Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged purpose

Rss Feed Group items tagged

Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Gary Edwards

Federal Reserve Act December 23, 1913 - 1 views

  • SEC. I6. Federal reserve notes, to be issued at the discretion of the Federal Reserve Board for the purpose of making advances to Federal reserve banks through the Federal reserve agents as hereinafter set forth and for no other purpose, are hereby authorized. The said notes shall be obligations of the United States and shall be receivable by all national and member banks and Federal reserve banks and for all taxes, customs, and other public dues They shall be redeemed in gold on demand at the Treasury Department of the United States, in the city of Washington . . ., or in gold or lawful money at any Federal reserve bank.
  • Every Federal reserve bank shall maintain reserves in gold or lawful money of not less than thirty-five per centum against its deposits and reserves in gold of not less than forty per centum against its Federal reserve notes in actual circulation, and not offset by gold or lawful money deposited with the Federal reserve agent....
  •  
    "SEC. I6. Federal reserve notes, to be issued at the discretion of the Federal Reserve Board for the purpose of making advances to Federal reserve banks through the Federal reserve agents as hereinafter set forth and for no other purpose, are hereby authorized. The said notes shall be obligations of the United States and shall be receivable by all national and member banks and Federal reserve banks and for all taxes, customs, and other public dues They shall be redeemed in gold on demand at the Treasury Department of the United States, in the city of Washington . . ., or in gold or lawful money at any Federal reserve bank."
Gary Edwards

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
Gary Edwards

You Won't BELIEVE What's Going On with Government Spying on Americans - BlackListedNews... - 1 views

  •  
    "New Revelations Are Breaking Every Day" This web page is very well sourced and filled with links where you will get lost for hours. Excellent reference document ............................ Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated roundup: - Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year - 2 Senators on the intelligence committee said the violations revealed in the Post article were just the "tip of the iceberg" - Glenn Greenwald notes:  "One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing".(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes) - The government is spying on essentially everything we do. It is not just "metadata" … although that is enough to destroy your privacy - The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that "everything" is relevant … so it spies on everyone - NSA whistleblowers say that the NSA collects all of our conversations word-for-word - It's not just the NSA … Many other agencies, like the FBI and IRS - concerned only with domesticissues - spy on Americans as well - The information gained through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes.  The agencies are instructed to intentionally "launder" the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges - Top counter-terror experts say that the government's mass spying doesn't keep us
Gary Edwards

The Project To Restore America - 0 views

  •  
    Yes, it's a confusing proposal - but not when compared to what we have now; a financial industry run by "To-Big-To-Fail Banks" able to loot the public treasury at will.  Never to Big to Bail, and taxpayers voted for four more years of looting.  Limited Purpose Banking is based on equity.  Which is quite different from the fractional-reserve-lending model used by the To-Big-Fail Banksters. "The history of banking is a long and sorry record of promises that can't be kept - promises that were either overly optimistic or outright fraudulent. Since banks are leveraged, failing to deliver on their promises leads them to collapse. But unlike standard bankruptcies, bank failures produce enormous economic fallout.   There's a reason. Banks not only market financial products. They also make financial markets. Markets, be they for apples or loans, constitute critical public goods whose provision should not be jeopardized.     Making a market -- getting buyers and sellers to meet at the same time and place always represents a feat of coordination. The main purpose of banks is to effect financial coordination - to bring together borrowers and lenders and investors and savers.     When banks fail, particularly large ones, this coordination breaks down. Moreover, bank failures can be contagious. Any given bank's failure raises the prospect that fraud or very poor judgment was at fault and that other banks are engaged in the same practice. This leads to runs on, actually away from, banks in general. In addition, since banks borrow and lend to one another, the failure of bank A can bring bank B down if A owes money to B.     Worst of all, financial collapse, even by a few major financial players can coordinate non-financial companies as well as households on the belief that times are bad. And when millions of separate firms and tens of millions of households start expecting bad times, they take actions to make bad times happen. Thus, the state of confidence, what Key
Paul Merrell

DOJ's Motion to Dismiss in Smith v. Obama, the case challenging the legality of the war... - 0 views

  • As I noted in an earlier post, Nathan Smith, a U.S. Army captain deployed to Kuwait as part of the campaign against ISIL, Operation Inherent Resolve, has sued the President, seeking a declaration that Congress has not authorized the hostilities in Iraq and Syria and that therefore the War Powers Resolution requires the President to remove U.S. forces from hostilities in those nations. On Tuesday, the Department of Justice filed a motion to dismiss the case. Its brief in support of the motion includes one argument that I think is correct (albeit not for all the reasons the government offers) — namely, that Smith lacks standing to sue. That ought to be sufficient to have the case dismissed. The brief also includes an argument on the merits (albeit not designated as such) that is very interesting and potentially important — an account of how Congress has allegedly authorized Inherent Resolve in three ways: (i) in the 2001 AUMF; (ii) in the 2002 AUMF; and (iii) in current appropriations statutes. The heart of the brief, however, is devoted to a third argument — that Judge Koller-Kotelly must dismiss the case on the basis of the political question doctrine — that is not only wrong, but that simply ignores the Supreme Court’s recent (and repeated) repudiation of that very argument.
  • On page 39 of its 45-page brief, the government finally gets around to the reason why the court should dismiss the complaint: Smith lacks standing. Importantly, Smith’s theory of standing is not that he — an Army captain deployed to perform intelligence services in Kuwait — is more likely to be injured or killed by virtue of the President’s decision to deploy troops into hostilities in Iraq and Syria. It is, instead, that the President’s alleged failure to comply with the War Powers Act results in Captain Smith’s own violation of his officer’s oath to “support and defend” the Constitution “against all enemies, foreign and domestic,” and to “bear true faith and allegiance” to the Constitution.
  • The government’s standing argument begins (p. 35) by suggesting that “[p]laintiff’s claim that he is being forced to betray his oath is insufficient to establish standing because the violation of an oath, by itself, is not an injury in fact.” The cases the government cites for that proposition, however, do not say that a forced oath violation would not be an injury in fact — and that’s not a question the judge needs to resolve. What the cases establish, instead, is the point the government finally argues at page 39 — namely, that a government officer does not violate his oath by complying with superiors’ orders, even if it turns out that the law prohibits the military operation in which those orders are issued. Indeed, Smith would not violate his oath of office even if his superiors’ orders themselves were unauthorized, or if the intelligence activities he is ordered to performed were unauthorized. But he does not allege even those things (as I discuss below, he does not, for instance, alleged that he is being ordered to do anything unlawful). Instead, he merely argues that because President Obama should have withdrawn troops from Syria and Iraq 60 days after their deployment, Smith himself is violating his oath to “bear true faith and allegiance to the Constitution.” This is a non sequitur: Even if Smith is right that the continuation of Operation Inherent Resolve is unlawful, that would not mean that he is acting in violation of his oath. (Much more on this in my earlier post.) And that simple fact is reason enough for Judge Koller-Kotelly to dismiss the case.
  • ...8 more annotations...
  • One of Smith’s counsel, Professor Bruce Ackerman, argues that this reason for rejecting the oath-based theory of standing ignores the Supreme Court’s 1804 decision in Little v. Barreme. Little, however, is not on point. In that case, Navy Captain Little was sued by the owners of a Danish ship for damages caused when Little seized that neutral ship. The Court held that Little could be liable, notwithstanding the fact that he was following orders, because the capture violated a implicit statutory prohibition on the military’s seizure of ships sailing from France to the United States. In this case, however, Captain Smith has not argued — nor could he — that he has been ordered to do anything unlawful (in violation of a statute), let alone that he has been ordered to do something that would subject him to possible liability for damages. He is, instead, arguing that President Obama violated a statute. That is not enough to establish Smith’s standing to sue.
  • The government’s main argument, to which it devotes far too many pages, is that the judge must dismiss the case because it raises a “political question” that courts cannot answer. This is flatly wrong — and it ignores several controlling precedents, including the Supreme Court’s recent 8-1 rejection of virtually the same government argument in Zivotofsky v. Clinton.
  • The most interesting thing about the government’s brief — and by far the most important aspect of it, for public purposes apart from the lawsuit itself — is that, in the section ostensibly arguing that the case is nonjusticiable (see pp. 25-30, and also pp. 4-14), DOJ actually offers the Executive branch’s most detailed defense yet about why Operation Inherent Resolve is congressionally authorized. As some of us predicted, the government relies on three arguable authorizations, any one of which would be sufficient to defeat Smith’s WPR claim if the courts were to reach the merits. In this post I’m not going to assess the merits of the three arguments. For now, my purpose is only to describe them, and to raise one issue with respect to the third. i. First, the government argues that the 2001 AUMF authorizes the operation against ISIL.
  • Second, the government argues that the 2002 AUMF also authorizes Operation Inherent Resolve, just as it authorized operations in Iraq against AQI (which became ISIL) from 2003 to 2011, after the Hussain regime fell.
  • Finally, and most interestingly (in part because the government has not previously made this argument), DOJ argues that a recent “unbroken stream” of appropriations statutes not only confirm the authorities allegedly conferred by the 2001 and 2002 AUMFs, but also offer their own, independent congressional authorization.
  • Two things are fairly clear from this: The members of Congress approve of Operation Inherent Resolve — indeed, there’s virtually no opposition. And Congress has (most likely) appropriated funds to pay for it. The operative question, however, is whether Congress’s appropriations also serve as an authorization that would supersede the requirement of WPR section 5(b). The government brief alludes to one important argument that the plaintiff will undoubtedly raise: Section 8(a)(1) of the WPR provides that, for purposes of tolling the 60-day clock of section 5(b), “[a]uthority to introduce United States Armed Forces into hostilities or into situations wherein involvement in hostilities is clearly indicated by the circumstances shall not be inferred (1) from any provision of law . . . including any provision contained in any appropriations Act, unless such provision specifically authorizes the introduction of United States Armed Forces into hostilities or into such situations and states that it is intended to constitute specific statutory authorization within the meaning of this chapter.” Obviously, the 2016 Act does not satisfy that requirement. Is that fatal to the appropriations-as-authorization argument?
  • As the Office of Legal Counsel 50 U.S.C. 1542 and 1543). These provisions might be read simply to convey that the executive must continue to comply with the consultation and reporting requirements of WPR sections 3 and 4, even after the 2016 Act authorizes the introduction of troops into hostilities in Iraq and Syria. Or they might alternatively be construed to also specify that the Act is not providing the authority that section 5(b) of the WPR calls for.
  • Not surprisingly, DOJ argues for the former view (pp. 27-28 of the brief): “[I]n the few provisions in which Congress did reference the War Powers Resolution, to clarify that no funds made available for Operation Inherent Resolve are to be used ‘in contravention’ of the Resolution, Congress signaled its agreement that the President’s counter-ISIL military actions were authorized by simultaneously funding Operation Inherent Resolve. If Congress believed that the United States had been conducting airstrikes and other counter-ISIL military activities ‘in contravention of the War Powers Resolution,’ it would have made no sense for Congress to use the ‘in contravention’ proviso in the same laws that make funds available for the express purpose of continuing those military activities.” That’s not a bad argument, at least at first glance; but it’s not a slam-dunk, either, in part because appropriations provisions do not necessarily establish authorizations. It’ll be interesting to see how Captain Smith’s lawyers respond to this particular aspect of the merits argument. I doubt Judge Koller-Kotelly will reach it, however, because she is likely to dismiss the case for want of standing.
  •  
    I've read the brief. I don't think the implied partial repeal of the War Powers Resolution argument should fly. The relevant provision establishes a rule of interpretation of later statutes and the appropriations bills neither reject the rule of interpretation nor specifically provide authorization for use of military force. They just authorize funding. On the standing issue, I think the DoJ position is correct; the oath of office applies only to senior officers who make the decision to initiate a war. But DoJ may have opened the door to a more compelling standing argument by arguing that the war does not constitute a war crime, a crime against peace, or a crime against humanity under international law. DoJ did not need to make that argument because Smith had not alleged in his complaint that he was being ordered to commit such crimes, but by doing so DoJ waives any argument that such issues are beyond the scope of Smith's standing and the evidence that the Iraq and Syrian wars are illegal under international law is, to say the least, strong.
Gary Edwards

Why Progressives Don't Understand And Are Enemies Of Liberty | Western Free Press - 0 views

  • For a classical liberal, freedom means that each individual possesses as a human being certain inviolable rights, those being rights to his life, liberty and honestly acquired property. And that human relationships should be based on voluntary consent and mutual agreement. For my interlocutor, freedom means “empowerment” or the ability to do or achieve certain things, without which “freedom” is not complete. These include a minimum or “decent” standard of living and the ability to attain certain potentials in life, which are everyone’s “right” as a member of society.
  • For my fellow conversationalist, society is a shared “community” of human beings each of whom owes certain things to the others, just as the others owe certain things to us. Society might be viewed as an extended family, from this perspective, all the members of which have certain required obligations to support and give assistance to their social “relatives.” I suggested that society is a network of human relationships formed between individuals based upon opportunities for mutual betterment, including both the economic and the cultural in the widest sense, the fundamental foundation of which derives from those essential individual rights.
  • French eighteenth century philosopher, Jean-Jacque Rousseau, who reasoned that man began as savages in the wild threatened by both beast and other men. Everyone entered into a social contract and formed society for mutual safety and betterment by giving up a portion of their complete and unrestrained “freedom” in that earlier setting of savagery for the order and security of shared community. The freedom given up is compensated by safety and the security of mutual aid, including the modern welfare state.
  • ...10 more annotations...
  • British philosopher, John Locke, who argued that rights are not bestowed upon man by government or the community but belong to him by his nature as a human being. Government, in Locke’s social contract, is to provide individuals with a tool for the common defense against the violence of some of their fellow men. The role of government is the securer of liberty by protecting each individual’s rights to his life, liberty and property, and not as a guarantor of a certain standard of living or desired access to various material things.
  • The reason, I said, was that if the government undertook this latter responsibility of “social safety nets” and “positive” access to various other desired states of affairs, it can do so only by imposing through police power an obligation on others to provide the material means that some others are to be guaranteed. By doing so, government would be violating its original purpose for being brought into existence: the protecting of liberty (including people’s property rights to their own honestly earned income and wealth) rather than a violator that takes from some without their consent for the asserted benefits of others.
  • The world is to be reduced to and confined within a narrow corridor of forms of “good behavior” that people will be either penalized for violating or subsidized for doing through government regulation and spending.
  • Progressives Cling to Collectivism Here, in my opinion, are some of the essential issues and dilemmas facing the advocate of individual liberty, free markets, and constitutionally limited government. Too many of our fellow citizens do not believe that individuals have a right to live for themselves. They truly and honestly believe that “society,” “community,” the collective, is something independent of the distinct individuals who comprise it, and for which the individual is morally, politically and legally obligated to serve and sacrifice for. Police power is a legitimate and appropriate tool of enforcing these obligations and duties, if resistance or indifference is experienced among the citizens in the undertaking of these activities.
  • For the “progressive,” government is “society’s” agent to undertake the tasks of “social justice” and “entitlement” that are owed to each member and to which everyone is required to provide their contribution.  Police power is the means by which everyone is made to contribute their “social dues” in the form of either obedience to government regulations or payment of taxes for redistributive purposes.
  • Liberty and the Meaning of Society and the “Social” For the classical liberal or libertarian, on the other hand, government is considered an agency for the protection of each individual’s rights. “Society” is comprised of the networks of relationships and associations formed by individuals and in which they interact for various fulfillments of human happiness and well-being.
  • The purpose of government in the classical liberal or libertarian perspective is to assure the security and protection from private plunder and violence that would disrupt or disturb the peaceful pursuits that individuals find it useful and enjoyable and fulfilling to follow through various and diverse associations of civil society.
  • Furthermore, the interventionist-welfare state undermines people’s personal and financial ability to participate in those acts and associations of benevolence towards others that they are called by their conscience to pursue in the ways they consider best and most likely of success. The redistributive state arrogantly replaces each person’s personal judgment and decision with that of the self-appointing “experts” who claim to speak and know best for society through the coercive arm of government.
  • Matching these ethical issues of the rights of the individual to live and act peacefully for himself as he sees best, the “progressive” often demonstrates a blinding degree of ignorance and misinformation about the workings of a competitive market economy, the nature of the profit and loss system, and the “invisible hand” of competitive cooperation through the peaceful and the voluntarist pursuit of self-interest. He suffers from a confused, garbled, and contradictory grab bag of ideas derived from Marxism, Fabian socialism, nationalism, fascism, and, though it would be radically and vehemently denied, often-subtle forms of racism, as well.
  • Through all the progressive’s rhetoric about “democracy” and “equality” and “social justice” and “diversity,” theirs is a political philosophy and public policy ideology of elitism, hubris, and authoritarianism dominated by the idea and ideal of remaking human beings, human relationships and the structure and order of society into redesigned patterns and shapes that reflect their notion of how people should live, work, associate and earn a living.
  •  
    "Conflicting Meanings of Freedom For a classical liberal, freedom means that each individual possesses as a human being certain inviolable rights, those being rights to his life, liberty and honestly acquired property. And that human relationships should be based on voluntary consent and mutual agreement. For my interlocutor, freedom means "empowerment" or the ability to do or achieve certain things, without which "freedom" is not complete. These include a minimum or "decent" standard of living and the ability to attain certain potentials in life, which are everyone's "right" as a member of society. For my fellow conversationalist, society is a shared "community" of human beings each of whom owes certain things to the others, just as the others owe certain things to us. Society might be viewed as an extended family, from this perspective, all the members of which have certain required obligations to support and give assistance to their social "relatives." I suggested that society is a network of human relationships formed between individuals based upon opportunities for mutual betterment, including both the economic and the cultural in the widest sense, the fundamental foundation of which derives from those essential individual rights. The "Social Contract": Individualist or Collectivist? My dinner companion raised the issue of "the social contract," to which we are all participants and benefactors, he said. He referenced the famous French eighteenth century philosopher, Jean-Jacque Rousseau, who reasoned that man began as savages in the wild threatened by both beast and other men. Everyone entered into a social contract and formed society for mutual safety and betterment by giving up a portion of their complete and unrestrained "freedom" in that earlier setting of savagery for the order and security of shared community. The freedom given up is compensated by safety and the security of mutual aid, including the modern welf
Paul Merrell

Noam Chomsky ; "Most of the World is Just Collapsing in Laughter" on Claims that Russia... - 0 views

  • Gibbs: One of the surprises of the post-Cold War era is the persistence of the North Atlantic Treaty Organization and other US-led alliances. These alliances were created during the Cold War mainly or exclusively for containing the claimed Soviet threat. In 1991, the USSR disappeared from the map, but the anti-Soviet alliance systems persisted and in fact expanded. How do we account for the persistence and expansion of NATO? What in your view is the purpose of NATO after the Cold War? Chomsky: We have official answers to that. It’s a very interesting question, which I was planning to talk about but didn’t have time. So thanks. It’s a very interesting question. For fifty years, we heard NATO is necessary to save Western Europe from the Russian hordes, you know the slave state, stuff I was taking about. In 1990-91, no Russian hordes. Okay, what happens? Well there are actually visions of the future system that were presented. One was Gorbachev. He called for a Eurasian security system, with no military blocs. He called it a Common European Home. No military blocs, no Warsaw Pact, no NATO, with centers of power in Brussels, Moscow, Ankara, maybe Vladivostok, other places. Just an integrated security system with no conflicts. That was one. Now the other vision was presented by George Bush, this is the “statesman,” Bush I and James Baker his secretary of state. There’s very good scholarship on this incidentally. We really know a lot about what happened, now that all the documents are out. Gorbachev said that he would agree to the unification of Germany, and even adherence of Germany to NATO, which was quite a concession, if NATO didn’t move to East Germany. And Bush and Baker promised verbally, that’s critical, verbally that NATO would not expand “one inch to the east,” which meant East Germany. Nobody was talking about anything farther at the time. They would not expand one inch to the east. Now that was a verbal promise. It was never written. NATO immediately expanded to East Germany. Gorbachev complained. He was told look, there’s nothing on paper. People didn’t actually say it but the implication was look, if you are dumb enough to take faith in a gentleman’s agreement with us, that’s your problem. NATO expanded to East Germany. There’s very interesting work, if you want to look into it by a young scholar in Texas named Joshua Shifrinson, it appeared in International Security, which is one of the prestige journals, published by MIT.4 He goes through the documentary record very carefully and he makes a pretty convincing case that Bush and Baker were purposely deceiving Gorbachev. The scholarship has been divided on that, maybe they just weren’t clear or something. But if you read it, I think it’s quite a convincing case, that they were purposely setting it up to deceive Gorbachev.
  • Okay, NATO expanded to East Berlin and East Germany. Under Clinton NATO expanded further, to the former Russian satellites. In 2008 NATO formally made an offer to Ukraine to join NATO. That’s unbelievable. I mean, Ukraine is the geopolitical heartland of Russian concern, quite aside from historical connections, population and so on. Right at the beginning of all of this, serious senior statesmen, people like Kennan for example and others warned that the expansion of NATO to the east is going to cause a disaster.5 I mean, it’s like having the Warsaw Pact on the Mexican border. It’s inconceivable. And others, senior people warned about this, but policymakers didn’t care. Just go ahead. Right now, where do we stand? Well right at the Russian border, both sides have been taking provocative actions, both sides are building up military forces. NATO forces are carrying out maneuvers hundreds of yards from the Russian border, the Russian jets are buzzing American jets. Anything could blow up in a minute. In a minute, you know. Any incident could instantly blow up. Both sides are modernizing and increasing their military systems, including nuclear systems. So what’s the purpose of NATO? Well actually we have an official answer. It isn’t publicized much, but a couple of years ago, the secretary-general of NATO made a formal statement explaining the purpose of NATO in the post-Cold War world is to control global energy systems, pipelines, and sea lanes. That means it’s a global system and of course he didn’t say it, it’s an intervention force under US command, as we’ve seen in case after case. So that’s NATO. So what happened to the years of defending Europe from the Russian hordes? Well, you can go back to NSC-68,6 and see how serious that was. So that’s what we’re living with.
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Gary Edwards

The Declaration of Independence Affirms Unalienable Property Rights - 1 views

  •  
    I needed some background regarding the founding documents and their position on individual property rights.  Google came back with this gem!   The basic argument i'm pursuing is that socialism is unconstitutional because it's based on the selective seizure and redistribution of wealth.  Meaning, not all citizens are equal before the law.  The complaints lodged against King George in the Declaration of Independence are very much about the colonist not having the same rights of Englishmen as those whom the King favors. excerpt: the purpose of the Declaration of Independence. "Not to find out new principles, or new arguments, never before thought of, not merely to say things which had never been said before; but to place before mankind the common sense of the subject . . . ."1 The "common sense of the subject" expressed in the Declaration of Independence was that a national civil government must be based upon the "Laws of Nature and of Nature's God." The laws of nature and of nature's God dictate that all men are equally endowed by their Creator with unalienable rights to "Life, Liberty and the pursuit of Happiness." In Jefferson's day, the common sense of the subject was that the pursuit of happiness included the unalienable right of the individual to acquire, possess, protect and dispose of property. Because the purpose of civil governments was to secure unalienable rights, violations of one's unalienable right of property were subject to civil sanction. Today, however, the common sense of the subject is quite the opposite. The modern idea is that civil government properly possesses all power over all subjects of property. Any rights that may exist are derived from the civil government. Any rights to property that a person has may be regulated, limited or revoked by the civil government in order to satisfy the "public interest." Some have advocated that there are no such things as rights, but merely social duties. There is a clear distinction betwee
Paul Merrell

S/RES/487 (1981) of 19 June 1981 - 0 views

  • Resolution 487 (1981) Adopted by the Security Council at its 2288th meeting on 19 June 1981 The Security Council, Having considered the agenda contained in document S/Agenda/2280, Having noted the contents of the telegram dated 8 June 1981 from the Foreign Minister of Iraq (S/14509), Having heard the statements made to the Council on the subject at its 2280th through 2288th meetings, Taking note of the statement made by the Director-General of the International Atomic Emergency Agency (IAEA) to the Agency's Board of Governors on the subject on 9 June 1981 and his statement to the Council at its 2288th meeting on 19 June 1981,
  • Further taking note of the resolution adopted by the Board of Governors of the IAEA on 12 June 1981 on the "military attack on the Iraq nuclear research centre and its implications for the Agency" (S/14532), Fully aware of the fact that Iraq has been a party to the Treaty on the Non-Proliferation of Nuclear Weapons since it came into force in 1970, that in accordance with that Treaty Iraq has accepted IAEA safeguards on all its nuclear activities, and that the Agency has testified that these safeguards have been satisfactorily applied to date, Noting furthermore that Israel has not adhered to the non-proliferation Treaty, Deeply concerned about the danger to international peace and security created by the premeditated Israeli air attack on Iraqi nuclear installations on 7 June 1981, which could at any time explode the situation in the area, with grave consequences for the vital interests of all States,
  • Considering that, under the terms of Article 2, paragraph 4, of the Charter of the United Nations: "All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any State, or in any other manner inconsistent with the purposes of the United Nations", 1. Strongly condemns the military attack by Israel in clear violation of the Charter of the United Nations and the norms of international conduct; 2. Calls upon Israel to refrain in the future from any such acts or threats thereof; 3. Further considers that the said attack constitutes a serious threat to the entire IAEA safeguards regime which is the foundation of the non-proliferation Treaty;
  • ...1 more annotation...
  • 4. Fully recognizes the inalienable sovereign right of Iraq, and all other States, especially the developing countries, to establish programmes of technological and nuclear development to develop their economy and industry for peaceful purposes in accordance with their present and future needs and consistent with the internationally accepted objectives of preventing nuclear-weapons proliferation; 5. Calls upon Israel urgently to place its nuclear facilities under IAEA safeguards; 6. Considers that Iraq is entitled to appropriate redress for the destruction it has suffered, responsibility for which has been acknowledged by Israel; 7. Requests the Secretary-General to keep the Security Council regularly informed of the implementation of this resolutio
  •  
    In 1981, an Israeli air strike destroyed a nuclear reactor under construction in Iraq. http://en.wikipedia.org/wiki/Osirak The UN Security Council, where the U.S. had and has veto power, promptly issued Resolution 487 condemning Israel for violation of the U.N. Charter provision forbidding the use of force against the territorial integrity of another nation. The resolution also recognized Iraq and all other nations' right to nuclear development for peaceful purposes. Israel was instructed to never do such things in the future. Yet here we stand today with both Israel and the U.S. threatening military strikes against Iran's nuclear facilities.   
  •  
    But our Constitution commands in article VI: "This Constitution, and the laws of the United States which shall be made in pursuance thereof; *and all treaties made, or which shall be made, under the authority of the United States, shall be the supreme law of the land;* and the judges in every state shall be bound thereby, anything in the Constitution or laws of any State to the contrary notwithstanding,"  Thus, because the U.S. is still a member of the U.N. Treaty, our Constitution commands that we obey that Treaty and its prohibition against unilateral use of force. There is no applicable exception to the Treaty that would permit the U.S. or Israel to mount an attack on the Iranian nuclear facilities. Thus there is no such exception to the Constitution.
Gary Edwards

Three Schools of Economic Wizardry | The Rugged Individualist - 0 views

  •  
    Exceellent repub of Mike Shedlock's wonderful article describing the 3 Schools of Economic Wizardry.  Includes a simplified but exacting view of the "why and how"  the Keynesian and Monetarist Wizardry Schools wreck havoc on the world.   ... Keynesian Voodoo Wizards ... Monetarist Voodoo Wizards ... Austrian Realists Remember the voodoo motto: "If it doesn't work, keep doing more of it, even if that is what got you in trouble in the first place!" ..... Excerpt: Once upon a time (today), in a land not so far away (USA), there lived a trio of economic wizards (economists), whose names shall remain anonymous (Paul Krugman, Greg Mankiw, Ben Bernanke). A fourth wizard, Murry Rothbard, is no longer among the living but resides in the netherworld. The above wizards seldom agree with each other because they come from competing schools of wizardry. Three Schools of Economic Wizardry 1. Keynesian School of Fiscal Voodoo and Witchcraft 2. Monetarist School of Monetary Voodoo and Witchcraft 3. Austrian School of Sound Money, Sound Economic Principles and Common Sense. "Dark Arts" Wizardry The first two wizardry schools belong to a class of wizardry promoted to aspiring wizards as the "Dark Arts." Philosophical Beliefs Keynesian wizards believe governments can spend their way to economic health and although fiscal deficits may matter at some point in time, they never matter now, in practice. Monetarist wizards believe money will cure any and every problem if enough is dropped from helicopters and interest rates held low. Austrian wizards believe that economic problems are created by unsound money, haphazard loans, excessive debts, and government manipulations. Keynesian and Monetarist wizards believe in the voodoo principle "the problem is the solution if only you do more of it." The former relies primarily on fiscal voodoo; the latter relies primarily on monetary voodoo. Austrian wizards do not believe "the problem is the solution," no matter ho
Gary Edwards

Have a T-P Pre-Primary to avoid sure defeat // Implement a drive to recruit and organiz... - 1 views

  •  
    "This discussion needs your direct support or direct critique that I might respond.  Other idea's please start in a new discussion (note: this has been revised after 400+ comments, but if possible read all of them) thank you for your time: (revised July 20th,'13) I thought it would be helpful (stike that, it's absolutely imperative!!!!)  to have a T Party pre-primary prior to the RINO primary so we wouldn't split our vote.  That thread sort of grew to the following two steps: The following two step approach would require a temporary meeting of the minds from the various larger conservative Tea Party factions for the following purposes:: 1. Having a pre-primary to avoid the late RINO primary so we avoid splitting our vote and being able to get out there now to campaign because we have some serious hills to climb (our message, government news and funding etc.). But the main point here is that we always split our votes in the regular RINO primary, we need to avoid this.  We need some sort of (temporary or other) unified effort of all the un-unified groups for this purpose.  Make sure you don't miss a word utilized here and that the whole 'idea' is understood.  Along with this we also need to have the above bonded with the following item number 2, as follows: 2. Implement a plan to organize and recruit deep into every precinct of the T-Party. This would include the larger T-P groups to supply their associated local smaller groups with solid information to be distributed and used as a means to educate both door to door and if possible via ads in their local news papers when feasible. (with an increase in some recruiting, this can work - I've checked out the cost). We have great web sites on the internet but many republican's, democrats and independents don't go there.  We need a serious ground team for all of our upcoming elections.  Many of our small groups are getting smaller and many not associated would like to be contacted by us.  Our idea's
Gary Edwards

Revealed: Obama's Immense Shadow Army & Its Shocking Takeover Plan - 1 views

  •  
    Is the ObamaCare train wreck a wreck by design? Another notch in the Bankster belt marking another step in the bankrupting of America? Revealed: Obama's Immense Shadow Army & Its Shocking Takeover Plan October 26, 2013  //  By: Eric Odom  //   The ObamaCare train wreck - it's awful, possibly purposeful, certainly useful for team Obama and its growing army of community activists and organizers. In a previous report, we explored the question, "What if the ObamaCare debacle is really a diversion, using a military term a "feint" - a tactical distraction to draw our attention, our focus and our fire away from the real point of attack on liberty?" Remember that horrible train wreck in Spain not long ago, captured on video? As tragic as it was, watching the crash and its gruesome aftermath was almost irresistible, wasn't it? Well, what if the disastrous rollout of the President's signature legislative achievement - what if this spectacular slow motion ObamaCare train wreck has been and is being allowed to happen so that what's going on around the bend from the fiery crash site gets little attention, from the public, from the media or from Congressional investigators? Think about it, friends. How could Barack Obama and his celebrated team of incredibly proficient, plugged in techies - the team that twice got him elected - be behind the utterly disastrous launch of the ObamaCare online storefront, healthcare.gov - arguably the biggest website failure in history? How could so much money have been spent to produce such a problem-plagued site that apparently was doomed in its developmental confusion? And how to fix this monumental mess, well, there doesn't seem to be any clear plan…other than hope. And now we learn that many, if not most, of the people actually signing up for ObamaCare through the website are enrolling in Medicaid, not signing up for private insurance policies they pay for, but adding their names onto government roll
  •  
    There is no doubt in my mind that corporations (and their Chamber of Commerce boot licking lackys) believe that employer provided healthcare benefits was a HUGE MISTAKE. The key feature of ObamaCare is that of ENDING the HMO-Employee Healthcare profit draining quagmire these corporations somehow stumbled into. (Hint: they traded healthcare benefits for wide open government assisted Globalization - the new world order Merchantilism). IMHO, the insurance companies know full well that the entire HMO-Employee Healthcare bandwagon is going to end. Not because of socialism; because of profit hungry out of control mercantilism. So they are trying to cut the best deal possible with the government. The merchantilist doesn't care that their employees are going to suffer. They only care that this cost and the blame for losing the benefit is moved from their books to the government. Nor does the merchantilist care about protecting our borders. They want cheap labor. Even if the social cost of that cheap labor lands on the government and destroys the nation. That's why the merchantilist and his Bankster financiers support Open Borders. The merchantilist could care less about the trade deficit and the massive transfer of American manufacturing jobs overseas. As long as they can sell their junk back into the USA market without a 33% import tax these bastardos are happy to destroy their country. I wonder whose army and navy will secure their investments when the USA no longer can? Are their private armies enough? Just wondering.
Paul Merrell

New Intel Doc: Do Not Be 'Led Astray' By 'Commonly Understood Definitions' - The Intercept - 0 views

  • New evidence of the intelligence community’s intentionally deceptive use of the English language was released today in the form of a Defense Intelligence Agency document that instructs analysts to use words that do not mean what they appear to mean. The section of the DIA’s “intelligence law handbook” on the “Collection of Information about United States Persons” opens like this: To begin the journey, it is necessary to stop first and adjust your vocabulary. The terms and words used in DoD 5240.1-R have very specific meanings, and it is often the case that one can be led astray by relying on the generic or commonly understood definitions of a particular word. DoD 5240.1-R — entitled “Procedures Governing the Activities of DOD Intelligence Components that Affect United States Persons” – is the Department of Defense document that implements Executive Order 12333, the unilateral presidential directive first signed by President Reagan that authorizes government agencies to covertly sweep up vast amounts of private data from overseas communications. The plainspoken employee handbook was one several documents about Executive Order 12333 the ACLU obtained through a Freedom of Information Act lawsuit and released today. See also today’s Intercept story: “The Ghost of Ronald Reagan Authorizes Most NSA Spying”
  • Here is the handbook explaining how not to be led astray: For example, “collection of information” is defined in the Dictionary of the United States Army Terms (AR 310- 25) as: “The process of gathering information for all available sources and agencies. ” But, for the purposes of DoD 5240 .1-R, information is “collected” – only when it has been received for use by an employee of a DoD intelligence component in the course of his official duties… (and) an employee takes some affirmative action that demonstrates an intent to use or retain the information. So, we see that “collection of information” for DoD 5240.1-R purposes is more than “gathering” – it could be described as “gathering, plus … “. For the purposes of DoD 5240.1-R, “collection” is officially gathering or receiving information, plus an affirmative act in the direction of use or retention of that information.
  • For good measure, there’s this footnote: In addition, data acquired by electronic means is “collected” only when it is processed into intelligible form…;What constitutes an intelligible form may be somewhat problematic. Analysts can even gather information and keep it for up to six months without it counting as having been “collected”, as long as it’s being “held or forwarded to a supervisory authority, solely for the purpose of making a determination about its collectability.” Although the intelligence community’s astonishing abuse of words has been frequently noted, particularly in the context of surveillance, this may be the first time we’ve actually seen an instruction manual.
  • ...1 more annotation...
  • And as it happens, it comes right in the middle of a couple pieces I’m writing about another linguistic perversion, the non-denial denial. (My exegesis of CIA director John Brennan’s latest ran on Friday; more examples from recent history should be out tomorrow.) The intelligence community’s redefinition of terms inspired the ACLU’s Jameel Jaffer and Brett Max Kaufman last year to author a ”lexicon for decoding the true meaning of what NSA officials say” which includes nifty non-intuitive recastings of terms such as surveillance, relevant, targeted, incidental and inadvertent. There’s also a “Guide to the Deceptions, Misinformation, and Word Games Officials Use to Mislead the Public About NSA Surveillance” that Trevor Timm wrote for the Electronic Frontier Foundation, and Mike Masnick’s more tongue in check “NSA-To-English Dictionary” from Techdirt.
Paul Merrell

Use of US Armed Forces Abroad, 1798-2014, and More from CRS - 0 views

  • Noteworthy new products of the Congressional Research Service that Congress has withheld from online public distribution include the following. Instances of Use of United States Armed Forces Abroad, 1798-2014, September 15, 2014
  • Proposed Train and Equip Authorities for Syria: In Brief, September 16, 2014
  • The No Fly List: Procedural Due Process and Hurdles to Litigation, September 18, 2014
  •  
    This report lists hundreds of instances in which the United States has used its Armed Forces abroad in situations of military conflict or potential conflict or for other than normal peacetime purposes. It was compiled in part from various older lists and is intended primarily to provide a rough survey of past U.S. military ventures abroad, without reference to the magnitude of the given instance noted. The listing often contains references, especially from 1980 forward, to continuing military deployments, especially U.S. military participation in multinational operations associated with NATO or the United Nations. Most of these post-1980 instances are summaries based on presidential reports to Congress related to the War Powers Resolution. A comprehensive commentary regarding any of the instances listed is not undertaken here. The instances differ greatly in number of forces, purpose, extent of hostilities, and legal authorization. Eleven times in its history the United States has formally declared war against foreign nations. These 11 U.S. war declarations encompassed 5 separate wars: the war with Great Britain declared in 1812; the war with Mexico declared in 1846; the war with Spain declared in 1898; the First World War, during which the United States declared war with Germany and with Austria-Hungary during 1917; and World War II, during which the United States declared war against Japan, Germany, and Italy in 1941, and against Bulgaria, Hungary, and Rumania in 1942.  Some of the instances were extended military engagements that might be considered undeclared wars. These include the Undeclared Naval War with France from 1798 to 1800; the First Barbary War from 1801 to 1805; the Second Barbary War of 1815; the Korean War of 1950-1953; the Vietnam War from 1964 to 1973; the Persian Gulf War of 1991; global actions against foreign terrorists after the September 11, 2001, attacks on the United States; and the war with Iraq in 2003. With the exception of
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

U.S. is Responsible for the Ebola Outbreak in West Africa: Liberian Scientist | Global ... - 0 views

  • Dr. Cyril Broderick, A Liberian scientist and a former professor of Plant Pathology at the University of Liberia’s College of Agriculture and Forestry says the West, particularly the U.S. is responsible for the Ebola outbreak in West Africa. Dr. Broderick claims the following in an exclusive article published in the Daily Observer based in Monrovia, Liberia. He wrote the following: The US Department of Defense (DoD) is funding Ebola trials on humans, trials which started just weeks before the Ebola outbreak in Guinea and Sierra Leone. The reports continue and state that the DoD gave a contract worth $140 million dollars to Tekmira, a Canadian pharmaceutical company, to conduct Ebola research. This research work involved injecting and infusing healthy humans with the deadly Ebola virus. Hence, the DoD is listed as a collaborator in a “First in Human” Ebola clinical trial (NCT02041715, which started in January 2014 shortly before an Ebola epidemic was declared in West Africa in March.
  • Is it possible that the United States Department of Defense (DOD) and other Western countries are directly responsible for infecting Africans with the Ebola virus? Dr. Broderick claims that the U.S. government has a research laboratory located in a town called Kenema in Sierra Leone that studies what he calls “viral fever bioterrorism”, It is also the town where he acknowledges that is the “epicentre of the Ebola outbreak in West Africa.” Is it a fact? Is Dr. Broderick a conspiracy theorist? He says that “there is urgent need for affirmative action in protecting the less affluent of poorer countries, especially African citizens, whose countries are not as scientifically and industrially endowed as the United States and most Western countries, sources of most viral or bacterial GMOs that are strategically designed as biological weapons.” He also asks an important question when he says “It is most disturbing that the U. S. Government has been operating a viral hemorrhagic fever bioterrorism research laboratory in Sierra Leone. Are there others?”
  • Dr. Broderick summarized what average people can do to prevent governments, especially those from the West from creating and exposing populations from diseases they experiment with in laboratories: The challenge is global, and we request assistance from everywhere, including China, Japan, Australia, India, Germany, Italy, and even kind-hearted people in the U.S., France, the U.K., Russia, Korea, Saudi Arabia, and anywhere else whose desire is to help. The situation is bleaker than we on the outside can imagine, and we must provide assistance however we can. To ensure a future that has less of this kind of drama, it is important that we now demand that our leaders and governments be honest, transparent, fair, and productively engaged. They must answer to the people. Please stand up to stop Ebola testing and the spread of this dastardly disease.
  • ...1 more annotation...
  • After Guatemala’s ordeal with the U.S. government who deliberately infected people with syphilis, West African nations should be extremely skeptical about the U.S. government’s actions combating Ebola. Professor Francis Boyle of the University of Illinois, College of Law questions the Obama administration’s actions in West Africa. RIA Novosti recently interviewed Boyle and he said the following: US government agencies have a long history of carrying out allegedly defensive biological warfare research at labs in Liberia and Sierra Leone. This includes the Centers for Disease Control and Prevention (CDC), which is now the point agency for managing the Ebola spill-over into the US,” Prof. Francis Boyle said. Why has the Obama administration dispatched troops to Liberia when they have no training to provide medical treatment to dying Africans? How did Zaire/Ebola get to West Africa from about 3,500km away from where it was first identified in 1976?” That’s a good question for Washington, but would the public get any answers? Not anytime soon, since it took more than 62 years for the  Guatemala syphilis experiments to be exposed to the public, not by the US government, by a medical historian.
  •  
    Many years ago, there was a fairly large leak of U.S. Army Chemical, Bological, and Radiological Warfare Command documents that I used to have copies of. They left no doubt that ebola was one of the biological warfare agents the Ft. Detrick boys were playing with. Supposedly, the U.S. has since ceased all experimentation with such agents for offensive purposes, but still continues such research for defensive purposes. So, while I'd like to see more confirmation, this report is not beyond credibility to me. 
Gary Edwards

Security, the Edward Snowden Way - Datamation - 0 views

  • NoScript NoScript is a free extension for Mozilla-based web browsers, including Firefox. It blocks executable web content by default. This blocking includes JavaScript, Java, Flash and Silverlight. You can whitelist sites if you want to use such content on a site-by-site basis. Or, if you choose, you can make all sites active by default and choose to blacklist sites you think might be dangerous. A visual button tells you if active content has been blocked on the current site.
  • PGP In the first chapter of his book “No Place to Hide,” journalist Glenn Greenwald wrote that Edward Snowden contacted him using the alias “Cincinnatus,” and said he would tell Greenwald some highly newsworthy facts, but only if he installed Pretty Good Privacy (PGP) first. (Greenwald didn’t know the magnitude of the scoop being offered to him and didn’t get around to installing PGP for months, thus delaying the leak.) PGP, of course, is a 23-year-old encryption program that can be used for email, as well as files and other things.
  • Tor Tor is a free application that routes your Internet traffic through a global volunteer network of thousands of relays that play a shell game with your data so your location and Internet travels are concealed. Tor, which used to stand for “The Onion router” in a reference to layers of encryption, encrypts data in multiple layers that prevents snoops from being able to figure out any details about your web travels, such as where you are or what you’re looking at. Tor was developed in part by US government funding as a way to enable citizens in repressive countries to communicate safely. And the NSA has a lot of respect for it. But in a recent controversy, two Carnegie Mellon researchers said they would give a talk at the Black Hat USA 2014 conference next month telling how to identify Tor users inexpensively (for only $3,000). The session was cut from the lineup because university lawyers didn’t approve it. The institute that the researchers work for is funded by the Pentagon, but the Department of Homeland Security said they did not request that the talk be cancelled.
  •  
    "Whether you think NSA whistleblower Edward Snowden is a hero or a traitor, you have to admit: The guy knows how to keep his information secure. The fact that Snowden isn't sitting in Guantanamo right now with ankle cuffs and a bag over his head demonstrates his ability to avoid detection. Snowden spoke at the Hope X conference in New York this month via a Google+ Hangout from Russia, and called on developers to build privacy and security into everyday products. He also hinted that he planned to work on building such technology. If you look into the details of what's been happening with tracking, surveillance, spying, hacking and global cyber industrial espionage, you can see that Snowden is right. We all need a lot better protection from snoops of all stripes. But how does the non-expert get started? One option is to listen to Snowden himself. Over the past year, Snowden has in one format or another, made specific product recommendations. Here are the products Snowden has explicitly recommended since the trove of documents on the NSA has been publicly revealed. (The list is in alphabetical order.) Ghostery Ghostery, made by a company called Evidon, is a browser extension for Chrome, Firefox, Safari and Internet Explorer. It exists for two purposes. The first is to block tracking code, which makes browsing the web both more private and also faster. The second purpose is, somewhat contradictory -- Evidon collects data from you to help advertisers avoid being blocked. It also enables website owners to gain insights into the tracking code deployed on their site by third-party advertising companies. Note that Snowden recommended Ghostery some time ago. But this month, the Electronic Frontier Foundation launched a competing product that I would imagine Snowden would recommend called Privacy Badger."
  •  
    I'd back Snowden in 2016 as a write-in candidate for President.
1 - 20 of 424 Next › Last »
Showing 20 items per page