Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged public

Rss Feed Group items tagged

Paul Merrell

Obama's NSA 'reforms' are little more than a PR attempt to mollify the public | Glenn G... - 0 views

  • In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the National Security Agency in the wake of seven months of intense worldwide controversy.The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge.
  • In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the National Security Agency in the wake of seven months of intense worldwide controversy.The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge.This scam has been so frequently used that it is now easily recognizable.
  •  
    Glenn Greenwald offers his take on Obama's NSA "reform" speech.
Paul Merrell

BDS SOUTH AFRICA: ISRAEL INCHES CLOSER TO 'TIPPING POINT' OF SOUTH AFRICA-STYLE BOYCOTT... - 0 views

  • Analogies with apartheid regime in the wake of Mandela’s death could accelerate efforts to ostracize Israel. This has happened in recent days: The Dutch water company Vitens severed its ties with Israeli counterpart Mekorot; Canada’s largest Protestant church decided to boycott three Israeli companies; the Romanian government refused to send any more construction workers; and American Studies Association academics are voting on a measure to sever links with Israeli universities. Coming so shortly after the Israeli government effectively succumbed to a boycott of settlements in order to be eligible for the EU’s Horizon 2020 scientific cooperation agreement, it is hard to avoid the conclusion that the BDS (Boycott, Divestment and Sanctions) movement is picking up speed. And the writing on the wall, if anyone missed it, only got clearer and sharper in the wake of the death of Nelson Mandela.
  • When the United Nations passed its first non-binding resolution calling for a boycott of South Africa in 1962, it was staunchly opposed by a bloc of Western countries, led by Britain and the United States. But the grassroots campaign that had started with academic boycotts in the late 1950s gradually moved on to sports and entertainment and went on from there to institutional boycotts and divestment. Along the way, the anti-apartheid movement swept up larger and larger swaths of Western public opinion, eventually forcing even the most reluctant of governments, including Israel and the U.S., to join the international sanctions regime. 
  • We’re really great at knowing where thresholds are after we fall off the cliff, but that’s not very helpful,” as lake ecologist and “tipping point” researcher Stephen Carpenter told USA today in 2009.  Israel could very well be approaching such a threshold. Among the many developments that could be creating the required critical mass one can cite the passage of time since the Twin Towers attacks in September 2001, which placed Israel in the same camp as the U.S. and the West in the War on Terror; Israel’s isolation in the campaign against Iran’s nuclear programs; the disappearance of repelling archenemies such as Osama bin Laden, Muammar Gadhafi, Mahmoud Ahmadinejad and, to a lesser degree, Yasser Arafat; the relative security and lack of terror inside Israel coupled with its own persistent settlement drive; and the negative publicity generated by revelations of racism in Israeli society, the image of its rulers as increasingly rigid and right wing and the government’s own confrontations with illegal African immigrants and Israeli Bedouin, widely perceived as being tinged with bias and prejudice.  In recent days, American statesmen seem to be more alarmed about the looming danger of delegitimization than Israelis are. In remarks to both the Saban Forum and the American Joint Distribution Committee this week, Secretary of State John Kerry described delegitimization as “an existential danger." Vice President Joe Biden, speaking to the same JDC forum, went one step further: “The wholesale effort to delegitimize Israel is the most concentrated that I have seen in the 40 years I have served. It is the most serious threat in my view to Israel’s long-term security and viability.” 
  • ...1 more annotation...
  • One must always take into account the possibility of unforeseen developments that will turn things completely around. Barring that, the only thing that may be keeping Israel from crossing the threshold and “going over the cliff” in the international arena is Kerry’s much-maligned peace process, which is holding public opinion and foreign governments at bay and preventing a “tipping point” that would dramatically escalate the anti-Israeli boycott campaign.  Which only strengthens Jeffrey Goldberg’s argument in a Bloomberg article on Wednesday that Kerry is “Israel’s best friend." It also highlights, once again, how narrow-minded, shortsighted and dangerously delusional Kerry’s critics, peace process opponents and settlement champions really are (though you can rest assured that if and when the peace process collapses and Israel is plunged into South African isolation, they will be pointing their fingers in every direction but themselves.
  •  
    Note that this article's original is behind a paywall in Haaretz, one of Israel's market-leading newspapers.  There can be no questioning of the facts that: [i] the Palestinian Boycott, Divesment, and Sanctions ("BDS") movement is rapidly gaining strength globally; and [ii] that factor weighs heavily in the negotiations between Israel and Palestine for a two-state solution. Although not bluntly stated, the BSD movement's path runs directly to a single-state solution that would sweep Israel's present right-wing government from power and result in a secular state rather than a "Jewish state." And the E.U., Israel's largest export market, has promised to go even farther in sanctioning Israel than the considerable distance it has already gone if the negotiations do not result in a two state solution. Labeling all products produced wholly or in part in Israel-occupied Palestine territory is among the mildest of sanctions under discussion, a measure already adopted in two E.U. nations. The BSD Movement's success has also been marked by Israel attaining the pariah state status previously experienced by South Africa. Only the U.S., Canada, and a half-dozen or so tiny island nations closely aligned with the U.S. still vote in favor of Israel at the U.N. For example, the vote on granting Palestine U.N. observer state status was 138-9, with 41 abstentions.  The prospect of an end to the non-secular Jewish state has enormous ramifications for U.S. foreign policy, not the least of which is the influence of the Israel lobby in the U.S. that has thus far led the U.S. to three Treasury-draining wars in Southwest Asia and Northern Africa and host of minor military actions in other area nations, as well as a near-war in Syria, averted mainly via Russian diplomacy that outfoxed Secretary of State John Kerry. Time will tell whether the diplomatic outreach by Iran will succeed in averting war with the greatest military power remaining in the Mideast after Israel itself. "Protectin
Paul Merrell

Looting the Pension Funds: How Wall Street Robs Public Workers | Politics News | Rollin... - 0 views

  •  
    The Rolling Stone's Matt Taibbi strikes again. 
  •  
    Awesome article Paul. A must read for anyone trying to understand the 2008 financial collapse. The same Wall Street Banksters who collapsed the world economy are back at it. This time raiding the public workers pension funds, spending millions on politicians and press campaigns to blame cops, firefighters, and teachers for mounting municipal fiscal failures and the coming collapse. Blame anyone but these triple dipping Banksters and their political toadies. Excellent piece of writing too. Check out this opening excerpt introducing the five page story: "In the final months of 2011, almost two years before the city of Detroit would shock America by declaring bankruptcy in the face of what it claimed were insurmountable pension costs, the state of Rhode Island took bold action to avert what it called its own looming pension crisis. Led by its newly elected treasurer, Gina Raimondo - an ostentatiously ambitious 42-year-old Rhodes scholar and former venture capitalist - the state declared war on public pensions, ramming through an ingenious new law slashing benefits of state employees with a speed and ferocity seldom before seen by any local government. Detroit's Debt Crisis: Everything Must Go Called the Rhode Island Retirement Security Act of 2011, her plan would later be hailed as the most comprehensive pension reform ever implemented. The rap was so convincing at first that the overwhelmed local burghers of her little petri-dish state didn't even know how to react. "She's Yale, Harvard, Oxford - she worked on Wall Street," says Paul Doughty, the current president of the Providence firefighters union. "Nobody wanted to be the first to raise his hand and admit he didn't know what the fuck she was talking about." Soon she was being talked about as a probable candidate for Rhode Island's 2014 gubernatorial race. By 2013, Raimondo had raised more than $2 million, a staggering sum for a still-undeclared candidate in a thimble-size state. Donors from Wall Str
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

Poland asks European court to hide CIA secret torture prison case from public - RT News - 0 views

  • Poland has asked the European Court of Human Rights to bar media and public presence during an upcoming hearing on Poland’s complicity with the CIA’s “extraordinary rendition” program that delivered terror suspects to secret prisons around the world. The public hearing in Strasbourg, France, scheduled for Dec. 3, will be the first arguments testing allegations that the Polish government allowed the CIA to operate a jail for supposed Al-Qaeda fighters in Poland. The request for a private hearing “will be examined by the court shortly,” a court spokesperson told Reuters. Poland cited national security concerns as to why it wants the hearing to remain confidential.
  • "We should have the right to review this case in public," said Adam Bodnar, vice president of the Warsaw-based Helsinki Foundation for Human Rights. "I do not see a reason for confidentiality of proceedings." Bodnar added that most of the evidence about the alleged CIA jail is already public, and keeping it secret is pointless now. His organization was instrumental in uncovering evidence of Poland’s cooperation with the agency.
  • The European Court of Human Rights (ECHR) case was brought by lawyers for Abu Zubaydah and Abd al-Rahim al-Nashiri, both now detainees waiting for charges at Guantanamo Bay.
  • ...2 more annotations...
  • The men allege they were kidnapped and held by the CIA at an intelligence training facility near Stare Kiejkuty, in northeast Poland. There, suspects “were subjected to enforced disappearance and tortured between 2002 and 2005,” Amnesty International said. Nashiri claims that while at the Polish site, he was subjected to torture, or “enhanced interrogation techniques,” and other harsh treatments, “such as ‘mock execution’ with a gun and threats of sexual assault against his family members,” Amnesty reported. Zubaydah was waterboarded 83 times in one month while in secret CIA detention.
  • Hosting such a secret prison violates the European Convention on Human Rights and the UN Convention Against Torture, both of which all European Union member states are bound to follow.
  •  
    I'll be surprised if the gag order is granted. The European Court of Human Rights has already handled a prior case involving CIA extraordinary rendition of a German citizen, holding the former Yugoslavian Republic of Macedonia liable for collaboration. That case was handled publicly and its public decision stands as a milestone indictment of the CIA's methods of waging War on Terror. http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-115621  
Paul Merrell

Public Citizen Press Room - 0 views

  • Public Citizen Defends Merchant From Unconstitutional Interference by NSA, Department of Homeland Security In Lawsuit Filed Against Agencies, Public Citizen Argues That Attempts to Stop Production of Parody Merchandise Are Inconsistent With First Amendment BALTIMORE, Md. – A Minnesota activist who uses images and names of government agencies on satirical merchandise is entitled to do so under the First Amendment, Public Citizen argued in a lawsuit filed today against the National Security Agency (NSA) and the Department of Homeland Security (DHS) on behalf of the merchant. The suit, filed in the U.S. District Court for the District of Maryland, targets cease-and-desist letters sent to the merchant’s producer by the NSA and DHS. On his website LibertyManiacs.com, Sauk Rapids, Minn., resident Dan McCall sells T-shirts, hats, bumper stickers and other items with his designs, printed by Zazzle.com – for example, a mug with the NSA seal above the words “Spying On You Since 1952” and a parodied NSA seal that says “Peeping While You’re Sleeping” above the words “The NSA: The only part of government that actually listens.”
  • On March 15, 2011, Zazzle received a warning letter from the NSA, and on Aug 11, 2011, it received one from DHS. The NSA said that Zazzle, by selling the merchandise, was in violation of a provision of the National Security Agency Act of 1959 that prohibits the “use [of] the words ‘National Security Agency,’ the initials, ‘NSA,’ the seal of the National Security Agency, or any colorable imitation of such words … in connection with any merchandise, impersonation, solicitation, or commercial activity in a manner reasonably calculated to convey the impression that such use is approved, endorsed, or authorized by the National Security Agency” without the permission of the NSA. DHS said that Zazzle, by selling McCall’s DHS parody items, was in violation of a law making it a crime to “mutilate or alter the seal of any department or agency of the United States,” among other provisions. In the lawsuit filed in defense of McCall, Public Citizen points out that the graphics did not create any likelihood of confusion about source or sponsorship, and no reasonable person would believe that the agencies themselves produced merchandise with those messages. The complaint also asserts that the First Amendment protects McCall and Zazzle’s right to use the seals to accurately identify the agencies he is criticizing. “The agencies’ attempts to forbid McCall from displaying and selling his merchandise are inconsistent with the First Amendment,” said Paul Alan Levy, the Public Citizen attorney handling the case. “It’s bad enough that these agencies have us under constant surveillance; forbidding citizens from criticizing them is beyond the pale.”
  • Public Citizen is asking the court to declare that several provisions of the National Security Agency Act cannot be enforced to forbid McCall from displaying his merchandise, and that two other laws are unconstitutionally overbroad because they violate the First Amendment by saying no one can “mutilate or alter the seal of any department or agency of the United States.” McCall is now selling his merchandise at CafePress.com. See the full complaint for declaratory relief here.
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Paul Merrell

Report: Verizon Claimed Public Utility Status To Get Government Perks - Slashdot - 0 views

  • Research for the Public Utility Law Project (PULP) has been released which details 'how Verizon deliberately moves back and forth between regulatory regimes, classifying its infrastructure either like a heavily regulated telephone network or a deregulated information service depending on its needs. The chicanery has allowed Verizon to raise telephone rates, all the while missing commitments for high-speed internet deployment' (PDF). In short, Verizon pushed for the government to give it common carrier privileges under Title II in order to build out its fiber network with tax-payer money. Result: increased service rates on telephone users to subsidize Verizon's 'infrastructure investment.' When it comes to regulations on Verizon's fiber network, however, Verizon has been pushing the government to classify its services as that of information only — i.e., beyond Title II. Verizon has made about $4.4 billion in additional revenue in New York City alone, 'money that's funneled directly from a Title II service to an array of services that currently lie beyond Title II's reach.' And it's all legal. An attorney at advocacy group Public Knowledge said it best: 'To expect that you can come in and use public infrastructure and funds to build a network and then be free of any regulation is absurd....When Verizon itself is describing these activities as a Title II common carrier, how can the FCC look at broadband internet and continue acting as though it's not a telecommunication network?'"
  •  
    Let's also not forget that what is now named "Verizon" used to be named Bell Atlantic, one of the seven Baby Bells that were spun off by AT&T by government order during antitrust proceedings.  In other words, this is one of the companies rate-payers financed through a heavily-regulated analog telephony absolute monopoly. But Verizon wants to spread its wings and escape the chains of regulation as a telecommunications carrier. While having its cake and eating it to, according to this article. The FCC has poised itself through a proposed rule with the flexibility to postpone a decision on net neutrality.  AT&T famously was allowed to keep its R&D arm while being freed of the expense of upgrading the U.S. telephony network from analog to digital and from copper wire to fibre optic.  And pay for those Baby Bells to make that transition we did. I remember monthly bills for a two person office running as high as $1,100 a month for calls all carried from Baby Bell to AT&T and back to another Baby Bell. All at state-regulated rates with FCC looking the other way. But now Verizon, Comcast (the originally munipally regulated cable television monopolies) and the few other "competing" survivors of that broadband rollout, having had their infrastructure paid for by the ratepayers, want to fly off and begin charging us at the other end of the pipe,via charges to content providers that will be passed on to us. Leading to the squeezing out of Mom and Pop internet businesses by the big content providers that can afford the charges and pass them on to us. This is looking more and more like another massive rip-off of the customers who already paid for that infrasture. Is that banksters I smell, privatizing a enormous public utility in the name of free markets?      
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

CIA SUCCESSFULLY CONCEALS BAY OF PIGS HISTORY - 0 views

  • May 21, 2014 – The U.S. Court of Appeals for the D.C. Circuit yesterday joined the CIA's cover-up of its Bay of Pigs disaster in 1961 by ruling that a 30-year-old volume of the CIA's draft "official history" could be withheld from the public under the "deliberative process" privilege, even though four of the five volumes have previously been released with no harm either to national security or any government deliberation. "The D.C. Circuit's decision throws a burqa over the bureaucracy," said Tom Blanton, director of the National Security Archive (www.nsarchive.org), the plaintiff in the case. "Presidents only get 12 years after they leave office to withhold their deliberations," commented Blanton, "and the Federal Reserve Board releases its verbatim transcripts after five years. But here the D.C. Circuit has given the CIA's historical office immortality for its drafts, because, as the CIA argues, those drafts might 'confuse the public.'" "Applied to the contents of the National Archives of the United States, this decision would withdraw from the shelves more than half of what's there," Blanton concluded.
  • The 2-1 decision, authored by Judge Brett Kavanaugh (a George W. Bush appointee and co-author of the Kenneth Starr report that published extensive details of the Monica Lewinsky affair), agreed with Justice Department and CIA lawyers that because the history volume was a "pre-decisional and deliberative" draft, its release would "expose an agency's decision making process in such a way as to discourage candid discussion within the agency and thereby undermine the agency's ability to perform its functions." This language refers to the fifth exemption (known as b-5) in the Freedom of Information Act. The Kavanaugh opinion received its second and majority vote from Reagan appointee Stephen F. Williams, who has senior status on the court.
  • On the 50th anniversary of the Bay of Pigs invasion in 2011, the National Security Archive's Cuba project director, Peter Kornbluh, requested, through the FOIA, the complete release of "The Official History of the Bay of Pigs Operation" — a massive, five-volume study compiled by a CIA staff historian, Jack Pfeiffer, in the 1970s and early 1980s. Volume III had already been released under the Kennedy Assassination Records Act; and a censored version of Volume IV had been declassified years earlier pursuant to a request by Pfeiffer himself. The Archive's FOIA request pried loose Volumes I and II of the draft history, along with a less-redacted version of Volume IV, but the CIA refused to release Volume V, so the Archive filed suit under FOIA in 2012, represented by the expert FOIA litigator, David Sobel. In May 2012, U.S. District Judge Gladys Kessler held that Volume V was covered by the deliberative process privilege, and refused to order any segregation of "non-deliberative" material, as required by FOIA.
  • ...2 more annotations...
  • The Archive appealed the lower court's decision, and with representation from the distinguished firm of Skadden Arps Meagher Slate & Flom, brought the case to the D.C. Circuit, with oral argument in December 2013. The National Coalition for History, including the American Historical Association and other historical and archival professional organizations, joined the case with an amicus curiae brief authored by the Jones Day law firm arguing for release of the volume. Titled "CIA's Internal Investigation of the Bay of Pigs Operation," Volume V apparently contains Pfeiffer's aggressive defense of the CIA against a hard-hitting 1961 internal review, written by the agency's own Inspector General, which held the CIA singularly responsible for the poor assumptions, faulty planning and incompetence that led to the quick defeat of the paramilitary exile brigade by Fidel Castro's military at the Bahia de Cochinos between April 17 and April 20, 1961. The Archive obtained under FOIA and published the IG Report in 1998. The CIA has admitted in court papers that the Pfeiffer study contains "a polemic of recriminations against CIA officers who later criticized the operation," as well as against other Kennedy administration officials who Pfeiffer contended were responsible for this foreign policy disaster. In the dissenting opinion from the D.C. Circuit's 2-1 decision yesterday, Judge Judith Rogers (appointed by Bill Clinton) identified multiple contradictions in the CIA's legal arguments. Judge Rogers pointed out that the CIA had failed to justify why release of Volume V would "lead to public confusion" when CIA had already released Volumes I-IV. She noted that neither the CIA nor the majority court opinion had explained "why release of the draft of Volume V 'would expose an agency's decision making process,'" and discourage future internal deliberations within the CIA's historical office any more than release of the previous four volumes had done.
  • Prior to yesterday's decision, the Obama administration had bragged that reducing the government's invocation of the b-5 exemption was proof of the impact of the President's Day One commitment to a "presumption of disclosure." Instead, the bureaucracy has actually increased in the last two years its use of the b-5 exemption, which current White House counselor John Podesta once characterized as the "withhold if you want to" exemption. The majority opinion also left two openings for transparency advocates. It invites Congress to set a time limit for applying the b-5 exemption, as Congress has done in the Presidential Records Act. Second, it concludes that any "factual material" contained in the draft should be reachable through Freedom of Information requests.
  •  
    "Causing public confusion" is a weak grounds for withholding government records because the agency has the option of issuing clarifying statements. Indeed, much of what government does causes public confusion. Hopefully, the Archive will pursue en banc reconsideration and/or seek Supreme Court review. 
Gary Edwards

Swimming with the Sharks: Goldman Sachs, School Districts, and Capital Appreciation Bon... - 0 views

  • In 2008, after collecting millions of dollars in fees to help California sell its bonds, Goldman urged its bigger clients to place investment bets against those bonds, in order to profit from a financial crisis that was sparked in the first place by irresponsible Wall Street speculation. Alarmed California officials warned that these short sales would jeopardize the state’s bond rating and drive up interest rates. But that result also served Goldman, which had sold credit default swaps on the bonds, since the price of the swaps rose along with the risk of default.
  • In 2009, the lenders’ lobbying group than proposed and promoted AB1388, a California bill eliminating the debt ceiling requirement on long-term debt for school districts. After it passed, bankers traveled all over the state pushing something called “capital appreciation bonds” (CABs) as a tool to vault over legal debt limits. (Think Greece again.) Also called payday loans for school districts, CABs have now been issued by more than 400 California districts, some with repayment obligations of up to 20 times the principal advanced (or 2000%).
  • The controversial bonds came under increased scrutiny in August 2012, following a report that San Diego County’s Poway Unified would have to pay $982 million for a $105 million CAB it issued. Goldman Sachs made $1.6 million on a single capital appreciation deal with the San Diego Unified School District.
  • ...10 more annotations...
  • . . . AB1388, signed by then-Gov. Arnold Schwarzenegger in 2009, [gave] banks the green light to lure California school boards into issuing bonds to raise quick money to build schools. Unlike conventional bonds that have to be paid off on a regular basis, the bonds approved in AB1388 relaxed regulatory safeguards and allowed them to be paid back 25 to 40 years in the future. The problem is that from the time the bonds are issued until payment is due, interest accrues and compounds at exorbitant rates, requiring a balloon payment in the millions of dollars. . . . Wall Street exploited the school boards’ lack of business acumen and proposed the bonds as blank checks written against taxpayers’ pocketbooks. One school administrator described a Wall Street meeting to discuss the system as like “swimming with the big sharks.” Wall Street has preyed on these school boards because of the millions of dollars in commissions. Banks, financial advisers and credit rating firms have billed California public entities almost $400 million since 2007. [State Treasurer] Lockyer described this as “part of the ‘new’ Wall Street,” which “has done this kind of thing on the private investor side for years, then the housing market and now its public entities.”
  • The Federal Reserve could have made virtually-interest-free loans available to local governments, as it did for banks. But the Fed (whose twelve branches are 100% owned by private banks) declined. As noted by Cate Long on Reuters:
  • The Fed has said that it will not buy muni bonds or lend directly to states or municipal issuers. But be sure if yields rise high enough Merrill Lynch, Goldman Sachs and JP Morgan will be standing ready to “save” these issuers. There is no “lender of last resort” for muniland.
  • Among the hundreds of California school districts signing up for CABs were fifteen in Orange County. The Anaheim-based Savanna School District took on the costliest of these bonds, issuing $239,721 in CABs in 2009 for which it will have to repay $3.6 million by the final maturity date in 2034. That works out to $15 for every $1 borrowed. Santa Ana Unified issued $34.8 million in CABs in 2011. It will have to repay $305.5 million by the maturity date in 2047, or $9.76 for every dollar borrowed. Placentia-Yorba Linda Unified issued $22.1 million in capital appreciation bonds in 2011. It will have to repay $281 million by the maturity date in 2049, or $12.73 for every dollar borrowed.
  • In 2013, California finally passed a law limiting debt service on CABs to four times principal, and limiting their maturity to a maximum of 25 years. But the bill is not retroactive. In several decades, the 400 cities that have been drawn into these shark-infested waters could be facing municipal bankruptcy – for capital “improvements” that will by then be obsolete and need to be replaced.
  • Then-State Treasurer Bill Lockyer called the bonds “debt for the next generation.” But some economists argue that it is a transfer of wealth, not between generations, but between classes – from the poor to the rich. Capital investments were once funded with property taxes, particularly those paid by wealthy homeowners and corporations. But California’s property tax receipts were slashed by Proposition 13 and the housing crisis, forcing school costs to be borne by middle-class households and the students themselves.
  • According to Demos, per-student funding has been slashed since 2008 in every state but one – the indomitable North Dakota. What is so different about that state? Some commentators credit the oil boom, but other states with oil have not fared so well. And the boom did not actually hit in North Dakota until 2010. The budget of every state but North Dakota had already slipped into the red by the spring of 2009.
  • One thing that does single the state out is that North Dakota alone has its own depository bank.
  • The state-owned Bank of North Dakota (BND) was making 1% loans to school districts even in December 2014, when global oil prices had dropped by half. That month, the BND granted a $10 million construction loan to McKenzie County Public School No. 1, at an interest rate of 1% payable over 20 years. Over the life of the loan, that works out to $.20 in simple interest or $.22 in compound interest for every $1 borrowed. Compare that to the $15 owed for every dollar borrowed by Anaheim’s Savanna School District or the $10 owed for every dollar borrowed by Santa Ana Unified.
  • How can the BND afford to make these very low interest loans and still turn a profit? The answer is that its costs are very low. It has no exorbitantly-paid executives; pays no bonuses, fees, or commissions; pays no dividends to private shareholders; and has low borrowing costs. It does not need to advertise for depositors (it has a captive deposit base in the state itself) or for borrowers (it is a wholesale bank that partners with local banks, which find the borrowers). The BND also has no losses from derivative trades gone wrong. It engages in old-fashioned conservative banking and does not speculate in derivatives. Unlike the vampire squids of Wall Street, it is not motivated to maximize its bottom line in a predatory way. Its mandate is simply to serve the public interest.
  •  
    " Remember when Goldman Sachs - dubbed by Matt Taibbi the Vampire Squid - sold derivatives to Greece so the government could conceal its debt, then bet against that debt, driving it up? It seems that the ubiquitous investment bank has also put the squeeze on California and its school districts. Not that Goldman was alone in this; but the unscrupulous practices of the bank once called the undisputed king of the municipal bond business epitomize the culture of greed that has ensnared students and future generations in unrepayable debt."
Gary Edwards

Reinventing Banking: From Russia to Iceland to Ecuador - 1 views

  • Global developments in finance and geopolitics are prompting a rethinking of the structure of banking and of the nature of money itself. Among other interesting news items: * In Russia, vulnerability to Western sanctions has led to proposals for a banking system that is not only independent of the West but is based on different design principles. * In Iceland, the booms and busts culminating in the banking crisis of 2008-09 have prompted lawmakers to consider a plan to remove the power to create money from private banks. * In Ireland, Iceland and the UK, a recession-induced shortage of local credit has prompted proposals for a system of public interest banks on the model of the Sparkassen of Germany. * In Ecuador, the central bank is responding to a shortage of US dollars (the official Ecuadorian currency) by issuing digital dollars through accounts to which everyone has access, effectively making it a bank of the people.
  • A major concern with stripping private banks of the power to create money as deposits when they make loans is that it will seriously reduce the availability of credit in an already sluggish economy. One solution is to make the banks, or some of them, public institutions. They would still be creating money when they made loans, but it would be as agents of the government; and the profits would be available for public use, on the model of the US Bank of North Dakota and the German Sparkassen (public savings banks). In Ireland, three political parties – Sinn Fein, the Green Party and Renua Ireland (a new party) — are now supporting initiatives for a network of local publicly-owned banks on the Sparkassen model. In the UK, the New Economy Foundation (NEF) is proposing that the failed Royal Bank of Scotland be transformed into a network of public interest banks on that model. And in Iceland, public banking is part of the platform of a new political party called the Dawn Party.
  • Particularly interesting is a proposal to provide targeted lending for businesses and industries by providing them with low-interest loans at 1-4 percent, financed through the central bank with quantitative easing (digital money creation). The proposal is to issue 20 trillion rubles for this purpose over a five year period. Using quantitative easing for economic development mirrors the proposal of UK Labour Leader Jeremy Corbin for “quantitative easing for people.”
  • ...8 more annotations...
  • William Engdahl concludes that Russia is in “a fascinating process of rethinking every aspect of her national economic survival because of the reality of the western attacks,” one that “could produce a very healthy transformation away from the deadly defects” of the current banking model.
  • Iceland’s Radical Money Plan Iceland, too, is looking at a radical transformation of its money system, after suffering the crushing boom/bust cycle of the private banking model that bankrupted its largest banks in 2008. According to a March 2015 article in the UK Telegraph: Iceland’s government is considering a revolutionary monetary proposal – removing the power of commercial banks to create money and handing it to the central bank. The proposal, which would be a turnaround in the history of modern finance, was part of a report written by a lawmaker from the ruling centrist Progress Party, Frosti Sigurjonsson, entitled “A better monetary system for Iceland”.
  • Under this “Sovereign Money” proposal, the country’s central bank would become the only creator of money. Banks would continue to manage accounts and payments and would serve as intermediaries between savers and lenders. The proposal is a variant of the Chicago Plan promoted by Kumhof and Benes of the IMF and the Positive Money group in the UK.
  • Ever since 2000, when Ecuador agreed to use the US dollar as its official legal tender, it has had to ship boatloads of paper dollars into the country just to conduct trade. In order to “seek efficiency in payment systems [and] to promote and contribute to the economic stability of the country,” the government of President Rafael Correa has therefore established the world’s first national digitally-issued currency.
  • Unlike Bitcoin and similar private crypto-currencies (which have been outlawed in the country), Ecuador’s dinero electronico is operated and backed by the government. The Ecuadorian digital currency is less like Bitcoin than like M-Pesa, a private mobile phone-based money transfer service started by Vodafone, which has generated a “mobile money” revolution in Kenya.
  • According to a National Assembly statement: Electronic money will stimulate the economy; it will be possible to attract more Ecuadorian citizens, especially those who do not have checking or savings accounts and credit cards alone. The electronic currency will be backed by the assets of the Central Bank of Ecuador.
  • That means there is no fear of the bank going bankrupt or of bank runs or bail-ins. Nor can the digital currency be devalued by speculative short selling. The government has declared that these are digital US dollars trading at 1 to 1 – take it or leave it – and the people are taking it. According to an October 2015 article titled “
  • Banking Moves into the 21st Century The catastrophic failures of the Western banking system mandate a new vision. These transformations, current and proposed, are constructive steps toward streamlining the banking system, eliminating the risks that have devastated individuals and governments, democratizing money, and promoting sustainable and prosperous economies.
  •  
    Excellent article on banking, lending, and currency reform initiatives.  Thanks to Marbux!
Gary Edwards

The Project To Restore America - 0 views

  •  
    Yes, it's a confusing proposal - but not when compared to what we have now; a financial industry run by "To-Big-To-Fail Banks" able to loot the public treasury at will.  Never to Big to Bail, and taxpayers voted for four more years of looting.  Limited Purpose Banking is based on equity.  Which is quite different from the fractional-reserve-lending model used by the To-Big-Fail Banksters. "The history of banking is a long and sorry record of promises that can't be kept - promises that were either overly optimistic or outright fraudulent. Since banks are leveraged, failing to deliver on their promises leads them to collapse. But unlike standard bankruptcies, bank failures produce enormous economic fallout.   There's a reason. Banks not only market financial products. They also make financial markets. Markets, be they for apples or loans, constitute critical public goods whose provision should not be jeopardized.     Making a market -- getting buyers and sellers to meet at the same time and place always represents a feat of coordination. The main purpose of banks is to effect financial coordination - to bring together borrowers and lenders and investors and savers.     When banks fail, particularly large ones, this coordination breaks down. Moreover, bank failures can be contagious. Any given bank's failure raises the prospect that fraud or very poor judgment was at fault and that other banks are engaged in the same practice. This leads to runs on, actually away from, banks in general. In addition, since banks borrow and lend to one another, the failure of bank A can bring bank B down if A owes money to B.     Worst of all, financial collapse, even by a few major financial players can coordinate non-financial companies as well as households on the belief that times are bad. And when millions of separate firms and tens of millions of households start expecting bad times, they take actions to make bad times happen. Thus, the state of confidence, what Key
Gary Edwards

California: Urgent Last-Minute Action to Stop NDAA "Indefinite Detention" - Tenth Amend... - 1 views

  •  
    From the Tenth Amendment Center:   "On Tuesday, April 9th, the California Assembly Public Safety Committee will hold a hearing and do-or-die vote on AB351.   Passage of this bill would be a serious setback to those advancing the power of "indefinite detention" in the United States. AB351 NEEDS YOUR HELP RIGHT NOW TO PASS. 1. CALL all the members of the Public Safety Committee.  Call in the evenings or on the weekend as well.  We want them to have a flood of messages in support by the time they have the hearing on Tuesday.  Be VERY respectful, but be strong. Urge each of them to vote YES on AB351. Tom Ammiano, chair (916) 319-2017 Melissa Melendez, vice-chair (916) 319-2067 Byron Jones-Sawyer, Sr. (916) 319-2059 Holly J. Mitchell (916) 319-2054 Bill Quirk (916) 319-2020 Nancy Skinner (916) 319-2015 Marie Waldron (916) 319-2075 "
Paul Merrell

Senators accuse government of using 'secret law' to collect Americans' data | World new... - 0 views

  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say.
  • "This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."This is the strongest attack yet from Congress since the disclosures began, and comes after Clapper admitted he had given "the least untruthful answer possible" when pushed on these issues by Senators at a hearing before the latest revelations by the Guardian and the Washington Post.In a press statement, the group of senators added: "The recent public disclosures of secret government surveillance programs have exposed how secret interpretations of the USA Patriot Act have allowed for the bulk collection of massive amounts of data on the communications of ordinary Americans with no connection to wrongdoing."
  • They said: "Reliance on secret law to conduct domestic surveillance activities raises serious civil liberty concerns and all but removes the public from an informed national security and civil liberty debate." A spokesman for the office of the director of national intelligence (ODNI) acknowledged the letter. "The ODNI received a letter from 26 senators this morning requesting further engagement on vital intelligence programs recently disclosed in the media, which we are still evaluating. The intelligence and law enforcement communities will continue to work with all members of Congress to ensure the proper balance of privacy and protection for American citizens."The letter was organised by Oregan Democrat Ron Wyden, a member of the intelligence committee, but includes four Republican senators: Mark Kirk, Mike Lee, Lisa Murkowski and Dean Heller.
  • ...3 more annotations...
  • They ask Clapper to publicly provide information about the duration and scope of the program and provide examples of its effectiveness in providing unique intelligence, if such examples exist.The senators also expressed their concern that the program itself has a significant impact on the privacy of law-abiding Americans and that the Patriot Act could be used for the bulk collection of records beyond phone metadata."The Patriot Act's 'business records' authority can be used to give the government access to private financial, medical, consumer and firearm sales records, among others," said a press statement.In addition to raising concerns about the law's scope, the senators noted that keeping the official interpretation of the law secret and the instances of misleading public statements from executive branch officials prevented the American people from having an informed public debate about national security and domestic surveillance.
  • The senators said they were seeking public answers to the following questions in order to give the American people the information they need to conduct an informed public debate. The specific questions include:• How long has the NSA used Patriot Act authorities to engage in bulk collection of Americans' records? Was this collection underway when the law was reauthorized in 2006?• Has the NSA used USA Patriot Act authorities to conduct bulk collection of any other types of records pertaining to Americans, beyond phone records?• Has the NSA collected or made any plans to collect Americans' cell-site location data in bulk?• Have there been any violations of the court orders permitting this bulk collection, or of the rules governing access to these records? If so, please describe these violations.
  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say."This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."
Gary Edwards

Liberty in the Breach | The End of the American Dream - 0 views

  •  
    This link will take you to a public blog, the content of which comes from the collaborative work of the Diigo group, "Socialism and the End of the American Dream". The content for the Liberty in the Breach (http://goo.gl/AAFJ9) blog is posted directly from a Diigo.com group called "Socialism and the End of the American Dream". So yes, this groups bookmarking efforts are public.  The way this works is easy for anyone to to do, and I encourage everyone to make use of blog and RSS posts. The Diigo bookmark service enables groups of people to share tagged and categorized lists of bookmarks, but the only way to take these group collaborations truly public is through the blog and RSS posting mechanisms. There are also select sharing methods.  Each Group of bookmarks and comments can have any number of "Lists". A list is a subset of a group, but it can stand on it's own or serve many groups. The difference is that Groups have members and lists do not.  The effect of this separation is that you can publish or RSS any list to a Web Site or Reader, and not be concerned about errant group membership comments and posts. Fortunately we not encountered that problem with the End of the American Dream group.  The "Socialism and the End of the American Dream" group contains two prominent "lists": Banksters and USA-Constitution. There are other lists, but over time these two became dominant.  I started the "Socialism and the End of the American Dream" group in August of 2008 as part of my research and attempt to understand the financial collapse of 2008. What I found was quite chilling, and has nothing to do with "Socialism" or it's many forms.  I came to understand that socialism in it's many forms (liberalism, Progressivism, Marxism, Naziism, and Communism), is used the same as conservatism and corporate facism by a wealthy globalist elite to seize the instruments and resources of government for their own purposes.  So yeah, if I had the chance to rename to group, I
Paul Merrell

Poll: Nearly 2/3 of U.S. Public Opposes Withdrawing from Iran Nuclear Deal « ... - 0 views

  • Amid growing speculation about a Trump administration’s intentions regarding the Iran nuclear deal, a new poll has found that nearly two-thirds of the U.S. public opposes withdrawing from the Joint Comprehensive Plan of Action (JCPOA) negotiated 18 months ago between Iran and the P5+1. The poll, part of a much larger survey by the University of Maryland’s Program for Public Consultation (PPC) about public attitudes about the U.S. role in world affairs, was released Thursday to foster better informed debate about the issue in advance of Trump’s inauguration. It included 2,980 respondents and was conducted December 22-28.
  • Reaction split along predictably partisan lines. Nearly nine out of ten Democrats (86%) favored continuing the deal so long as Iran complies with it, while 40% of Republicans agreed with that position. Among self-described independents, 58% said the U.S. should stick with the deal. The poll was released just a day after 37 leading U.S. scientists—including Nobel laureates, nuclear experts, and former White House science advisers—sent an open letter to Trump in support of the deal. The deal provided a “strong bulwark against an Iranian nuclear-weapons program” and a “critical U.S. strategic asset,” the scientists wrote. It remains very unclear what Trump will do. He has often referred to the JCPOA as “disastrous.” Last March, he told the American Israel Public Affairs Committee that his “number one priority is to dismantle [it].” In the same speech, however, he declared that, as president, he will ensure that the deal is “enforce[d] like you’ve never seen a contract enforced before…” At still other times, he has said the agreement should be renegotiated.
Paul Merrell

New WikiLeaks Trove Further Exposes TISA's Neoliberal Agenda - 0 views

  • WikiLeaks on Wednesday released a trove of documents detailing previously unknown pro-corporate provisions and updates to the Trade in Services Agreement (TISA), exposing the extent to which the U.S.-driven deal will force signatory nations to privatize public services and deregulate corporations. As the 52 nations involved in TISA comprise a full two-thirds of global GDP, the deal is poised to impact billions of lives around the world. The 18th round of negotiations on TISA resumed Thursday. Released for the very first time on Wednesday was TISA’s annex on “State-Owned Enterprises” (SOEs), which mandates that public services must be treated like private businesses. The documents reveal that the annex was introduced only two days after the U.S. successfully forced through similar text in the Trans-Pacific Partnership (TTP) in October 2015.
  • Trade expert Jane Kelsey, who teaches law at the University of Auckland, described how the U.S. pushed through such provisions in order to target other nations’ public services—and China’s in particular: When the [TPP] negotiations began in 2010 the U.S. made it clear that it required a chapter on SOEs. The goal was always to create precedent-setting rules that could target China, although the U.S. also had other countries’ SOEs in its sights—the state-managed Vietnamese economy, various countries’ sovereign wealth funds, and once Japan joined, Japan Post’s banking, insurance and delivery services. All the other countries were reluctant to concede the need for such a chapter and the talks went around in circles for several years. Eventually the U.S. had its way. “The U.S. proposal for TISA adopts and adapts key parts of the [TPP] chapter that force majority-owned SOEs to operate like private sector businesses,” Kelsey added. “The most extreme, complicated and potentially unworkable provisions in the [TPP] relating to state support are not included—yet. But there is an extraordinary power for a single TISA party to require the development of those rules if another TISA country, or a country seeking to join TISA, has too many large SOEs.”
  • Observers have long taken note of the implicitly anti-China stance of the several U.S.-backed pro-corporate “free trade” deals being negotiated now. While TISA is perhaps the least well-known of these agreements, together with the TPP and the TransAtlantic Trade and Investment Pact (TTIP), the deals “form not only a new legal order shaped for transnational corporations, but a new economic ‘grand enclosure,’ which excludes China and all other BRICS countries,” as WikiLeaks founder Julian Assange put it last year. The leaked documents also showed new, multinational-friendly updates to sections of the deal titled “Domestic Regulation,” “Transparency,” and “New Provisions.” The latest versions, argues WikiLeaks, have further advanced towards the ‘deregulation’ objectives of big corporations entering overseas markets. Local regulations like store size restrictions or hours of operations are considered an obstacle to achieve ‘operating efficiencies’ of large-scale retailing, disregarding their public benefit that foster livable neighbors and reasonable hours of work for employees.
  • ...1 more annotation...
  • Consumer protection advocates are outraged that such radically pro-corporate deals are being hidden and negotiated away from public view. “Consumer organizations shouldn’t have to rely on leaks to find out about negotiations that will have a major impact on consumers’ lives,” said Amanda Long, general director of the UK-based Consumers International, on Wednesday. “Without greater transparency, the negotiations can’t be exposed to the scrutiny needed to design a good agreement and build public trust, this must be a priority.” The impact of such an agreement will indeed be major: “The TISA provisions in their current form will establish a wide range of new grounds for domestic regulations to be challenged by corporations—even those without a local presence in that country,” WikiLeaks concluded. Kelsey observed, “As President Obama said of the [TPP] in October 2015, these agreements are about the U.S. making the rules for the global economy in the 21st century[…] in ways that ‘reflect America’s values.'”
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
« First ‹ Previous 41 - 60 of 1657 Next › Last »
Showing 20 items per page