you help us all?
Gary Edwards

Three Schools of Economic Wizardry | The Rugged Individualist - 0 views

  •  
    Exceellent repub of Mike Shedlock's wonderful article describing the 3 Schools of Economic Wizardry.  Includes a simplified but exacting view of the "why and how"  the Keynesian and Monetarist Wizardry Schools wreck havoc on the world.   ... Keynesian Voodoo Wizards ... Monetarist Voodoo Wizards ... Austrian Realists Remember the voodoo motto: "If it doesn't work, keep doing more of it, even if that is what got you in trouble in the first place!" ..... Excerpt: Once upon a time (today), in a land not so far away (USA), there lived a trio of economic wizards (economists), whose names shall remain anonymous (Paul Krugman, Greg Mankiw, Ben Bernanke). A fourth wizard, Murry Rothbard, is no longer among the living but resides in the netherworld. The above wizards seldom agree with each other because they come from competing schools of wizardry. Three Schools of Economic Wizardry 1. Keynesian School of Fiscal Voodoo and Witchcraft 2. Monetarist School of Monetary Voodoo and Witchcraft 3. Austrian School of Sound Money, Sound Economic Principles and Common Sense. "Dark Arts" Wizardry The first two wizardry schools belong to a class of wizardry promoted to aspiring wizards as the "Dark Arts." Philosophical Beliefs Keynesian wizards believe governments can spend their way to economic health and although fiscal deficits may matter at some point in time, they never matter now, in practice. Monetarist wizards believe money will cure any and every problem if enough is dropped from helicopters and interest rates held low. Austrian wizards believe that economic problems are created by unsound money, haphazard loans, excessive debts, and government manipulations. Keynesian and Monetarist wizards believe in the voodoo principle "the problem is the solution if only you do more of it." The former relies primarily on fiscal voodoo; the latter relies primarily on monetary voodoo. Austrian wizards do not believe "the problem is the solution," no matter ho
Paul Merrell

Obama to Place Some Restraints on Surveillance - NYTimes.com - 0 views

  • President Obama will issue new guidelines on Friday to curtail government surveillance, but will not embrace the most far-reaching proposals of his own advisers and will ask Congress to help decide some of the toughest issues, according to people briefed on his thinking.Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.
  • President Obama will issue new guidelines on Friday to curtail government surveillance, but will not embrace the most far-reaching proposals of his own advisers and will ask Congress to help decide some of the toughest issues, according to people briefed on his thinking.Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.
  • The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later. The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in.The blend of decisions, to be outlined in a speech at the Justice Department and in a presidential guidelines memorandum, will be Mr. Obama’s highest-profile response to the disclosures about the National Security Agency made in recent months by Edward J. Snowden, a former N.S.A. contractor who has fled to Russia.
  • ...5 more annotations...
  • The developments came as the nation’s judiciary waded into the highly charged debate. In a letter made public on Tuesday, a judge designated by Chief Justice John G. Roberts Jr. to express the views of the judicial branch warned that some changes under consideration would have a negative “operational impact” on a secret foreign intelligence court.Judge John D. Bates, a former chief judge of the Foreign Intelligence Surveillance Court, urged Mr. Obama and Congress not to alter the way the court is appointed or to create an independent public advocate to argue against the Justice Department in secret proceedings. Any such advocate, he wrote, should instead be appointed only when the court decided one was needed.Judge Bates objected to the workload of requiring that courts approve all national security letters, which are administrative subpoenas allowing the F.B.I. to obtain records about communications and financial transactions without court approval. And he raised concerns about greater public disclosure of court rulings, arguing that unclassified summaries would be “likely to promote confusion and misunderstanding.”
  • The judge’s letter, versions of which he sent to the leaders of several congressional committees, was released as all five members of Mr. Obama’s surveillance review group testified Tuesday before the Senate Judiciary Committee, seeking support for their recommendations.Illustrating the cross-pressures on the president, the advisers argued for the appointment of the independent version of a public advocate, a recommendation the president is expected to follow, though it is not clear how he will structure the position.
  • The judge’s objection to the proposal on national security letters dovetailed with that of the F.B.I. director, James B. Comey, who argued it would be inefficient to have to go to a judge each time records were sought. Mr. Obama has decided not to require court approval in every case, but might still require it in some circumstances, according to one administration official.Mr. Obama will cut back on the number of people whose phone records can be examined by the N.S.A. through its bulk data program. Currently the agency can scrutinize call records of people as far as three steps, or “hops,” removed from a suspect. Mr. Obama’s review panel proposed limiting searches to people just two steps removed. He is also likely to cut down the number of years such data can be retained; currently it is deleted after five years.
  • But the president will not, at least for now, back the panel’s suggestion that telecommunications firms keep such data and that the government be allowed to tap into those databases only when necessary. Intelligence officials complained it would be inefficient to have to go to multiple companies, so some officials proposed creating an independent consortium to store the data instead.Mr. Obama has decided against keeping the data at the private providers because they do not want that responsibility, officials said, and no independent consortium currently exists. As a result, he will ask Congress to work with him to determine the best way to store the data.
  • The letter by Judge Bates was accompanied by 15 pages of often specific comments about possible surveillance reforms.It is highly unusual for judges to weigh in on public policy debates involving the other two branches of government, but Judge Bates, the director of the Administrative Office of the United States Court, said that Chief Justice Roberts had designated him to “act as a liaison” and that he had consulted other judges.
  •  
    I keep wondering if Barack Obama just might be the most timid President the U.S. has ever had. Certainly, he lacks the courage to lead the nation. 
Gary Edwards

A First Look at the Book "The Liberty Amendments", by Mark Levin - Tea Party Command Ce... - 0 views

  •  
    Excellent youtube interview! "Mark Levin has just published his much-anticipated book The Liberty Amendments: Restoring the American Republic. Three of his eleven proposed Constitutional amendments appear below, and a Sean Hannity interview of Levin appears at the bottom of this post. Levin's book is centered around the Constitution's Article V (aka "Article 5″). That article specifies two methods for amending the Constitution. Just briefly - In the first method of creating amendments, Congress proposes and the States dispose. In the second method of creating amendments, the States propose and the States dispose. The second method has never been used successfully, although there have been many attempts.  It is that second method that the Founders provided as a remedy for an overreaching federal government. In the second method, neither Congress, nor the President, nor the Supreme Court have any voting or veto authority whatsoever.  The states are in full control. Period. It is, by design, the ultimate override for an over-spending, over-taxing, over-regulating, and increasingly dictatorial and lawless federal government. Clearly, its time has come. In that second method, Congress has at most a mere ministerial role.  Of course Congress is very protective of its power, and could, through delay and inaction, attempt to convert their mere ministerial role into a de facto veto power, halting any attempt for a state-driven amendment action. Apparently Congress has done exactly that many times, acting in bad faith and contrary to the Framers' spirit and intent for Article V which is clearly expressed in the Federalist Papers. Legal scholars have been trying to find a way around the federal government's intransigence, so far with little success. Now more than ever, it is time for We the People to bring the power of Article V to the center ring of American politics. That starts with awareness, and Levin's book will br
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Google warns of US government 'hacking any facility' in the world | Technology | The Gu... - 0 views

  • Google is boldly opposing an attempt by the US Justice Department to expand federal powers to search and seize digital data, warning that the changes would open the door to US “government hacking of any facility” in the world. In a strongly worded submission to the Washington committee that is considering the proposed changes, Google says that increasing the FBI’s powers set out in search warrants would raise “monumental and highly complex constitutional, legal and geopolitical concerns that should be left to Congress to decide”. The search giant warns that under updated proposals, FBI agents would be able to carry out covert raids on servers no matter where they were situated, giving the US government unfettered global access to vast amounts of private information.
  • In particular, Google sounds the alarm over the FBI’s desire to “remotely” search computers that have concealed their location – either through encryption or by obscuring their IP addresses using anonymity services such as Tor. Those government searches, Google says, “may take place anywhere in the world. This concern is not theoretical. ... [T]he nature of today’s technology is such that warrants issued under the proposed amendment will in many cases end up authorizing the government to conduct searches outside the United States.”
  • The Justice Department itself has tried to assuage anxieties about its proposed amendment. In its comment to the committee, DoJ officials say that federal agents would only request the new type of warrants where there was “probable cause to search for or seize evidence, fruits, or instrumentalities of crime”. But civil liberties and legal groups remain unconvvinced, insisting that the language is so vaguely worded that it would have draconian and global implications. In its submission, the American Civil Liberties Union said that the proposed changes could violate the fourth amendment of the US constitution, which bans unreasonable searches and seizures. The ACLU’s principal technologist, Christopher Soghoian, said: “The government is seeking a troubling expansion of its power to surreptitiously hack into computers, including using malware. Although this proposal is cloaked in the garb of a minor procedural update, in reality it would be a major and substantive change that would be better addressed by Congress.”
  •  
    Fourth Amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and *particularly* describing *the place to be searched,* and the persons or things to be seized." The Justice Department proposed amendment to the rules would abolish the emphasized portion of the Amendment, substituting in its place the "general warrant" that the Amendment was intended to forbid. I'm coming to realize more and more that it's my own government, not terrorists™, that needs more surveillance.  
Joseph Skues

Brown proposes big cuts to higher education - San Jose Mercury News - 0 views

  • As many as 350,000 students could be turned away in 2011-12 if Brown's proposal passes, he said.
  • 011 could be the first year tuition comprises a larger portion of the university's budget than state funds."This is a sad day for California," Yudof said in a written statement. "The crossing of this threshold transcends mere symbolism and should be profoundly disturbing to all Californians."
  • The average student would pay about $1,080 per year, still the nation's lowest fees by far.
  • ...7 more annotations...
  • Brown also proposed a 38-percent fee hike -- from $26 per unit to $36 -- at the community colleges, although he acknowledged that financial aid would cover the added cost for nearly half the 2.8 million or so students. The average student would pay about $1,080 per year, still the nation's lowest fees by far
  • cut costs by counting students later than the third week of class,
  • Close to one-fifth of community-college students drop out after the third week
  • As many as 350,000 students could be turned away in 2011-12 if Brown's proposal passes, he said.
  • he proposed cutbacks most likely will look much like those of two years ago, when UC imposed unpaid furloughs and shortened library hours, said Steve Boilard, higher-education chief for the state's nonpartisan Legislative Analyst's Office.
  • The proposed cutbacks most likely will look much like those of two years ago, when UC imposed unpaid furloughs and shortened library hours,
  • having more professors teach rather than conduct research.
Paul Merrell

War authorization in trouble on Hill - Manu Raju and Burgess Everett - POLITICO - 0 views

  • Key Democrats are hardening their opposition to President Barack Obama’s proposal for attacking Islamic militants in Iraq and Syria, raising fresh doubts the White House can win congressional approval of the plan as concerns grow over its handling of crises around the globe. In interviews this week, not a single Democrat on the Senate Foreign Relations Committee expressed support for the president’s war plan as written; most demanded changes to limit the commander in chief’s authority and more explicitly prohibit sending troops into the conflict.
  • That opposition puts the White House and Sen. Bob Corker (R-Tenn.), the Foreign Relations Committee chairman, in a quandary — stuck between Republican defense hawks who are pushing for a more robust U.S. role against the terrorist group known as Islamic State of Iraq and the Levant, and liberals who fear a repeat of the Iraq war. In an interview, Corker issued a stark warning: If Democrats refuse to lend any support to Obama’s request for the Authorization for Use of Military Force against ISIL, he may scrap a committee vote, making it less likely the full Senate or House would even put it on the floor, much less pass it. The comments put pressure on the White House to deliver Democratic votes or witness the collapse of a second war authorization plan in Congress in as many years.
  • “He is asking us to do something that takes us nowhere,” Corker said of Obama. “Because from what I can tell, he cannot get one single Democratic vote from what he’s sent over. And he certainly wouldn’t get Democratic votes for something Republicans might be slightly more comfortable with. … It’s quite a dilemma.” Corker added: “Before we begin the process of considering marking up a bill, I want to know that there’s a route forward that can lead to success.” Last month, the president proposed a draft AUMF aimed at giving him the flexibility to wage war with ISIL, but also restricting his own authority. The plan would set a three-year time limit and ban “enduring offensive ground combat operations.” While ISIL, also known as ISIS, is the main enemy targeted by the plan, the U.S. would have the flexibility to attack forces “associated” with the terrorist group. And while Obama sought to rescind the 2002 Iraq War authorization, his plan would leave in place the post-9/11 war powers resolution that the U.S. is currently using to justify its ongoing military campaign against ISIL and terrorist organizations worldwide. The effort, to carve a middle ground between hawks and doves, appears to have pleased nobody on Capitol Hill. Republicans want to give this and the next president wide latitude to “degrade and destroy” ISIL, while Democrats want to impose a round of new restrictions further prohibiting ground troops while rescinding the 2001 war authorization.
  • ...5 more annotations...
  • The new challenges facing the White House plan come as a growing number of Democrats are breaking with the administration over its handling of a range of international crises. Several Iran hawks in the Senate Democratic Caucus signed onto a bill calling on the White House to send any nuclear deal with Iran for immediate congressional approval. They were working to gather enough Democratic support to override a threatened presidential veto, but the plan has stalled temporarily over a partisan procedural squabble. Influential Democrats like Dick Durbin of Illinois have joined a push calling on the White House to toughen sanctions against Russia while arming Ukraine in the fight against Russian-backed rebels.
  • And on ISIL, Democrats say the president needs to swallow changes to his proposed draft to win backing from his own party, even if doing so could turn off even more Republicans. “No,” said New Jersey Sen. Bob Menendez, the top Democrat on the Foreign Relations Committee, when asked whether he would support the president’s proposal. “I think we have to do a better job of defining what is ‘no enduring offensive combat troops.’ That is a critical element. I think if we can get past that element of it, other elements could fall into place. But we need to do a better job of that — otherwise, many members feel that is the equivalent of a blank check.”
  • It’s unclear how aggressive the president will be, but senior administration officials have indicated they would not play a heavy hand in the negotiations on Capitol Hill, at least at the onset of the debate. A White House spokesperson said, “We remain open to reasonable adjustments that are consistent with the president’s policy and that can garner bipartisan support. However, it is ultimately up to Congress to pass a new authorization.”
  • There is little margin for error on the committee, given that it is split between 10 Republicans and nine Democrats. On the Republican side, two senators who are likely running for president and have opposite foreign policy views — Rand Paul of Kentucky and Marco Rubio of Florida — will be difficult to court no matter how the proposal is structured. And the nine Democrats on the committee each have strong reservations about the president’s proposal, arguing it’s too broad in scope.
  • “If the Vietnam War taught us anything, and if the president’s interpretation of the 2001 authorization has taught us anything, it’s that Congress better be pretty specific on our authorization,” Cardin said. “The hearings and meetings we’ve had raised as many questions as they have answered,” said Sen. Chris Murphy (D-Conn.). “I appreciate the president has done something unprecedented — he’s proposed restrictions on his authority — but it’s likely got to change for me to support it.”
Paul Merrell

NARA Backs Away from CIA Email Destruction Proposal - 0 views

  • The National Archives and Records Administration told the Central Intelligence Agency last week that it was withholding approval of a CIA proposal to allow the destruction of the email records of all but 22 senior Agency officials. “NARA intends to reassess the Central Intelligence Agency (CIA) proposal for the disposition of non-senior email accounts,” wrote Paul M. Wester, Jr., Chief Records Officer at NARA in a November 20 letter to Joseph Lambert, Director of Information Management Services at CIA. “Based on comments from Members of the U.S. Senate Select Committee on Intelligence and a number of public interest groups, we are concerned about the scope of the proposed schedule and the proposed retention periods,” Mr. Wester wrote. Based on a preliminary review of the CIA proposal, NARA had initially recommended approval of the plan, Secrecy News reported last month. (“CIA Asks to Destroy Email of Non-Senior Officials,” October 1.)
  • But critical comments that were submitted to NARA — from the Federation of American Scientists, Openthegovernment.org and other public interest groups and individuals, the Department of Defense Chief Defense Counsel, and especially from Senators Feinstein and Chambliss, the leaders of the Senate Intelligence Committee, and Senators Wyden, Udall and Heinrich, Members of the Committee — turned the tide and blocked the proposal in its current form. “We will hold a public meeting on this schedule in the coming months to address the comments raise by you and others and to share how NARA is moving forward,” wrote Margaret Hawkins of NARA Records Management Services in an email message today. “This meeting will be announced in the Federal Register and will be open to all commenters and the public.” For related coverage, see: “The CIA Wants To Delete Old Email; Critics Say ‘Not So Fast'” by David Welna, NPR All Things Considered, November 20; “Top Senators Oppose CIA Move to Destroy Email” by Siobhan Gorman, Wall Street Journal, November 19; “National Archives: Ok, So Maybe Letting The CIA Destroy Emails Wasn’t A Great Idea” by Ali Watkins, Huffington Post, November 21; and “Furor Over CIA Shake-Up of Email System” by Adam Klasfeld, Courthouse News Service, November 7.
  •  
    The CIA's request for permission to destroy the emails was based on the bald assertion that all information contained in the emails of historical significance had already been incorporated in more formal reports, without any actual study of the email contents. The very notion is preposterous.
Paul Merrell

New Authorization for Use of Military Force?, and More from CRS - 0 views

  • New publications from the Congressional Research Service that Congress has withheld from online public disclosure include the following. A New Authorization for Use of Military Force Against the Islamic State: Comparison of Current Proposals in Brief, October 21, 2014
  •  
    Overview of pending legislation (multiple bills) to authorize use of U.S. military force against ISIL. Table of contents: The IS Crisis and the U.S. Response ............................................................................................... 1 Presidential Authority to Use Military Force Against the Islamic State .......................................... 1 2001 Post-9/11 Authorization for Use of Military Force ........................................................... 1 2002 Authorization for Use of Military Force Against Iraq ...................................................... 2 Presidential Authority Under Article II of the Constitution ....................................................... 2 Calls for a New AUMF Targeting the Islamic State ........................................................................ 3 Current IS AUMF Proposals ............................................................................................................ 3 Scope of Force and Military Activities Authorized ................................................................... 4 Targeted Entities .................................................................................................................. 5 Purpose of Authorization ..................................................................................................... 5 Conditions on Use of Military Force ................................................................................... 6 Limitations on Use of Military Force .................................................................................. 6 Repeal of Previous AUMFs ................................................................................................. 7 Reporting and Certification Requirements .......................................................................... 8 War Powers Resolution and Expedited Consideration Provisions ...................................... 8 Tables  Table 1. Proposed Authorizations
Paul Merrell

Iran's Foreign Minister Proposes a Path to Peace in the Middle East - 0 views

  • In an article published by the Financial Times on Monday, Iran’s Foreign Minister Mohammad Javad Zarif laid out the country’s proposed framework for bringing stability to the Middle East region. “ISIS displayed the darkest depths of human evil,” Zarif wrote. Yet it also provided an opportunity to come together to battle an existential threat. The cooperative relationships forged in this fight can usher in a new era. We need new approaches and new terminology to make sense of a world which is transitioning to a post-western global order. Here are two concepts to shape the emerging paradigm in west Asia: the idea of a strong region, and security networking, whereby small and large countries — even those with historical rivalries — contribute to stability.” It appears that Iran’s significant contribution to ISIS’ defeat and demise — coupled with its new injection as a major player to be reckoned with in the Middle East — has given the country newfound confidence. Iran is using its battlefield success to propose a new vision for the Middle East — one that would allegedly include open dialogue and cooperation. Zarif continues: The objective of a strong region — as opposed to a quest for hegemony and the exclusion of other actors — is rooted in recognizing the need to respect the interest of all stakeholders. Any domineering effort by one country is not only inappropriate but essentially impossible: those who insist on following that path create instability. The arms race in our region is an instance of this kind of destructive rivalry: siphoning vital resources into the coffers of arms manufacturers has contributed nothing to achieving peace and security. Militarism has only served to fuel disastrous adventurism.” [emphasis added]
  • Most of the usual modes of forming alliances have also become obsolete. Given our interconnected world, the idea of collective security is now defunct, especially in the Persian Gulf, for one basic reason: it assumes commonality of interests. Security networking is Iran’s innovation to address issues that range from divergence of interests to power and size disparities. Its parameters are simple but effective: rather than trying to ignore conflicts of interests, it accepts differences. Equally, being premised on inclusivity, it acts as a firewall against the emergence of an oligarchy among big states and allows smaller states to participate. The rules of this new order are straightforward: common standards, most significantly the purposes and principles of the UN Charter, such as sovereign equality of states; refraining from the threat or use of force; peaceful resolution of conflicts; respect for the territorial integrity of states; non-intervention in the domestic affairs of states; and respect for self-determination within states.” [emphasis added]
  • Zarif suggests that the reason for this instability is rooted in a “dialogue deficit.” Opening up such a dialogue could help countries understand that all nations have “similar concerns, fears, aspirations, and hopes” and that this dialogue should replace the rampant propaganda that has plagued the region. This proposed dialogue would be accompanied by “confidence-building measures: promoting tourism; joint task forces on issues ranging from nuclear safety to pollution to disaster management; joint military visits; pre-notification of military exercises; transparency measures in armament; reducing military expenditures; and all leading eventually to a non-aggression pact,” according to Zarif. In proposing this newfound vision for the Middle East, Zarif is extending an olive branch to the rest of the region, stating that as a first step, “the Islamic Republic proposes establishing a Regional Dialogue Forum in the Persian Gulf. Our longstanding invitation to dialogue remains open, and we look forward to the day our neighbors will accept it, and their allies — in Europe and elsewhere in the west — will encourage it.”
Paul Merrell

The public favors cutting defense spending, not adding billions more, new survey finds ... - 0 views

  • The survey, by the University of Maryland’s Program for Public Consultation (PPC), found that while Trump has proposed a $54 billion boost to federal spending for the military, a majority of Americans prefer a cut of $41 billion. While Trump has proposed a $2.8 billion increase for homeland security, a majority of Americans favor a $2 billion cut. Altogether, the survey looked at the 10 top areas of spending in Trump’s “Budget Blueprint” and found a gap of $139.6 billion between what the majority of the public would spend and what Trump has proposed. Steven Kull, PPC’s director, said he was surprised both by the extent of the gap and the fact that Trump’s proposals were at odds with the preferences of both Republicans and Democrats. In general, those who identified themselves as Republicans were more likely to favor cutting some of the spending that Trump has proposed to cut, but on a raft of areas where Trump proposed large reductions, members of his party preferred to cut less. On military spending, for example, where Trump’s proposal is $94.4 billion away from the majority’s position, a majority of GOP respondents said they wished to keep the so-called “base” or main defense budget at the current level, although they favored cutting $5 billion in spending from a budget for “overseas contingency operations,” specifically in Afghanistan and Iraq.
  •  
    From March 2017.
Gary Edwards

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
1 - 20 of 520 Next › Last »
Showing 20 items per page