Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching ""civil liberties"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Why the United States Always Loses Its Wars | Global Research - 0 views

  • America loses all its wars because it seems we’ve always been on the wrong side of history. Morally nor legally should any nation have the right to invade and occupy another sovereign nation, much less believe it can achieve victory in long, protracted wars. Yet in violation of all ethical precepts and all international laws, the sole global superpower citing its impunity through exceptionalism hypocritically insists it can maintain its moral high ground in its relentless pursuit of regime changes anywhere it so chooses on earth. We are the global village bully that’s hated by much of the world. And it’s pure self-aggrandizing bullshit to perpetrate the myth that America is hated because of our “freedom,” another rhetorical brainwashing lie. We now live in a fascist totalitarian police state run by a globalized crime syndicate of the central banking cabal. As of last April per a Princeton-Northwestern study the US has officially been designated an oligarchy. Last year after a group of ethnic Russians living in Crimea voted to become part of Russia, the Russian military claimed control over its own naval base there that the US-NATO had been lusting to steal after the unlawful overthrow of Ukraine’s democratically elected sovereign government. Ever since it’s been nonstop lies and propaganda propagated to demonize Putin as the aggressor when in fact all along it’s the American Empire that’s been recklessly pushing what could end up World War III against nuclear powered Russia. With US-NATO missiles installed on Russia’s doorstep in virtually every former Soviet eastern bloc nation, hemming Russia in, who’s really the aggressor here?
  • Meanwhile, despite costing US taxpayers up to six trillion dollars and counting in Iraq alone and another trillion so far in Afghanistan in this age of increasing austerity, the albeit detached reverence for the US military and its abysmal losing war record fail to draw much notice or reflection, much less any real criticism or troubleshooting that might correct the same pattern of mistakes being repeated indefinitely. Another article in the same issue calls for resurrecting the draft as the feeble answer, something my ex-West Point roommate-former Afghan Ambassador-retired general and current Council on Foreign Relations (CFR) member Karl Eikenberry has also publicly advocated. They are all missing the point, unwilling or unable to address the pink elephant in the global room. Respected author-activist David Swanson wrote an incisive rebuttal also confronting the Atlantic article for not answering the obvious question of why America loses at war. He makes the excellent point: The U.S. has killed huge numbers of men, women, and children, made itself hated, made the world more dangerous, destroyed the environment, discarded civil liberties, and wasted trillions of dollars that could have done a world of good spent otherwise. A draft would do nothing to make people aware of that situation. But Swanson merely glides over as a passing fact that the ruling elite is the only entity that stands to gain from war. He fails to emphasize that it is the elite’s power, money and influence that both initiates, but then by calculated design, willfully sabotages the chance of any US military victory after World War II. The reason is simple. If the US triumphed in war it would only delay the totalitarian New World Order from materialization. Only a weakened United States would expeditiously promote a one world government.
  • As a brief historical review tracing events from the dawn of the twentieth century, media mogul Randolph Hearst used the false flag of the Spanish American War to “remember the USS Maine” sinking in the 1898 Havana harbor as its deceitful justification to ruthlessly, violently colonize Cuba and the Philippines, committing ethnic cleansing with estimates as high as near a half million dead Filipinos in that bloodbath. Then it was the “great” English statesman Winston Churchill who plotted the sinking of the Lusitania killing nearly 1200 of his own British citizens (along with 128 Americans) as the baited sacrifice secretly carrying arms to ignite the First World War that was supposed to end all wars.
  • ...6 more annotations...
  • Then several years later the US encouraged South Korean incursions into Communist North Korea in order to manipulate North Korea into responding in kind. Guaranteeing South Korea full UN support, when the baited North Koreans retaliated by moving two miles inside the South Korean border, that June 1950 “transgression” immediately became the false pretense used to initiate the Korean War.
  • in August 1964 President Johnson lied to the American people with the bogus claim that a US Navy ship was attacked by North Vietnamese gunboats in the Gulf of Tonkin to launch America’s longest running war in history (that is until this century’s everlasting war of terror). That false flag cost near 60,000 American lives and over 3 million dead Southeast Asians, in addition to being the first US humiliating war defeat in its history, marking the first of many consecutive losses.
  • The smaller, less intensive military campaigns of Grenada, Panama, Nicaragua and El Salvador, the First Gulf War, Haiti, Bosnia and Kosovo were all jingoistic saber rattling manipulations of imperialistic Empire overpowering far weaker opponents to take down former US allied dictators (or in the case of Saddam Hussein a preliminary step to the father-son neocon tag team), balkanizing a divide and conquer strategy for global hegemony and imperial war profiteering from the always lucrative drug trafficking trade.
  • Meanwhile, the only true winners of all wars is the oligarch owned and controlled central banking cabal and its Wall Street 500. Once American Empire wreaks military havoc to achieve another ravaged failed state, be it Afghanistan, Iraq, Libya, Somalia, Yemen, a second invasion that becomes the permanent occupation arrives in the form of IMF and World Bank loans. When the war destroyed nation cannot pay the bankster cabal’s loan shark extortion, privatization through transnational corporations rapidly descends as economic hit men-vultures move in for the final kill. The game’s been rigged, set up so no one but the filthy, gluttonous, bloodthirsty, psychopathic vampires comprising the ruling elite can possibly win from all this rigged warring death and destruction.
  • The Zionist neocon creation with a little help from their Saudi-Israeli evil axis friends pulled off the coup of the century on 9/11, massacring 3,000 Americans as their sacrificial lambs, setting into motion the fabricated war on terror masking their actual war on Islam to ensure that a constant fresh supply of made-by-the-USA enemy materializes to justify permanent global violence. During the near ten years that Americans fought in Iraq near a half million Iraqis lost their life, mostly innocent civilians. That toll has only since risen with war still raging. The Islamic State jihadists that the US-Saudi-Israeli unholy alliance secretly created, trained, armed and has funded (just as it did al Qaeda for decades) invaded Iraq last June and is currently in control of more area in Iraq than the weak US puppet government in Baghdad with no end of sectarian violence in sight. Afghanistan looks no better with the puppet Kabul government holding less territory than the surging Taliban that has been waiting for the US military exodus by December 2014 leaving 10,800 US military advisors still remaining behind.
  • The proxy wars leaving Libya as a corrupt and lawlessly violent failed state and Syria a stalemated quagmire with Islamic State mercenaries our not-so-secret friendly boots on the ground still unable to topple and remove Assad from power. Meanwhile, near a quarter of a million people have died in the war in Syria and an astounding 6.5 million have been displaced in that colossal human tragedy supported and caused by the United States.
Paul Merrell

'A Line in the Sand' in Fight to Release Thousands of Photos of Prisoner Abuse - The Intercept - 0 views

  • A federal judge is demanding that the government explain, photo-by-photo, why it can’t release hundreds, and perhaps thousands, of pictures showing detainee abuse by U.S. forces at military prison sites in Iraq and Afghanistan. In a courtroom in the Southern District of New York yesterday, Judge Alvin Hellerstein appeared skeptical of the government’s argument, which asserted that the threat of the Islamic State and Al Qaeda exploiting the images for propaganda should override the public’s right to see any of the photos. He was “highly suspicious” of the government’s attempt to declare the whole lot of the photos dangerous. “It’s too easy and too meaningless,” he said. Since 2004, the American Civil Liberties Union has been fighting for the release of photos from military investigations into prisoner abuse beyond those that were leaked from Abu Ghraib. The additional pictures reportedly show sexual assault, soldiers posing with dead bodies, and other offenses. The exact number of photos has not been disclosed in court, though former Senator Joe Lieberman has previously said that there are nearly 2,100.
  • Hellerstein first ordered the government to hand over a subset of the pictures in 2005. President Obama decided to release them in 2009, but Iraqi Prime Minister Nouri al-Maliki and the top American general in Iraq implored him not to. Congress then passed a law amending the Freedom of Information Act to allow the Secretary of Defense to certify that publishing the pictures could put American lives at risk, which then-secretary Robert Gates did. The ACLU continued to fight the issue in court, and last August, Hellerstein ordered that the government needed to justify withholding each picture individually.
Paul Merrell

State department designates German rapper turned Islamic State 'operative' - The Long War Journal - 0 views

  • The State Department announced today that Denis Cuspert, a German member of the Islamic State, has been added to the US government's list of specially designated global terrorists. Cuspert previously performed as a rapper, going by the name of Deso Dogg, and even briefly toured with the popular American performer known as DMX. Some of Cuspert's music is still available for purchase in the US and elsewhere online. However, State explains that as a result of his designation as a terrorist "all property subject to US jurisdiction in which Cuspert has any interest is blocked and US persons are prohibited from engaging in transactions with him or to his benefit." US citizens cannot, therefore, legally purchase his rap songs online if he receives proceeds from the sale. According to State, Cuspert is "a foreign terrorist fighter and operative for ISIL," or the Islamic State of Iraq and the Levant. (The group calls itself the Islamic State, but the US government refers to it by the acronym of its previous name, or ISIL.) "Cuspert joined ISIL in 2012 and has appeared in numerous videos on its behalf, the most recent dating from early November, in which he appears holding a severed head he claims belongs to a man executed for opposing ISIL." Cuspert, who is 39 years old, "spent time in jail for various offensives" in Germany before traveling to Syria. He is still "wanted by the German government on suspicion of involvement in terrorist activities in his home country."
  • There has been some controversy over whether or not Cuspert is really alive. He has been reported dead in the past. Some of the confusion is owed to Cuspert's nom de guerre, Abu Talha al Almani, which has been used by other Islamic State jihadists, including one who was killed in Syria last year.
  •  
    There are some obvious first amendment issues with banning the purchase of music, magnified when the music carries a political message. Where, as here, the purpose is not to regulate speech but has an incidental effect on speech, the restriction will be upheld only "if it is within the constitutional power of the Government; if it furthers an important or substantial governmental interest; if the governmental interest is unrelated to the suppression of free expression; and if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that interest." United States v. O'Brien, 391 U.S. 367, 377 (U.S. 1968).  There is a strong argument here that the State Department is not using the least restrictive means of blocking Cuspert's income from sale of his music, i.e., the government could instead leavy against Cuspert's share of the revenue from the recording studio.  I presume that either the studio or citizens who wish to purchase Cuspert's music would have standing to mount such a legal challenge. The argument would basically be that the statute and regulation are overbroad as applied to activity protected by the First Amended. A First Amendment "as applied" challenge leaves the court with discretition to leave the statute and regualtion unchanged, but judicially create an exception. 
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Paul Merrell

European Parliament to investigate CIA's torture and rendition operations in EU | The Bureau of Investigative Journalism - 0 views

  • The European Parliament today voted to investigate the extent of the CIA’s detention, torture and rendition programme in EU countries. The decision comes two months after the US Senate intelligence committee published a redacted summary of its six year investigation into the CIA’s detention and interrogation programme. The European Parliament’s committees on civil liberties, foreign affairs and human rights previously investigated the CIA’s programme in 2006, and they will now resume their inquiry with new details from the Senate’s report. Passing today’s resolution, MEPs said the summary “reveals new facts that reinforce allegations that a number of EU member states… were complicit in the CIA’s secret detention and extraordinary rendition programme, sometimes through corrupt means based on substantial amounts of money provided by the CIA in exchange for their cooperation”. Romania, Poland and Lithuania are widely known to have hosted CIA black sites, along with those in Afghanistan, Thailand and Guantánamo Bay.
  • In the first case of its kind last July, the European Court of Human Rights considered whether Poland had been complicit in the detention and transport of two CIA detainees, Abu Zubaydah andAbd al-Rahim al-Nashiri.
  • The motion passed today also encouraged the release of the report in full, without “excessive and unnecessary” redactions. References to individual countries were redacted in the summary on grounds of national security. Today’s resolution was approved by 363 votes to 290, with 48 abstentions.
  • ...2 more annotations...
  • Poland’s complicity in CIA torture programme confirmed as European Court rejects Warsaw’s appeal
  • CIA torture report: An interactive timeline of who’s who in government January 30, 2015 by Gesbeen Mohammad An aid for people reading the Senate summary report and stories in this Bureau project.
  •  
    The Grand Chamber of the European Court of Human Rights just rejected Poland's request for reconsideration, ending the litigation. 
Paul Merrell

Jim Crow returns | Al Jazeera America - 0 views

  • Election officials in 27 states, most of them Republicans, have launched a program that threatens a massive purge of voters from the rolls. Millions, especially black, Hispanic and Asian-American voters, are at risk. Already, tens of thousands have been removed in at least one battleground state, and the numbers are expected to climb, according to a six-month-long, nationwide investigation by Al Jazeera America. At the heart of this voter-roll scrub is the Interstate Crosscheck program, which has generated a master list of nearly 7 million names. Officials say that these names represent legions of fraudsters who are not only registered but have actually voted in two or more states in the same election — a felony punishable by 2 to 10 years in prison. Until now, state elections officials have refused to turn over their Crosscheck lists, some on grounds that these voters are subject to criminal investigation. Now, for the first time, three states — Georgia, Virginia and Washington — have released their lists to Al Jazeera America, providing a total of just over 2 million names.
  • The Crosscheck list of suspected double voters has been compiled by matching names from roughly 110 million voter records from participating states. Interstate Crosscheck is the pet project of Kansas’ controversial Republican secretary of state, Kris Kobach, known for his crusade against voter fraud. The three states’ lists are heavily weighted with names such as Jackson, Garcia, Patel and Kim — ones common among minorities, who vote overwhelmingly Democratic. Indeed, fully 1 in 7 African-Americans in those 27 states, plus the state of Washington (which enrolled in Crosscheck but has decided not to utilize the results), are listed as under suspicion of having voted twice. This also applies to 1 in 8 Asian-Americans and 1 in 8 Hispanic voters. White voters too — 1 in 11 — are at risk of having their names scrubbed from the voter rolls, though not as vulnerable as minorities.If even a fraction of those names are blocked from voting or purged from voter rolls, it could alter the outcome of next week’s electoral battle for control of the U.S. Senate — and perhaps prove decisive in the 2016 presidential vote count.
  • Based on the Crosscheck lists, officials have begun the process of removing names from the rolls — beginning with 41,637 in Virginia alone. Yet the criteria used for matching these double voters are disturbingly inadequate.
  • ...8 more annotations...
  • In practice, all it takes to become a suspect is sharing a first and last name with a voter in another state. Typical “matches” identifying those who may have voted in both Georgia and Virginia include:Kevin Antonio Hayes of Durham, North Carolina, is a match for a man who voted in Alexandria, Virginia, as Kevin Thomas Hayes.John Paul Williams of Alexandria is supposedly the same man as John R. Williams of Atlanta, Georgia.Robert Dewey Cox of Marietta, Georgia is matched with Robert Glen Cox of Springfield, Virginia.
  • That was the sales pitch. But the actual lists show that not only are middle names commonly mismatched and suffix discrepancies ignored, even birthdates don’t seem to have been taken into account. Moreover, Crosscheck deliberately ignores Social Security mismatches, in the few instances when the numbers are even collected. The Crosscheck instructions for county election officers state, “Social Security numbers are included for verification; the numbers might or might not match.”
  • There are 6,951,484 names on the target list of the 28 states in the Crosscheck group; each of them represents a suspected double voter whose registration has now become subject to challenge and removal. According to a 2013 presentation by Kobach to the National Association of State Election Directors, the program is a highly sophisticated voter-fraud-detection system. The sample matches he showed his audience included the following criteria: first, last and middle name or initial; date of birth; suffixes; and Social Security number, or at least its last four digits.
  • Al Jazeera America visited these and several other potential double voters. John Paul Williams of Alexandria insists he has never used the alias “John R. Williams.” “I’ve never lived in Georgia,” he says.Jo Cox, wife of suspected double voter Robert Glen Cox of Virginia, says she has a solid alibi for him. Cox “is 85 years old and handicapped. He wasn’t in Georgia. Never voted there,” she says. He has also never used the middle name “Dewey.” Twenty-three percent of the names — nearly 1.6 million of them — lack matching middle names. “Jr.” and “Sr.” are ignored, potentially disenfranchising two generations in the same family. And, notably, of those who may have voted twice in the 2012 presidential election, 27 percent were listed as “inactive” voters, meaning that almost 1.9 million may not even have voted once in that race, according to Crosscheck’s own records.
  • Mark Swedlund is a specialist in list analytics whose clients have included eBay, AT&T and Nike. At Al Jazeera America’s request, he conducted a statistical review of Crosscheck’s three lists of suspected double voters. According to Swedlund, “It appears that Crosscheck does have inherent bias to over-selecting for potential scrutiny and purging voters from Asian, Hispanic and Black ethnic groups. In fact, the matching methodology, which presumes people in other states with the same name are matches, will always over-select from groups of people with common surnames.” Swedlund sums up the method for finding two-state voters — simply matching first and last name — as “ludicrous, just crazy.”
  • elen Butler is the executive director of Georgia’s Coalition for the Peoples’ Agenda, which conducts voter drives in minority communities. Any purge list that relies on name matches will contain a built-in racial bias against African-Americans, she says, because “We [African-Americans] took our slave owners’ names.” The search website PeopleSmart notes that 86,020 people in the United States have the name John Jackson. And according to the 2000 U.S. Census, which is the most recent data set, 53 percent of Jacksons are African-American.
  • In North Carolina, state officials have hired former FBI agent Charles W. “Chuck” Stuber, who played a major role in the campaign finance fraud case brought against former North Carolina Sen. John Edwards, to, in the words of their press release, “investigate cases of possible voter fraud identified by an interstate cross-check comparing election records from 28 states.”
  • But despite knowing the names and addresses of 192,207 supposed double voters in the state, Stuber has not nabbed a single one in his five months on the job. Josh Lawson, a spokesman for the board of elections, says, “This agency has made no determination as to which portion of these [lists] represent data error or voter fraud.” In fact, to date, Lawson admits that Stuber has found only errors and not one verified fraudulent voter.
Paul Merrell

Months After Appeals Argued, NSA Cases Twist in the Wind - US News - 0 views

  • Three cases that likely lay the groundwork for a major privacy battle at the U.S. Supreme Court are pending before federal appeals courts, whose judges are taking their time announcing whether they believe the dragnet collection of Americans' phone records is legal. It’s been more than five months since the American Civil Liberties Union argued against the National Security Agency program in New York, three months since legal activist Larry Klayman defended his thus far unprecedented preliminary injunction win in Washington, D.C., and two months since Idaho nurse Anna Smith’s case was heard by appeals judges in Seattle. At the district court level, judges handed down decisions about a month after oral arguments in the cases. It’s unclear what accounts for the delay. It’s possible judges are meticulously crafting opinions that are likely to receive wide coverage, or that members of the three-judge panels are clashing on the appropriate decision.
  • Attorneys involved in the cases understandably are reluctant to criticize the courts, but all express hope for speedy resolution of their fights against alleged violations of Americans’ Fourth Amendment rights.
  • Though it’s difficult to accurately predict court decisions based on oral arguments, opponents of the mass surveillance program may have reason for optimism.
  • ...1 more annotation...
  • Two executive branch review panels have found the dragnet phone program has had minimal value for catching terrorists, its stated purpose. After years of presiding over the collection and months of publicly defending it, President Barack Obama pivoted last year and asked Congress to pass legislation ending the program. A measure to do so failed last year.
Paul Merrell

Prison Dispatches from the War on Terror: Gitmo Detainee's Life an "Endless Horror Movie" - The Intercept - 0 views

  • Moath Hamza Ahmed al-Alwi, a Yemeni national who has been detained at the American prison facility at Guantánamo Bay since 2002, weighs only 98 pounds. Never charged with a crime, al-Alwi, now 35 years old, is one of many detainees at the camp who have gone on a prolonged hunger strike. As described in a recent petition submitted to the Inter-American Commission on Human Rights (IACHR) by his lawyers, al-Alwi’s mental and physical state is seriously deteriorating after two years on hunger strike, and subsequent force-feeding.  Since commencing his strike in February 2013, al-Alwi alleges that he has been subjected to escalating physical and psychological abuse from guards, as well as increasingly brutal force-feeding procedures administered by medical personnel at the camp. Human rights organizations have described the force-feeding procedure employed at Guantánamo as torture, and the U.S. government has fought to keep video footage of the force-feeding of al-Alwi and other hunger-striking detainees from public view.
  • Moath Hamza Ahmed al-Alwi, a Yemeni national who has been detained at the American prison facility at Guantánamo Bay since 2002, weighs only 98 pounds. Never charged with a crime, al-Alwi, now 35 years old, is one of many detainees at the camp who have gone on a prolonged hunger strike. As described in a recent petition submitted to the Inter-American Commission on Human Rights (IACHR) by his lawyers, al-Alwi’s mental and physical state is seriously deteriorating after two years on hunger strike, and subsequent force-feeding.  Since commencing his strike in February 2013, al-Alwi alleges that he has been subjected to escalating physical and psychological abuse from guards, as well as increasingly brutal force-feeding procedures administered by medical personnel at the camp. Human rights organizations have described the force-feeding procedure employed at Guantánamo as torture, and the U.S. government has fought to keep video footage of the force-feeding of al-Alwi and other hunger-striking detainees from public view
  • Al-Alwi, who has described his strike as “a form of peaceful protest against injustice,” has said that he will not resume eating until there is some sort of legal resolution to his case. Prison officials have responded to his hunger strike by placing him in solitary confinement, denying him access to prescribed medical items and subjecting him to extreme temperatures in his cell. 
  • ...4 more annotations...
  • According to the petition, al-Alwi’s nostril passages have now swelled shut due to the extra large tubes prison authorities have repeatedly forced down his nasal cavity during this feeding process. He also maintains that the force-feeding sessions have led to heavy vomiting and daily blood loss. Shackled to a chair for hours each day during the force-feeding sessions, al-Alwi now suffers severe back pain and other debilitating physical injuries. In his petition, al-Alwi describes his life in Guantánamo as “an endless horror story.” In April 2013, a delegation from the International Committee of the Red Cross conducted a visit to Guantánamo to meet with detainees and assess conditions there. On the day immediately following their departure, armed guards raided a cellblock housing al-Alwi and several other hunger-striking detainees while they prepared for communal prayers.
  • The complaint further alleges that prisoners were physically assaulted by guards during this raid, some of whom fired rubber-coated steel bullets at them. Al-Alwi was among those wounded, with bullets hitting him in his thigh, elbow and back as he tried to flee from guards firing at him; those shots were allegedly fired from the other side of a chain-link fence. Al-Alwi says that he has never received adequate medical treatment for these wounds; he was handcuffed and left to bleed for 20 minutes by guards before a doctor arrived. A few of his wounds were rubbed with anti-infection cream while the remainder have remained wholly untreated to this day. As a result, al-Alwi says that he suffers chronic and debilitating pain and swelling from these injuries.
  • The circumstances leading to al-Alwi’s detention at Guantánamo are obscure. One of hundreds of young Arab men who were captured by Pakistani bounty hunters following the Sept. 11 attacks, al-Alwi was not a known or wanted terrorist, but was nonetheless turned over to U.S. troops by locals in Pakistan for a cash reward later that year. On Jan. 16, 2002, he arrived at Guantánamo Bay where he has remained ever since. A 2006 report by Amnesty International found that cash bounties offered for turning over “terrorists” to U.S. forces had effectively created a lucrative cash market for capturing young Arab men in Pakistan and Afghanistan. Fliers distributed by the U.S. government in the region offered “millions of dollars” in exchange for turning over purported Al-Qaeda and Taliban members, promising those who were able to render suspects to American custody “enough money to take care of your family, your village, your tribe for the rest of your life.”
  • Al-Alwi says that American interrogators tortured him until he made false confessions about his involvement in terrorism. Despite having now spent over a decade in custody, with no foreseeable prospect of release, he has not been charged with any crime. Describing his brutal treatment by riot guards who come to restrain him for force-feedings, al-Alwi told his lawyers in the petition:  “I weigh less than 100 pounds. I wear braces on both ankles, and both wrists, and one around my lower back. I am five foot five … and they claim that I am ‘resisting’ … How can I possibly resist anyone, let alone these men?”
  •  
    "... in the land of the free and the home of the brave" forget about the right to a speedy trial.
Paul Merrell

National security bill opens the door to expanded control orders and secret evidence | nsnbc international - 0 views

  • On Thursday, Attorney-General George Brandis introduced a new national security bill into the Senate. This is the fifth tranche of national security legislation to be introduced into parliament since July 2014.
  • This bill includes a host of new measures designed to address the evolving threat posed by terrorism. These include: a new offence of advocacy of genocide; amendments to the control order regime, so it applies to persons 14 years and older, and new measures to monitor controlees; and clarification of the basis for issuing a preventative detention order. But the bill’s most concerning aspect is the proposal to expand the secrecy provisions available to courts in control order proceedings. Keeping national security information secret in court Since 2004, legislation has been in place to deal with information that is likely to prejudice national security in federal court proceedings. This legislation created a special closed hearing procedure to determine whether national security information could be disclosed in court and, if so, in what form. This process regulates disclosure between the parties – that is, who gets to see what.
  • The bill expands this by creating special provisions that allow the court to consider sensitive material that the controlee and legal representative have not seen in proceedings to impose, confirm or vary a control order. It provides that a court can consider all of the information: contained in an original source document in control order proceedings, even where the controlee and their legal representative have been provided with only a redacted or summarised form of the document; contained in an original source document in control order proceedings, even where the controlee and their legal representative have not been provided with any information contained in the original source document; and provided by a witness, even where the information provided by the witness is not disclosed to the controlee or their legal representative. The bill’s effect is to allow secret evidence into control order proceedings.
  • ...1 more annotation...
  • “Secret evidence” is that which is not disclosed to an affected party and their legal representative. It is not new. A successful claim of public interest immunity, for example, results in secret material being excluded from the evidence presented in court. What is new in the anti-terror context is legislation that allows the courts to rely on secret evidence in control order proceedings.
  •  
    Australia, along with the UK, cotinues its steady march to the right on national security matters. The admissibility of secret evidence in judicial proceedings is antithetical to notions of Due Process and a fair trial, as well as to public oversight of judicial proceedings.  
Paul Merrell

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
Paul Merrell

Classified Report on the C.I.A.'s Secret Prisons Is Caught in Limbo - The New York Times - 0 views

  • A Senate security officer stepped out of the December chill last year and delivered envelopes marked “Top Secret” to the Pentagon, the C.I.A., the State Department and the Justice Department. Inside each packet was a disc containing a 6,700-page classified report on the C.I.A.’s secret prison program and a letter from Senator Dianne Feinstein, urging officials to read the report to ensure that the lessons were not lost to time. Today, those discs sit untouched in vaults across Washington, still in their original envelopes. The F.B.I. has not retrieved a copy held for it in the Justice Department’s safe. State Department officials, who locked up their copy and marked it “Congressional Record — Do Not Open, Do Not Access” as soon as it arrived, have not read it either. Continue reading the main story Related Coverage document The Senate Committee’s Report on the C.I.A.’s Use of TortureDEC. 9, 2014 Panel Faults C.I.A. Over Brutality and Deceit in Terrorism InterrogationsDEC. 9, 2014 Senate Votes to Turn Presidential Ban on Torture Into LawJUNE 16, 2015 Outside Psychologists Shielded U.S. Torture Program, Report FindsJULY 10, 2015 Nearly a year after the Senate released a declassified 500-page summary of the report, the fate of the entire document remains in limbo, the subject of battles in the courts and in Congress. Until those disputes are resolved, the Justice Department has prohibited officials from the government agencies that possess it from even opening the report, effectively keeping the people in charge of America’s counterterrorism future from reading about its past. There is also the possibility that the documents could remain locked in a Senate vault for good.
  • In a letter to Attorney General Loretta E. Lynch last week, Ms. Feinstein, a California Democrat, said the Justice Department was preventing the government from “learning from the mistakes of the past to ensure that they are not repeated.”Although Ms. Feinstein is eager to see the document circulated, the Senate is now under Republican control. Her successor as head of the Intelligence Committee, Senator Richard M. Burr of North Carolina, has demanded that the Obama administration return every copy of the report. Mr. Burr has declared the report to be nothing more than “a footnote in history.”It was always clear that the full report would remain shielded from public view for years, if not decades. But Mr. Burr’s demand, which means that even officials with top security clearances might never read it, has reminded some officials of the final scene of “Raiders of the Lost Ark,” when the Ark of the Covenant is put into a wooden crate alongside thousands of others in a government warehouse of secrets.
  • The full report is not expected to offer evidence of previously undisclosed interrogation techniques, but the interrogation sessions are said to be described in great detail. The report explains the origins of the program and names the officials involved. The full report also offers details on the role of each agency in the secret prison program.The Justice Department, which played a central role in approving the interrogation methods, has even prohibited its own officials from reading the full report.“The Department of Justice was among those parts of the executive branch that were misled about the program, and D.O.J. officials’ understanding of this history is critical to its institutional role going forward,” Ms. Feinstein wrote to the Justice Department last week in a letter she signed with Senator Patrick J. Leahy of Vermont, the top Democrat on the Judiciary Committee.In court, Justice Department lawyers have agreed with Mr. Burr’s contention that the document belongs to Congress. As evidence, they point to an agreement between the C.I.A. and the Senate as the Intelligence Committee began its lengthy investigation. The Senate was under Democratic control at the time.
  • ...2 more annotations...
  • The American Civil Liberties Union has sued the C.I.A. for access to the document, and at this point the case hinges on who owns it. Senate documents are exempt from public records laws, but executive branch records are not. In May, a federal judge ruled that even though Ms. Feinstein distributed the report to the executive branch, the document still belongs to Congress. That decision is under appeal, with court papers due this month.Justice Department officials defend their stance, saying that handling the document at all could influence the outcome of the lawsuit. They said that a State Department official who opened the report, read it and summarized it could lead a judge to determine that the document was an executive branch record, altering the lawsuit’s outcome. The Justice Department has also promised not to return the records to Mr. Burr until a judge settles the matter.“It’s quite bizarre, and I cannot think of a precedent,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. He said there are any number of classified Senate documents that are shared with intelligence agencies and remain as congressional records, even if they are read by members of the executive branch.
  • The agreement says that any “documents, draft and final recommendations, reports or other materials” generated during the investigation are congressional documents. “As such these records are not C.I.A. records under the Freedom of Information Act,” the agreement says.The A.C.L.U. argues that agreement was void once Ms. Feinstein sent the report to the government agencies. Because she clearly intended the executive branch to use the report, the A.C.L.U. contends, the committee gave up control of the document.If Mr. Burr were to succeed in getting copies of the report returned to the Intelligence Committee, Mr. Aftergood said, he could slowly make it irrelevant.“The longer that it’s buried, the less relevant it becomes,” he said.
  •  
    If it is ultimately found that the report is an Executive Branch record, then the FOIA requires disclosure of all "segregable portions" that are not properly classified.  
Paul Merrell

Cashless Society War Intensifies During Global Epocalypse Washington's Blog - 0 views

  • In the fall of 2015, the world descended into an economic apocalypse that will transform the globe into a single cashless society. This bold prediction is based on trends in nations all over the earth as shown in the article below. As we enter 2016, we are only beginning to see this Epocalypse form through the fog of war. The war I’m talking about is the world war waged furiously by central banks against the Great Recession as the governments they supposedly serve fiddled while their capital burned. The governments and banks of this world advanced rapidly toward forming cashless societies throughout 2015. The citizens of some countries are already embracing the move. In other countries, like the US, citizens fear the loss of autonomy that would come from giving governments and their designated central banks absolute monetary control.
  • The Epocalypse that I’ve been describing in this series will overcome that resistance during 2016 and 2017 as it wrecks economic havoc to such a degree that cash hold-outs will be ready for whatever holds the greatest promise of saving them from their collapsed monetary systems, fallen banks, deflated stocks and suffocating debt. One has only to think about how quickly and readily American citizens forfeited their constitutional civil liberties after 9/11 when George Bush and congress decreed that search warrants were not necessary if the government branded you a “terrorist.” If this sounds like some wild conspiracy theory, consider the following: no less Sterling standard of global economics than The Economist predicted thirty years ago that by 2018 a global currency would rise like the phoenix out of the ashes of the world’s fiat currencies:
  • Charging people to keep their money in the bank is hard to do so long as cash is available, as people may just withdraw all of their money from those banks in the form of the national cash and squirrel the cash away. In order to penetrate the twilight zone of economics, central banks need to abolish cash to terminate this escape route. Then they can force savers to spend, thereby increasing the flow of money through the economy, by raising the cost of holding money in a bank account as high as it takes to get people to spend their money. No sense letting perfectly good money waste away in an expensive bank account. Transitioning into a cashless society is the ultimate central planner’s dream as it gives central banks total control over money, and money is their proprietary product.
  • ...1 more annotation...
  • The drive to breach the national boundaries of money and establish a global cashless society has become a World War on cash with IMF backing to go digital and global.
Paul Merrell

The FBI Has a New Plan to Spy on High School Students Across the Country | Alternet - 0 views

  • Under new guidelines, the FBI is instructing high schools across the country to report students who criticize government policies and “western corruption” as potential future terrorists, warning that “anarchist extremists” are in the same category as ISIS and young people who are poor, immigrants or travel to “suspicious” countries are more likely to commit horrific violence.Based on the widely unpopular British “anti-terror” mass surveillance program, the FBI’s "Preventing Violent Extremism in Schools" guidelines, released in January, are almost certainly designed to single out and target Muslim-American communities. However, in its caution to avoid the appearance of discrimination, the agency identifies risk factors that are so broad and vague that virtually any young person could be deemed dangerous and worthy of surveillance, especially if she is socio-economically marginalized or politically outspoken.
  • This overwhelming threat is then used to justify a massive surveillance apparatus, wherein educators and pupils function as extensions of the FBI by watching and informing on each other.The FBI’s justification for such surveillance is based on McCarthy-era theories of radicalization, in which authorities monitor thoughts and behaviors that they claim to lead to acts of violent subversion, even if those people being watched have not committed any wrongdoing. This model has been widely discredited as a violence prevention method, including by the U.S. government, but it is now being imported to schools nationwide as official federal policy.
  • Under the category of domestic terrorists, the educational materials warn of the threat posed by “anarchist extremists.” The FBI states, “Anarchist extremists believe that society should have no government, laws, or police, and they are loosely organized, with no central leadership… Violent anarchist extremists usually target symbols of capitalism they believe to be the cause of all problems in society—such as large corporations, government organizations, and police agencies.”Similarly, “Animal Rights Extremists and Environmental Extremists” are placed alongside “white supremacy extremists”, ISIS and Al Qaeda as terrorists out to recruit high school students. The materials also instruct students to watch out for  extremist propaganda messages that communicate criticisms of "corrupt western nations" and express "government mistrust.”If you "see suspicious behavior that might lead to violent extremism," the resource states, consider reporting it to "someone you trust," including local law enforcement officials like police officers and FBI agents.
  • ...3 more annotations...
  • “The whole concept of CVE is based on the conveyor belt theory – the idea that ‘extreme ideas’ lead to violence,” Michael German, a fellow with the Brennan Center for Justice’s Liberty and National Security Program, told AlterNet. “These programs fall back on the older ‘stages of radicalization’ models, where the identified indicators are the expression of political grievances and religious practices.”The lineage of this model can be traced to the first red scare in America, as well as J. Edgar Hoover’s crackdown on civil rights and anti-war activists. In the post-9/11 era, the conveyor-belt theory has led to the mass surveillance of Muslims communities by law enforcement outfits ranging from the FBI to the New York Police Department.U.S. government agencies continue to embrace this model despite the fact that it has been thoroughly debunked by years of scholarly research, Britain’s M15 spy agency and an academic study directly supported by the Department of Homeland Security.
  • “The document aims to encourage schools to monitor their students more carefully for signs of radicalization but its definition of radicalization is vague,” said Arun Kundnani, author of The Muslims are Coming! Islamophobia, extremism, and the domestic War on Terror and an adjunct professor at New York University. “Drawing on the junk science of radicalization models, the document dangerously blurs the distinction between legitimate ideological expression and violent criminal actions.”
  • As Hugh Handeyside, staff attorney for the ACLU’s national security project, told AlterNet, “Broadening the definition of violent extremism to include a range of belief-driven violence underscores that the FBI is diving head-first into community spying. Framing this conduct as ‘concerning behavior’ doesn’t conceal the fact that the FBI is policing students’ thoughts and trying to predict the future based on those thoughts.”
Paul Merrell

Turkey could cut off Islamic State's supply lines. So why doesn't it? | David Graeber | Comment is free | The Guardian - 0 views

  • n the wake of the murderous attacks in Paris, we can expect western heads of state to do what they always do in such circumstances: declare total and unremitting war on those who brought it about. They don’t actually mean it. They’ve had the means to uproot and destroy Islamic State within their hands for over a year now. They’ve simply refused to make use of it. In fact, as the world watched leaders making statements of implacable resolve at the G20 summit in Antalaya, these same leaders are hobnobbing with Turkey’s president Recep Tayyip Erdoğan, a man whose tacit political, economic, and even military support contributed to Isis’s ability to perpetrate the atrocities in Paris, not to mention an endless stream of atrocities inside the Middle East.
  • How could Isis be eliminated? In the region, everyone knows. All it would really take would be to unleash the largely Kurdish forces of the YPG (Democratic Union party) in Syria, and PKK (Kurdistan Workers’ party) guerillas in Iraq and Turkey. These are, currently, the main forces actually fighting Isis on the ground. They have proved extraordinarily militarily effective and oppose every aspect of Isis’s reactionary ideology. But instead, YPG-controlled territory in Syria finds itself placed under a total embargo by Turkey, and PKK forces are under continual bombardment by the Turkish air force. Not only has Erdoğan done almost everything he can to cripple the forces actually fighting Isis; there is considerable evidence that his government has been at least tacitly aiding Isis itself. It might seem outrageous to suggest that a Nato member like Turkey would in any way support an organisation that murders western civilians in cold blood. That would be like a Nato member supporting al-Qaida. But in fact there is reason to believe that Erdoğan’s government does support the Syrian branch of al-Qaida (Jabhat al-Nusra) too, along with any number of other rebel groups that share its conservative Islamist ideology. The Institute for the Study of Human Rights at Columbia University has compiled a long list of evidence of Turkish support for Isis in Syria.
  • And then there are Erdoğan’s actual, stated positions. Back in August, the YPG, fresh from their victories in Kobani and Gire Spi, were poised to seize Jarablus, the last Isis-held town on the Turkish border that the terror organisation had been using to resupply its capital in Raqqa with weapons, materials, and recruits – Isis supply lines pass directly through Turkey. Commentators predicted that with Jarablus gone, Raqqa would soon follow. Erdoğan reacted by declaring Jarablus a “red line”: if the Kurds attacked, his forces would intervene militarily – against the YPG. So Jarablus remains in terrorist hands to this day, under de facto Turkish military protection.
  • ...3 more annotations...
  • How has Erdoğan got away with this? Mainly by claiming those fighting Isis are “terrorists” themselves. It is true that the PKK did fight a sometimes ugly guerilla war with Turkey in the 1990s, which resulted in it being placed on the international terror list. For the last 10 years, however, it has completely shifted strategy, renouncing separatism and adopting a strict policy of never harming civilians. The PKK was responsible for rescuing thousands of Yazidi civilians threatened with genocide by Isis in 2014, and its sister organisation, the YPG, of protecting Christian communities in Syria as well. Their strategy focuses on pursuing peace talks with the government, while encouraging local democratic autonomy in Kurdish areas under the aegis of the HDP, originally a nationalist political party, which has reinvented itself as a voice of a pan-Turkish democratic left.
  • They have proved extraordinarily militarily effective and with their embrace of grassroots democracy and women’s rights, oppose every aspect of Isis’ reactionary ideology. In June, HDP success at the polls denied Erdoğan his parliamentary majority. Erdoğan’s response was ingenious. He called for new elections, declared he was “going to war” with Isis, made one token symbolic attack on them and then proceeded to unleash the full force of his military against PKK forces in Turkey and Iraq, while denouncing the HDP as “terrorist supporters” for their association with them. There followed a series of increasingly bloody terrorist bombings inside Turkey – in the cities of Diyarbakir, Suruc, and, finally, Ankara – attacks attributed to Isis but which, for some mysterious reason, only ever seemed to target civilian activists associated with the HDP. Victims have repeatedly reported police preventing ambulances evacuating the wounded, or even opening fire on survivors with tear gas.
  • As a result, the HDP gave up even holding political rallies in the weeks leading up to new elections in November for fear of mass murder, and enough HDP voters failed to show up at the polls that Erdoğan’s party secured a majority in parliament. The exact relationship between Erdoğan’s government and Isis may be subject to debate; but of some things we can be relatively certain. Had Turkey placed the same kind of absolute blockade on Isis territories as they did on Kurdish-held parts of Syria, let alone shown the same sort of “benign neglect” towards the PKK and YPG that they have been offering to Isis, that blood-stained “caliphate” would long since have collapsed – and arguably, the Paris attacks may never have happened. And if Turkey were to do the same today, Isis would probably collapse in a matter of months. Yet, has a single western leader called on Erdoğan to do this? The next time you hear one of those politicians declaring the need to crack down on civil liberties or immigrant rights because of the need for absolute “war” against terrorism bear all this in mind. Their resolve is exactly as “absolute” as it is politically convenient. Turkey, after all, is a “strategic ally”. So after their declaration, they are likely to head off to share a friendly cup of tea with the very man who makes it possible for Isis to continue to exist.
Paul Merrell

US Air Force Seeks $3 Billion Drone Program Expansion - 0 views

  • Despite a mounting civilian death toll and increased opposition from civil liberties activists, the US Air Force has announced that it plans to double its number of drone squadrons.In October, the Intercept released a report outlining the more secretive aspects of the US drone program. Compiled by a source within the intelligence community, the report offers an in-depth look at who, precisely, the US is targeting – and how accurate those missions really are.
  • "During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets," the report reads. This, of course, wasn’t the first indication of the drone program’s death toll. Analysis conducted by human rights group Reprieve in 2014 found that in targeting only 41 men, 1,147 people were killed by US airstrikes. But not only is the American drone war not winding down, it’s actually about to double in scope. According to Gen. Herbert Carlisle, head of US Air Combat Command at Langley Air Force Base, the US Air Force is about to double its number of drone squadrons, adding roughly 3,000 personnel to pilot and maintain new UAVs which would be stationed across the globe. The plan calls for an expansion over the next five years, and while it still has to be approved by Congressional lawmakers, the proposal would cost taxpayers $3 billion.
  • Carlisle says the plan is necessary because the Air Force is currently too busy running attack missions and is unable to meet the rising demand for surveillance missions. "Right now, 100% of the time, when a MQ-1 or MQ-9 crew goes in, all they do is combat," he said, according to the LA Times. "So we really have to build the capacity." The proposal includes adding 75 Reapers to the Air Force’s fleet of 175 Reapers and 150 Predators, and could even entail the construction of a new drone operations center in Suffolk, England, pending approval from the British government.
Paul Merrell

The NYPD's X-Ray Vans - The Atlantic - 0 views

  • In New York City, the police now maintain an unknown number of military-grade vans outfitted with X-ray radiation, enabling cops to look through the walls of buildings or the sides of trucks. The technology was used in Afghanistan before being loosed on U.S. streets. Each X-ray van costs an estimated $729,000 to $825,000.The NYPD will not reveal when, where, or how often they are used.
  • Here are some specific questions that New York City refuses to answer:How is the NYPD ensuring that innocent New Yorkers are not subject to harmful X-ray radiation? How long is the NYPD keeping the images that it takes and who can look at them? Is the NYPD obtaining judicial authorization prior to taking images, and if so, what type of authorization? Is the technology funded by taxpayer money, and has the use of the vans justified the price tag? Those specifics are taken from a New York Civil Liberties Union court filing. The legal organization is seeking to assist a lawsuit filed by Pro Publica journalist Michael Grabell, who has been fighting New York City for answers about X-ray vans for 3 years.“ProPublica filed the request as part of its investigation into the proliferation of security equipment, including airport body scanners, that expose people to ionizing radiation, which can mutate DNA and increase the risk of cancer,” he explained. (For fear of a terrorist “dirty bomb,” America’s security apparatus is exposing its population to radiation as a matter of course.)
  • A state court has already ruled that the NYPD has to turn over policies, procedures, and training manuals that shape uses of X-rays; reports on past deployments; information on the costs of the X-ray devices and the number of vans purchased; and information on the health and safety effects of the technology. But New York City is fighting on appeal to suppress that information and more, as if it is some kind of spy agency rather than a municipal police department operating on domestic soil, ostensibly at the pleasure of city residents.Its insistence on extreme secrecy is part of an alarming trend. The people of New York City are effectively being denied the ability to decide how they want to be policed.
  • ...3 more annotations...
  • For all we know, the NYPD might be bombarding apartment houses with radiation while people are inside or peering inside vehicles on the street as unwitting passersby are exposed to radiation. The city’s position—that New Yorkers have no right to know if that is happening or not—is so absurd that one can hardly believe they’re taking it. These are properly political questions. And it’s unlikely a target would ever notice. “Once equipped, the van—which looks like a standard delivery van—takes less than 15 seconds to scan a vehicle,” Fox News reported after looking at X-ray vans owned by the federal government. “It can be operated remotely from more than 1,500 feet and can be equipped with optional technology to identify radioactivity as well.”
  • And since the technology can see through clothing, it is easy to imagine a misbehaving NYPD officer abusing it if there are not sufficient safeguards in place. Trusting the NYPD to choose prudent, sufficient safeguards under cover of secrecy is folly. This is the same department that spent 6 years conducting surveillance on innocent Muslims Americans in a program so unfocused that it produced zero leads—and that has brutalized New York City protestors on numerous occasions. Time and again it’s shown that outside oversight is needed.Lest readers outside New York City presume that their walls still stand between them and their local law enforcement agency, that isn’t necessarily the case. Back in January, in an article that got remarkably little attention, USA Today reported the following:
  • At least 50 U.S. law enforcementagencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance. Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant. The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.
  •  
    About the technology from the patent holder's web site: http://as-e.com/resource-center/technology/z-backscatter/ Example photos of the Z Backspatter Vans and examples of X-Ray photos taken with it. https://goo.gl/MO1TVi  Forty percent higher radiation than airport security scanners. with a range of over a thousand feet. 12-seconds to conduct a scan.  
« First ‹ Previous 281 - 296 of 296
Showing 20 items per page