Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "lawyers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Navy nurse rejects force-feed of Gitmo prisoners - Yahoo News - 0 views

  • SAN JUAN, Puerto Rico (AP) — A rights lawyer and a U.S. official say a Navy nurse has refused to participate in force-feeding of prisoners who are on an extended hunger strike at Guantanamo Bay.An attorney for the British legal rights group Reprieve said Tuesday in a phone interview from London that the nurse decided against being a participant after deciding the practice was criminal.Attorney Cori Crider says she learned about the case from a 42-year-old Syrian prisoner she represents who is on a hunger strike.Southern Command spokesman Army Col. Greg Julian confirms the report. He says it is the first time a Navy nurse has refused to tube-feed a hunger-striking prisoner. He says the nurse is a lieutenant and has been assigned to other duties at Guantanamo.
  •  
    That's probably the end of a military career but I salute the courage of this wo/man.
Paul Merrell

Frightening People into Silence by Andrew P. Napolitano -- Antiwar.com - 0 views

  • by Andrew P. Napolitano, July 17, 2014 Print This | Share This “Chilling” is the word lawyers use to describe governmental behavior that does not directly interfere with constitutionally protected freedoms, but rather tends to deter folks from exercising them. Classic examples of “chilling” occurred in the 1970s, when FBI agents and U.S. Army soldiers, in business suits with badges displayed or in full uniform, showed up at anti-war rallies and proceeded to photograph and tape record protesters. When an umbrella group of protesters sued the government, the Supreme Court dismissed the case, ruling that the protesters lacked standing – meaning, because they could not show that they were actually harmed, they could not invoke the federal courts for redress. Yet, they were harmed, and the government knew it. Years after he died, longtime FBI boss J. Edgar Hoover was quoted boasting of the success of this program. The harm existed in the pause or second thoughts that protesters gave to their contemplated behavior because they knew the feds would be in their faces – figuratively and literally. The government’s goal, and its limited success, was to deter dissent without actually interfering with it. Even the government recognized that physical interference with and legal prosecutions of pure speech are prohibited by the First Amendment. Eventually, when this was exposed as part of a huge government plot to stifle dissent, known as COINTELPRO, the government stopped doing it.
  • Until now. Now, the government fears the verbal slings and arrows of dissenters, even as the means for promulgating one’s criticisms of the government in general and of President Obama in particular have been refined and enhanced far beyond those available to the critics of the government in the 1970s. So, what has the Obama administration done to stifle, or chill, the words of its detractors? For starters, it has subpoenaed the emails and home telephone records of journalists who have either challenged it or exposed its dark secrets. Among those journalists are James Risen of The New York Times and my colleague and friend James Rosen of Fox News. This is more personal than the NSA spying on everyone, because a subpoena is an announcement that a specific person’s words or effects have been targeted by the government, and that person continues to remain in the government’s crosshairs until it decides to let go.
  • This necessitates hiring legal counsel and paying legal fees. Yet, the targeting of Risen and Rosen was not because the feds alleged that they broke the law – there were no such allegations. Rather, the feds wanted to see their sources and their means of acquiring information. What journalist could perform his work with the feds watching? The reason we have a First Amendment is to assure that no journalist would need to endure that.
  • ...2 more annotations...
  • And just last week, Attorney General Eric Holder, while in London, opined that much of the criticism of Obama is based on race – meaning that if Obama were fully white, his critics would be silent. This is highly inflammatory, grossly misleading, patently without evidential support and, yet again, chilling. Tagging someone as a racist is the political equivalent of applying paint that won’t come off. Were the Democrats who criticized Attorney General Alberto Gonzales or Secretary of State Condoleezza Rice racists? Is it appropriate for government officials to frighten people into silence by giving them pause before they speak, during which they basically ask themselves whether the criticism they are about to hurl is worth the pain the government will soon inflict in retaliation? The whole purpose of the First Amendment is to permit, encourage and even foment open, wide, robust debate about the policies and personnel of the government. That amendment presumes that individuals – not the government – will decide what language to read and hear. Because of that amendment, the marketplace of ideas – not the government – will determine which criticisms will sink in and sting and which will fall by the wayside and be forgotten.
  • Surely, government officials can use words to defend themselves; in fact, one would hope they would. Yet, when the people fear exercising their expressive liberties because of how the governmental targets they criticize might use the power of the government to stifle them, we are no longer free. Expressing ideas, no matter how bold or brazen, is the personal exercise of a natural right that the government in a free society is powerless to touch, directly or indirectly. Yet, when the government succeeds in diminishing public discourse so that it only contains words and ideas of which the government approves, it will have succeeded in establishing tyranny. This tyranny – if it comes – will not come about overnight. It will begin in baby steps and triumph before we know it. Yet we do know that it already has begun.
Paul Merrell

Australia's criminlisation of dissent: anti-protest law is an ominous sign of the times | nsnbc international - 0 views

  • Australia’s criminlisation of dissent: anti-protest law is an ominous sign of the times Share This Tags AustraliaTasmania Brendan Gogarty (TC) : The Workplaces (Protection from Protesters) Bill – locally known as the “anti-protest” bill – was passed by Tasmanian parliament late on Tuesday night. The law was introduced as part of the government’s intention to “re-build Tasmania’s forestry industry”. That is a source of controversy and division in Tasmanian society. To achieve its aim, the government has committed itself to a wide legislative agenda. This includes: amending the uniform Defamation Act 2005 to allow large companies to sue protesters; defunding community and conservation organisations; and tearing up a “peace deal” between foresters and conservationists, which had been enacted into law before the 2014 election.
  • Recognising the potential return to hostilities, the government said it would “not try and appease” protesters, but would rather “toughen the law to deter them”. The anti-protest law is its chosen mechanism of deterrence. While such hard-line policies on political opposition are not new, the severity and breadth of the law to enforce such a policy arguably is. The shift from hard-line policy to hard-line law is worrisome in a constitutional democracy. The spread of state anti-bikie laws in Australia illustrates why this law is not just of concern for Tasmanians.
  • The new law covers all acts on, or acts inhibiting access to, a business premises (all public and private land, including forestry and mining lands) which are: … in furtherance of, or for the purposes of promoting awareness of or support for an opinion, or belief, in respect of a political, environmental, social, cultural or economic issue. Any such protest is subject to significant penalties if they interrupt “business activity”. While originally such sanctions were mandatory, the government agreed in the upper house to exchange these for discretionary penalties. However, the government agreed to this only on condition that the subsequent maximum penalties would be significantly increased. This was to “send a strong message” to protesters and the courts charged with punishing them. As a consequence, protesters who repeatedly interrupt business face fines of up to A$10,000 and four years in jail.
  • ...1 more annotation...
  • From its inception, the law has been criticised by domestic and international lawyers. Three United Nations human rights rapporteurs considered the bill to breach international law, one describing it as “shocking”. They considered the legislation, as originally envisioned, to be: … disproportionate and unnecessary [creating a] chilling effect of silencing dissenters … [who are] key to raising awareness about human rights, political, [and] social concerns … holding not just governments, but also corporations accountable. A wide range of legal professionals have voiced similar criticisms. While the removal of mandatory penalties alleviated some concerns, the larger concern about a law designed solely to punish people for protesting against controversial business activities – especially publicly supported and funded ones – remains.
  •  
    Australia has neither constitution nor Bill of Rights. It shows.
Paul Merrell

Russell Napier Declares November 16, 2014 The Day Money Dies | Zero Hedge - 0 views

  • It is with regret and sadness we announce the death of money on November 16th 2014 in Brisbane, Australia
  • On Sunday in Brisbane the G20 will announce that bank deposits are just part of commercial banks’ capital structure, and also that they are far from the most senior portion of that structure. With deposits then subjected to a decline in nominal value following a bank failure, it is self-evident that a bank deposit is no longer money in the way a banknote is. If a banknote cannot be subjected to a decline in nominal value, we need to ask whether banknotes can act as a superior store of value than bank deposits? If that is the case, will some investors prefer banknotes to bank deposits as a form of savings? Such a change in preference is known as a "bank run."
  • Each country will introduce its own legislation to effect the ‘ bail-in’ agreed by the G20 this coming weekend. The consultation document from the UK’s Treasury lists the following bank creditors who will rank ABOVE depositors in a ‘failing’ financial institution:
  • ...4 more annotations...
  • The above list makes it clear that deposits larger than GBP85,000 will rank ahead of the bond holders of banks, but they will rank above little else. Importantly, both borrowings of the banks of less than 7 days maturity from other financial institutions and sums owed by banks in their role as counterparties to OTC derivatives will rank above large deposits. Large deposits at banks are no longer money, as this legislation will formally push them down through the capital structure to a position of material capital risk in any "failing" institution. In our last financial crisis, deposits were de facto guaranteed by the state, but from November 16th holders of large-scale deposits will be, both de facto and de jure, just another creditor squabbling over their share of the assets of a failed bank.
  • If we have another Lehman Brothers collapse, large-scale depositors could find themselves in the courts for years before final adjudication on the scale of their losses could be established. During this period would this illiquid asset, formerly called a deposit and now subject to an unknown capital loss, be considered money? Clearly it would not, as its illiquidity and likely decline in nominal value would make it unacceptable as a medium of exchange.
  • From November 16th 2014 the large-scale deposit at a commercial bank is, at best, a lesser form of money, and to many it will cease to be money at all as its nominal value can fall and it could cease to be accepted as a medium of exchange.
  • As the world’s smartest lawyer Charlie Munger is fond of saying, "Show me the incentive and I will show you the outcome." Some simple mathematics reveals that the November 16th announcement will create a very major incentive for investors to change deposits into banknotes.
Paul Merrell

The $9 Billion Witness: Meet JPMorgan Chase's Worst Nightmare | Rolling Stone - 0 views

  • Meet the woman JPMorgan Chase paid one of the largest fines in American history to keep from talking By Matt Taibbi | November 6, 2014
  • tried to stay quiet, she really did. But after eight years of keeping a heavy secret, the day came when Alayne Fleischmann couldn't take it anymore.  "It was like watching an old lady get mugged on the street," she says. "I thought, 'I can't sit by any longer.'"  Fleischmann is a tall, thin, quick-witted securities lawyer in her late thirties, with long blond hair, pale-blue eyes and an infectious sense of humor that has survived some very tough times. She's had to struggle to find work despite some striking skills and qualifications, a common symptom of a not-so-common condition called being a whistle-blower.
  • Fleischmann is the central witness in one of the biggest cases of white-collar crime in American history, possessing secrets that JPMorgan Chase CEO Jamie Dimon late last year paid $9 billion (not $13 billion as regularly reported – more on that later) to keep the public from hearing. Back in 2006, as a deal manager at the gigantic bank, Fleischmann first witnessed, then tried to stop, what she describes as "massive criminal securities fraud" in the bank's mortgage operations. Thanks to a confidentiality agreement, she's kept her mouth shut since then. "My closest family and friends don't know what I've been living with," she says. "Even my brother will only find out for the first time when he sees this interview." 
  • ...3 more annotations...
  • This past year she watched as Holder's Justice Department struck a series of historic settlement deals with Chase, Citigroup and Bank of America. The root bargain in these deals was cash for secrecy. The banks paid big fines, without trials or even judges – only secret negotiations that typically ended with the public shown nothing but vague, quasi-official papers called "statements of facts," which were conveniently devoid of anything like actual facts. 
  • Six years after the crisis that cratered the global economy, it's not exactly news that the country's biggest banks stole on a grand scale. That's why the more important part of Fleischmann's story is in the pains Chase and the Justice Department took to silence her. She was blocked at every turn: by asleep-on-the-job regulators like the Securities and Exchange Commission, by a court system that allowed Chase to use its billions to bury her evidence, and, finally, by officials like outgoing Attorney General Eric Holder, the chief architect of the crazily elaborate government policy of surrender, secrecy and cover-up. "Every time I had a chance to talk, something always got in the way," Fleischmann says.
  • And now, with Holder about to leave office and his Justice Department reportedly wrapping up its final settlements, the state is effectively putting the finishing touches on what will amount to a sweeping, industrywide effort to bury the facts of a whole generation of Wall Street corruption. "I could be sued into bankruptcy," she says. "I could lose my license to practice law. I could lose everything. But if we don't start speaking up, then this really is all we're going to get: the biggest financial cover-up in history." 
  •  
    Matt Taibbi is back at Rolling Stone, relaunching with a major blockbuster.
Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit 2010 - Google Scholar - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Paul Merrell

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
Paul Merrell

ICC receives report debunking Israel's "self-defense" claims for Gaza attack | The Electronic Intifada - 0 views

  • The National Lawyers Guild (NLG) has submitted a report to the International Criminal Court (ICC) prosecutor debunking Israeli claims that last summer’s attack on Gaza was an act of “self-defense.” Since the court began a preliminary examination into the events in the occupied West Bank and Gaza Strip beginning from 13 June 2014, Israel has attempted to ward off a full investigation by claiming that its 51-day assault on Gaza was an act of defense. NLG, a US human and civil rights organization, also sent its report to US President Barack Obama and Secretary of State John Kerry, who have suggested Israel’s right to defend itself justified the air bombardment and ground assault that left more than 2,200 people, the vast majority civilians, dead.
  • n their cover letter to the ICC and the White House, NLG notes that numerous respected sources have alleged war crimes, including Amnesty International, Human Rights Watch, the United Nations Human Rights Council and the United Nations High Commissioner for Human Rights.  “The central message that Israeli forces were protecting Israeli citizens from Hamas rockets was so ubiquitous in the Western media as to eclipse war crimes allegations,” said report author and Vermont attorney James Marc Leas. “But the facts and law do not support the self-defense claims.”
Paul Merrell

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
Paul Merrell

Venezuelan Opposition Mayor, Alias "The Vampire," Arrested for Role in Blue Coup Plot | venezuelanalysis.com - 0 views

  • Venezuelan opposition Mayor and longtime rightwing politician, Antonio Ledezma, has been arrested by the country’s intelligence services, SEBIN, for his alleged role in plotting to stage a coup against the democratically elected government of Nicolas Maduro.  The planned coup was uncovered last week by security forces, just hours before several US backed Air Force officials had planned to partake in a bombing spree of strategic targets in the capital. They had hoped this would lead to the assassination of the country’s president and bring about regime change in the South American country.  “Antonio Ledezma who, today, by order of the Public Prosecutor’s Office, was captured and is going to be prosecuted by the Venezuelan justice system, to make him answer to all of the crimes committed against the peace and security of the country and the Constitution… We’ve had enough of conspiracies, we want to work in peace!” announced Venezuelan President, Nicolas Maduro, amidst a chorus of cheers from onlookers.
  • Last week, Ledezma, who is current Mayor of the Metropolitan Capital District of Caracas, signed a statement calling for a “National Transition Agreement” alongside opposition politicians, Maria Corina Machado and currently detained leader of the Popular Will party, Leopoldo Lopez.  The document calls on Venezuelans to unite behind a plan to remove elected President Nicolas Maduro and sets out an action programme for the would be provisional government. This includes facilitating the return of “exiled” Venezuelans, prosecuting current members of government and reaching out to international financial lending agencies such as the International Monetary Fund.  Circulated on February 11th, the statement was disclosed just a day before the attempted coup was set to unfold and was reportedly the signal to set the plan in motion.  
  • “It has no base in any juridic text, it is a putschist act of conspiracy that is unfortunately to the liking of thousands of opposition militants who have been indoctrinated to attack democracy,” Constitutional Lawyer, Jesus Silva, told Venezuelanalysis.  Ledezma’s detention comes in the wake of several other arrests, including those of a number of airforce officials implicated in the plan.   According to revelations made by the President of the National Assembly, Diosadado Cabello, on Wednesday night, Ledezma has since been named by one of the arrested officials under questioning.  The confession links Ledezma to a plan to “eliminate” opposition leader Leopoldo Lopez last year in order to create “chaos” and destabilise the government. Fellow opposition politician and National Assembly legislator, Julio Borges, is also implicated in the assassination plan, which forced an intervention by the government in early 2014. At the time, Lopez’s wife, Lilian Tintori, stated that the government had acted to protect her husband’s safety. 
  • ...3 more annotations...
  • Although details surrounding Ledezma’s exact role in the recently discovered “Blue” coup plot are still unclear, it appears that the opposition politician is implicated beyond his call for a transitional government.  Following the announcement of the coup plot last Thursday, the Maduro administration suggested that further arrests were to be made once there was sufficient evidence to prosecute the political ringleaders of the plan.  “In these intelligence investigations, we have discovered a codified message, in another language,  by an important leader of a party. On translating it, we found that it gave the details, the elements of the coup. We are about to capture the person who brought the script that they were going to read, the script they were going to read out was already written, and circulated by a person who I will name at the correct moment”, said Maduro, referencing a preplanned statement which was to be read out to the public following the aerial bombardment, announcing a “rebellion” of the armed forces against the government. 
  • It is not the first time that Ledezma has been implicated in a plan to violently overthrow the government. In 2002, he participated in an attempted coup which saw socialist president of the time, Hugo Chavez, ousted for a period of 47 hours. Last year, he was also named several times as a “principal ally” by currently detained terror plotter, Lorent Saleh. Saleh was one of the main underground activists fuelling the armed barricades known as guarimbas which last year claimed the lives of at least 43 Venezuelans. He had planned to go on a killing spree with the help of Colombian paramilitaries but was arrested before the plan could take place.  
  • Popularly known as “the vampire”, Ledezma began his political career in 1973 as a member of the “Democratic Action” Party. In 1989, he infamously became Governor of the Federal District of Caracas, when he oversaw one of the most violent periods in the history of the Caracas Metropolitan Police.  The police body, which was since disbanded in 2010 due to its human rights violations, regularly opened fire on unarmed student protests, systematically repressed street vendors, pensioners and the unemployed, as well as regularly disappeared political activists.   During this period he also oversaw the “Caracazo,” when up to 3000 people were killed and disappeared by security forces in the wake of violent protests against a government imposed austerity programme.  This particular period of Ledezma’s career earnt him the reputation of “student killer” amongst working class Venezuelans. He is founder and current leader of the rightwing party known as the “Brave People’s Alliance”. 
Paul Merrell

The Blood Sacrifice of Sergeant Bergdahl | Matthew Hoh - 0 views

  • Last week charges of Desertion and Misbehavior Before the Enemy were recommended against Sergeant Bowe Bergdahl. Tragically, Sergeant Bergdahl was once again crucified, without evidence or trial, throughout mainstream, alternative and social media. That same day Sergeant Bergdahl was offered as a sacrifice to primarily Republican politicians, bloggers, pundits, chicken hawks and jingoists, while Democrats mostly kept silent as Sergeant Bergdahl was paraded electronically and digitally in the latest Triumph of the Global War on Terror, President Ashraf Ghani was applauded, in person, by the American Congress. Such coincidences, whether they are arranged or accidental, often appear in literary or cinematic tales, but they do, occasionally, manifest themselves in real life, often appearing to juxtapose the virtues and vices of a society for the sake and advancement of political narratives. The problem with this specific coincidence for those on the Right, indulging in the fantasy of American military success abroad, as well as for those on the Left, desperate to prove that Democrats can be as tough as Republicans, is that reality may intrude. To the chagrin and consternation of many in DC, Sergeant Bergdahl may prove to be the selfless hero, while President Ghani may play the thief, and Sergeant Bergdahl's departure from his unit in Afghanistan may come to be understood as just and his time as a prisoner of war principled, while President Obama's continued propping up and bankrolling of the government in Kabul, at the expense of American servicemembers and taxpayers, comes to be fully acknowledged as immoral and profligate.
  • Buried in much of the media coverage this past week on the charges presented against Sergeant Bergdahl, with the exception of CNN, are details of the Army's investigation into Sergeant Bergdahl's disappearance, capture and captivity. As revealed by Sergeant Bergdahl's legal team, twenty-two Army investigators have constructed a report that details aspects of Sergeant Bergdahl's departure from his unit, his capture and his five years as a prisoner of war that disprove many of the malicious rumors and depictions of him and his conduct.
  • As documented in his lawyers' statement submitted to the Army on March 25, 2015, in response to Sergeant Bergdahl's referral to the Article 32 preliminary hearing (which is roughly the military equivalent of a civilian grand jury), the following facts are now known about Sergeant Bergdahl and his time prior to and during his captivity as a prisoner of war:• Sergeant Bergdahl is a "truthful person" who "did not act out of a bad motive"; • he did not have the intention to desert permanently nor did he have an intention to leave the Army when he left his unit's outpost in eastern Afghanistan in 2009; • he did not have the intention of joining the Taliban or assisting the enemy; • he left his post to report "disturbing circumstances to the attention of the nearest general officer". • while he was a prisoner of war for five years, he was tortured, but he did not cooperate with his captors. Rather, Sergeant Bergdahl attempted to escape twelve times, each time with the knowledge he would be tortured or killed if caught; • there is no evidence American soldiers died looking for Sergeant Bergdahl.
  • ...4 more annotations...
  • Again, these are the findings of the Army's investigation into Sergeant Bergdahl's disappearance; they are not the apologies or fantasies of his legal team, Marines turned anti-war peaceniks like myself, or Obama fawning conspirators. The details behind these facts are contained in the Army's report, authored by Major General Kenneth Dahl, which has not been publically released, but hopefully will be made available to the public after Sergeant Bergdahl's preliminary hearing next month or, if the desertion and misbehavior charges are pursued, during his court martial. Just what events Sergeant Bergdahl witnessed that would compel him to risk his life, traveling unarmed through enemy controlled territory, to provide information to an American general, are not presently known. We do know that the unit Sergeant Bergdahl belonged to underwent serious disciplinary actions both before and after Sergeant Bergdahl's capture, that several of his unit's leaders were fired and replaced both prior to and subsequent to his capture, and, from communications between Sergeant Bergdahl and his family prior to his capture, Sergeant Bergdahl was sickened and distraught over the actions of his unit, including its possible complicity in the death of an Afghan child. It is quite possible Sergeant Bergdahl left his unit to report a war crime(s) or other serious crime(s) committed by American forces. He may have been trying to report a failure of his immediate leadership or it may have been something, in hindsight, that we would now consider trivial. Such an action on Sergeant Bergdahl's part would help to explain why his former platoon mates, quite possibly the very men whom Sergeant Bergdahl left to report on, have been so forceful in their condemnation of him, so determined not to forgive him for his disappearance, and so adamant in their denial to show compassion for his suffering while a prisoner of war.
  • This knowledge may explain why the Taliban believed Sergeant Bergdahl had fallen behind on a patrol rather than deserted. If he truly was deserting, than Sergeant Bergdahl most likely would have told the Taliban disparaging information about US forces in an attempt to harvest friendship and avoid torture, but if he was on a personal mission to report wrongdoing, than he certainly would not relate such information to the enemy. This may explain why Sergeant Bergdahl told his captors a lie rather than disclose his voluntary departure from the platoon outpost. This would also justify why Sergeant Bergdahl left his base without his weapon or equipment. Before his departure from his outpost, Sergeant Bergdahl asked his team leader what would happen if a soldier left the base, without permission, with his weapon and other issued gear. Sergeant Bergdahl's team leader replied that the soldier would get in trouble. Understanding Sergeant Bergdahl as not deserting, but trying to serve the Army by reporting wrongdoing to another base would explain why he chose not to carry his weapon and issued gear off of the outpost. Sergeant Bergdahl was not planning on deserting, i.e. quitting the army and the war, and he did not want to get in trouble for taking his weapon and issued gear with him on his unauthorized mission.
  • This possible exposure to senior leaders, and ultimately the media and American public, of civilian deaths or other offenses would also account for the non-disclosure agreement Sergeant Bergdahl's unit was forced to sign after his disappearance. Non-disclosure agreements may be common in the civilian world and do exist in military fields such as special operations and intelligence, but for regular infantry units they are rare. Sergeant Bergdahl's capture by the enemy, possibly while en-route to reveal war crimes or other wrongdoings, would certainly be the type of event an embarrassed chain of command would attempt to hide. Such a cover up would certainly not be unprecedented in American military history.Similar to the assertions made by many politicians, pundits and former soldiers that Sergeant Bergdahl deserted because, to paraphrase, he hated America and wanted to join the Taliban, the notion that he cooperated and assisted the Taliban while a prisoner of war has also been debunked by the Army's investigation. We know that Sergeant Bergdahl resisted his captors throughout his five years as a prisoner of war. His dozen escape attempts, with full knowledge of the risks involved in recapture, are in keeping with the Code of Conduct all American service members are required to abide by during captivity by the enemy.
  • In his own words, Sergeant Bergdahl's description of his treatment reveals a ghastly and barbaric five years of non-stop isolation, exposure, malnutrition, dehydration, and physical and psychological torture. Among other reasons, his survival must be attested to an unshakeable moral fortitude and inner strength. The same inherent qualities that led him to seek out an American general to report "disturbing circumstances" could well be the same mental, emotional and spiritual strengths that kept him alive through half a decade of brutal shackling, caging, and torture. It is my understanding the US military's prisoner of war and survival training instructors are studying Sergeant Bergdahl's experience in order to better train American service members to endure future experiences as prisoners of war. Susan Rice, President Obama's National Security Advisor, was roundly lampooned and criticized last year for stating that Sergeant Bergdahl "served with honor and distinction". It is only the most callous and politically craven among us who, now understanding the torture Sergeant Bergdahl endured, his resistance to the enemy that held him prisoner, and his adherence to the US military's Code of Conduct for five years in horrific conditions, would argue that he did not serve with honor and distinction.
  •  
    There's more article than I highlighted and it's worth reading. Obama should step in here and issue a full pardon to end this young man's torment by Army generals playing to the press. Let's recall here that Obama, when asked to prosecute Bush II officials for war crimes, said he would rather look forward rather than backward. Sgt. Bergdahl, who committed no war crime, deserves no less. Five years of torture and malnutrition as a POW is more punishment than anyone deserves.
Paul Merrell

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
Paul Merrell

UK Government Admits Intelligence Services Allowed To Break Into Any System, Anywhere, For Any Reason | Techdirt - 0 views

  • Recently, Techdirt noted that the FBI may soon have permission to break into computers anywhere on the planet. It will come as no surprise to learn that the US's partner in crime, the UK, granted similar powers to its own intelligence services some time back. What's more unexpected is that it has now publicly said as much, as Privacy International explains: The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they are legally justifed to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime. That important admission was made in what the UK government calls its "Open Response" to court cases started last year against GCHQ. Here's what it reveals, according to Privacy International:
  • Buried deep within the document, Government lawyers claim that while the intelligence services require authorisation to hack into the computer and mobile phones of "intelligence targets", GCHQ is equally permitted to break into computers anywhere in the world even if they are not connected to a crime or a threat to national security. Moreover: The intelligence services assert the right to exploit communications networks in covert manoeuvres that severely undermine the security of the entire internet. The deployment of such powers is confirmed by recent news stories detailing how GCHQ hacked into Belgacom using the malware Regin, and targeted Gemalto, the world's largest maker of SIM cards used in countries around the world.
  • What's important about this revelation is not just the information itself -- many people had assumed this was the case -- but the fact that once more, bringing court cases against the UK's GCHQ has ferreted out numerous details that were previously secret. This shows the value of the strategy, and suggests it should be used again where possible.
Paul Merrell

Bureau files ECHR case challenging UK government over surveillance of journalists' communications | The Bureau of Investigative Journalism - 0 views

  • The Bureau of Investigative Journalism is asking a European court to rule on whether UK legislation properly protects journalists’ sources and communications from government scrutiny and mass surveillance. The Bureau’s application was filed with the European Court of Human Rights on Friday. If the court rules in favour of the application it will force the UK government to review regulation around the mass collection of communications data. The action follows concerns about the implications to journalists of some of the revelations that have come out of material leaked by Edward Snowden. These have made it clear that by using mass surveillance techniques and programs such as Tempora government agencies can not only collect, store and scrutinise the content of electronic communications but also analyse masses of metadata – the details about where digital communications such as emails originate and the subject area of those communications. Gavin Millar QC, who is working on the case with the Bureau, believes UK authorities are routinely carrying out such data collection and analysis and says this enables a sophisticated picture to be developed of a journalist’s or organisation’s network of contacts, sources and lines of enquiry as well as materials, subjects and persons of interest to them.
  • The Bureau’s Christopher Hird says: “We understand why the government feels the need to have the power of interception. “But our concern is that the existing regulatory regime to control the interception of communications data – such as phone calls and emails – by organisations such as GCHQ does not provide sufficient safeguards to ensure the protection of journalists’ sources, and as a result is a restriction on the operation of a free press.” The collection of data by authorities is governed in the UK by the Regulation of Investigatory Powers Act, known as RIPA. This is primarily focused on internal communications. Many of the investigations undertaken by Bureau journalists involve foreign sources and stories, which are more vulnerable to interception as RIPA does not provide the same safeguards as it does for internal communications. The Bureau is working with lawyers from Doughty Street chambers and law firm Leigh Day, who have advised that there is little protection or rigorous scrutiny provided by current UK legislation for these “external” communications.
  •  
    Note that this case was filed with the ECHR in September 2014.  Quote from a prior decision of the ECHR involving Dutch journalists and government surveillance that will give UK government a steep hill to climb in persuading the ECHR to give GCHQ a pass:  "…where, as here, a power of the executive is exercised in secret, the risks of arbitrariness are evident. Since the implementation in practice of measures of secret surveillance is not open to scrutiny by the individuals concerned or the public at large, it would be contrary to the rule of law for the legal discretion granted to the executive to be expressed in terms of an unfettered power. Consequently, the law must indicate the scope of any such discretion conferred on the competent authorities and the manner of its exercise with sufficient clarity, having regard to the legitimate aim of the measure in question, to give the individual adequate protection against arbitrary interference."
Paul Merrell

Court Accepts DOJ's 'State Secrets' Claim to Protect Shadowy Neocons: a New Low - The Intercept - 0 views

  • A truly stunning debasement of the U.S. justice system just occurred through the joint efforts of the Obama Justice Department and a meek and frightened Obama-appointed federal judge, Edgardo Ramos, all in order to protect an extremist neocon front group from scrutiny and accountability. The details are crucial for understanding the magnitude of the abuse here. At the center of it is an anti-Iranian group calling itself “United Against Nuclear Iran” (UANI), which is very likely a front for some combination of the Israeli and U.S. intelligence services. When launched, NBC described its mission as waging “economic and psychological warfare” against Iran. The group was founded and is run and guided by a roster of U.S., Israeli and British neocon extremists such as Joe Lieberman, former Bush Homeland Security adviser (and current CNN “analyst”) Fran Townsend, former CIA Director James Woolsey, and former Mossad Director Meir Dagan. One of its key advisers is Olli Heinonen, who just co-authored a Washington Post Op-Ed with former Bush CIA/NSA Director Michael Hayden arguing that Washington is being too soft on Tehran.
  • This group of neocon extremists was literally just immunized by a federal court from the rule of law. That was based on the claim — advocated by the Obama DOJ and accepted by Judge Ramos — that subjecting them to litigation for their actions would risk disclosure of vital “state secrets.” The court’s ruling was based on assertions made through completely secret proceedings between the court and the U.S. government, with everyone else — including the lawyers for the parties — kept in the dark. In May 2013, UANI launched a “name and shame” campaign designed to publicly identify — and malign — any individuals or entities enabling trade with Iran. One of the accused was the shipping company of Greek billionaire Victor Restis, who vehemently denies the accusation. He hired an American law firm and sued UANI for defamation in a New York federal court, claiming the “name and shame” campaign destroyed his reputation.
  • Up until that point, there was nothing unusual about any of this: just a garden-variety defamation case brought in court by someone who claims that public statements made about him are damaging and false. That happens every day. But then something quite extraordinary happened: In September of last year, the U.S. government, which was not a party, formally intervened in the lawsuit, and demanded that the court refuse to hear Restis’s claims and instead dismiss the lawsuit against UANI before it could even start, on the ground that allowing the case to proceed would damage national security. When the DOJ intervened in this case and asserted the “state secrets privilege,” it confounded almost everyone. The New York Times’s Matt Apuzzo noted at the time that “the group is not affiliated with the government, and lists no government contracts on its tax forms. The government has cited no precedent for using the so­-called state­ secrets privilege to quash a private lawsuit that does not focus on government activity.” He quoted the ACLU’s Ben Wizner as saying: “I have never seen anything like this.” Reuters’s Allison Frankel labeled the DOJ’s involvement a “mystery” and said “the government’s brief is maddeningly opaque about its interest in a private libel case.”
  • ...2 more annotations...
  • But in this case, there is no apparent U.S. government conduct at issue in the lawsuit. At least based on what they claim about themselves, UANI is just “a not-for-profit, non-partisan, advocacy group” that seeks to “educate” the public about the dangers of Iran’s nuclear program. Why would such a group like this even possess “state secrets”? It would be illegal to give them such material. Or could it be that the CIA or some other U.S. government agency has created and controls the group, which would be a form of government-disseminated propaganda, which happens to be illegal? What else could explain the basis for the U.S. government’s argument that allowing UANI to be sued would risk the disclosure of vital “state secrets” besides a desire to cover up something quite untoward if not illegal? What “state secrets” could possibly be disclosed by suing a nice, little “not-for-profit, non-partisan, advocacy group”?
  • This sham worked. This week, Judge Ramos issued his ruling dismissing the entire lawsuit (see below). As a result of the DOJ’s protection, UANI cannot be sued. Among other things, it means this group of neocon extremists now has a license to defame anyone they want. They can destroy your reputation with false accusations in a highly public campaign, and when you sue them for it, the DOJ will come in and whisper in the judge’s ear that national security will be damaged if — like everyone else in the world — UANI must answer in a court of law for their conduct. And subservient judicial officials like Judge Ramos will obey the U.S. government’s dictates and dismiss your lawsuit before it begins, without your having any idea why that even happened. Worse, in his written ruling, the judge expressly acknowledges that dismissal of the entire lawsuit at the start on secrecy grounds is what he calls a “harsh sanction,” and also acknowledges that “it is particularly so in this case because Plaintiffs not only do not get their day in court, but cannot be told why” (emphasis added). But he does it anyway, in a perfunctory 18-page opinion that does little other than re-state some basic legal principles, and then just concludes that everything the government whispered in his ear should be accepted.
  •  
    Unless the district court decision is overturned by a higher court, the Restis case looks to be over. The secrecy concerns of the Dark State trump justice, again. It should be noted that the Constitution is silent on the issue of state secrets (the so-called "state secrets privilege" was manufactured from whole cloth by the Supreme Court in the early 1950s). On the other hand, several provisions of the Constitution expressly require that justice be done, not the least of which is the Due Process clause.  
Paul Merrell

Wikimedia v. NSA: Another Court Blinds Itself to Mass NSA Surveillance | Electronic Frontier Foundation - 0 views

  • We all know justice is blind. But that is supposed to mean that everyone before it is treated equally, not that the justice system must close its eyes and refuse to look at important legal issues facing Americans.  Yet the government continues to convince courts that they cannot consider the constitutionality of its behavior in national security cases and, last week, in an important case for anyone who has ever used Wikipedia, another judge agreed with that position.  A federal district judge in Maryland dismissed Wikimedia v. NSA, a case challenging the legality of the NSA’s “upstream” surveillance—mass surveillance of Internet communications as they flow through the Internet backbone. The case was brought by our friends at the ACLU on behalf of nine plaintiffs, including human rights organizations, members of the media, and the Wikimedia Foundation.1 We filed a brief in the case, too, in support of Wikimedia and the other plaintiffs. The judge dismissed the case based on a legal principle called standing. Standing is supposed to ensure, among other things, that the party bringing the lawsuit has suffered a concrete harm, caused by the party being sued, and that the court can resolve the harm with a favorable ruling.
  • But the U.S. government has taken this doctrine, which was intended to limit the cases federal courts hear to actual live controversies, and turned it into a perverse shell game in surveillance cases—essentially arguing that because aspects of the surveillance program are secret, plaintiffs cannot prove that their communications were actually, in fact, intercepted and surveilled. And without that proof, the government argues, there’s no standing, because plaintiffs can’t show that they’ve suffered harm. Sadly, like several other courts before it, the judge agreed to this shell game and decided that it couldn’t decide whether the constitutional rights of Wikimedia and the other plaintiffs were violated.  This game is mighty familiar to us at EFF, but that doesn’t make it any less troubling. In our system, the courts have a fundamental obligation to conclusively determine the legality of government action that affects individuals’ constitutional rights. For years now, plaintiffs have tried to get the courts to simply issue a ruling on the merits of NSA surveillance programs. And for years, the government has successfully persuaded the courts to rely on standing and related doctrines to avoid doing so. That is essentially what happened here. The court labeled as “speculative” Wikimedia’s claim that, at a minimum, even one of its approximately one trillion Internet communications had been swept up in the NSA’s upstream surveillance program. Remember, this is a program that, by the government’s own admission, involves the searching and scanning of vast amounts of Internet traffic at key Internet junctures on the Internet’s backbone. Yet in court’s view, Wikimedia’s allegations describing upstream—based on concrete facts, taken from government documents— coupled with a plaintiff that engages in a large volume of internet communications were not enough to state a “plausible” claim that Wikimedia had been surveilled.
  • On the way to reaching that conclusion, and putting on its blindfold, the court made a number of mistakes. The Government’s Automated Eyes Are Still Government Eyes First, it appears the court fundamentally misunderstood Wikimedia’s claim about upstream surveillance and, in particular, “about surveillance.” As Wikimedia alleged, “about surveillance” (a specific aspect of upstream surveillance that searches the content of communications for references to particular email addresses or other identifiers) amounts to “the digital analogue of having a government agent open every piece of mail that comes through the post to determine whether it mentions a particular word or phrase.” The court held, however, that this type of “about” surveillance was “targeted insofar as it makes use of only those communications that contain information matching the tasked selectors,” like email addresses. But what the government "makes use of" is entirely beside the point—it is the scanning of the communications for the tasked selectors in the first place that is the problem.  To put it into a different context, the government conducts a search when it enters into your house and starts rifling through your files—not just when it finds something it wants to keep. The government's ultimate decision to “make use of” the communications it finds interesting is irrelevant. It is the search of the communications that matters.
  • ...2 more annotations...
  • Back of the Envelope Gymnastics Another troubling aspect of the court’s decision was its attack on the probabilities Wikimedia assigned to the likelihood of its communications being intercepted. Given that Wikimedia engages in a large volume of Internet communications, Wikimedia alleged that—even assuming a .00000001% chance that any one particular communication is intercepted—it would still have a 99.9999999999% of having one of its communications intercepted. The statistic was used to illustrate that, even assuming very low probabilities for interception, there was still a near-certainty that Wikipedia’s traffic was collected. But the court attacked Wikimedia’s simple statistical analysis (and the attack tracked, to a great degree, arguments made in the government’s declarations that the court purportedly did not consider). The court seemed to believe it had seized upon a great flaw in Wikimedia’s case by observing that, if the probability of any given communication being intercepted were decreased 100% or 1000%, the probability of one of Wikimedia’s communications being intercepted would similarly drop. The “mathematical gymnastics” the court believed it had unearthed were nothing more than Wikimedia using an intentionally small (and admittedly arbitrary) probability to illustrate the high likelihood that its communications had been swept up. But even if the court disagreed with the probabilities Wikimedia relied on, it’s not at all clear why that would justify dismissing the case at the outset. If it turned out, after development of the record, that the probabilities were off, then dismissal might be appropriate. But the court cut the case off before Wikimedia had the opportunity to introduce evidence or other facts that might support the probability they assigned.
  • Someone Else Probably Has Standing, Right? Perhaps most troubling was the court’s mistaken belief that the legality of upstream surveillance could be challenged in other ways, beyond civil cases like Wikimedia or our ongoing case, Jewel v. NSA. The court asserted its decision would not insulate upstream from judicial review, which—according to the court—could still receive judicial scrutiny through (1) review from the Foreign Intelligence Surveillance Court (FISC), (2) a challenge by a criminal defendant, or (3) a challenge from an electronic service provider. None of these options is truly a viable alternative, however. First, the FISC (until very recently) did not have adversarial proceedings—it only heard from the government, and its proceedings remain both far more limited and more secretive than a regular court’s. Second, a challenge from a criminal defendant won’t work either, because, to date, the government has explicitly refused to disclose—even where defendants are notified of the use of FISA surveillance—whether their communications were obtained using upstream surveillance. And, finally, in the nearly 15 years (or more) the government has conducted upstream surveillance, we’re not aware of any service provider that has challenged the legality of the practice. Indeed, given that upstream is done with the cooperation of telecoms like AT&T and Verizon—the same telcos that did not challenge the NSA’s bulk collection of Americans’ call records for over a decade—we're not holding our breath for a challenge anytime soon. Instead, we need the courts to tackle these cases. Upstream surveillance presents unique constitutional issues that no federal court has seriously addressed. It's time the federal courts stepped up to the challenge.
  •  
    The notion that the government can intentionally violate the privacy rights of its citizens yet a court find that those citizens have no right to seek redress announces a view that privacy rights are hollow --- that those wronged by government malfeasance have no remedy in the courts of our nation. That is a view that must be thrown in the dustbins of history if freedom is to be preserved. 
Paul Merrell

Appeals court clears hurdle for NSA | TheHill - 0 views

  • A federal appeals court Tuesday eliminated a possible roadblock for the National Security Agency (NSA), delaying a judge’s order to halt the agency's controversial data collection.The order from the U.S. Court of Appeals for the D.C. Circuit sets the NSA on a path to wind down its bulk gathering of Americans’ phone records later this month.ADVERTISEMENTOn Monday, Judge Richard Leon of the U.S. District Court for D.C. had sought to end the program immediately, before a Nov. 29 deadline. Leon’s order would have ended the NSA’s collection of records about one California lawyer, though doing that might have required taking the entire system offline, he acknowledged.Late Tuesday afternoon, however, the appeals court stepped in and issued a stay on that order, preventing it from taking effect. The move from the appeals court was widely expected, given that Leon's order would merely kill the program three weeks early.“The purpose of this administrative stay is to give the court sufficient opportunity to consider the merits of the motion for a stay,” it said in a brief order, “and should not be construed in any way as a ruling on the merits of that motion.”
  • Plaintiffs suing the Obama administration, led by conservative legal activist Larry Klayman, will have until noon Friday to submit arguments on whether the program should be shut down immediately. The government has until the following Monday. Few watchers expect the court to interfere with the NSA’s own schedule, which will take the phone records program offline Nov. 29.Under the current program, the spy agency collects metadata records about millions of Americans’ phone calls, which include the numbers involved in a call, when the call occurred and how long it lasted. The records do not include content about people’s conversations.This summer, Congress passed legislation ending the current system and forcing the NSA to move to a new process in which it requests a narrow set of records from individual phone companies.
  • On Monday, the agency told lawmakers on Capitol Hill that it has “successfully developed a technical architecture to support the new program” and that testing is “underway.”In his Monday order, Leon said that the NSA should not wait until the new system was up and running, since “even one day” of the current program poses a threat to the Constitution. 
  •  
    So the Court of Appeals will sit on it until the end of the month and then rule that the case is moot. 
Paul Merrell

Judge Leon's Poignant, Yet Pointless, Injunction in Klayman | Just Security - 0 views

  • A long time 12 days ago, I wrote a post sharply criticizing the Second Circuit for deciding not to decide the Fourth Amendment question in ACLU v. Clapper, which arises from the continuation of the NSA’s bulk collection of phone records until the end of the six-month transitional period created by the USA Freedom Act (a period that expires on November 29). In that post, I called the Court of Appeals “feckless” for concluding that, in light of the program’s imminent expiration, resolution of the underlying Fourth Amendment claim would be “fruitless.” As a result, readers may well assume that I think highly of the opinion issued yesterday by DC District Judge Richard Leon, which did reach the Fourth Amendment question, and which, along lines similar to his December 2013 ruling (which the DC Circuit subsequently vacated for lack of standing), held that the program violates the Fourth Amendment, and enjoined its continuing operation as applied to two plaintiffs. As the old saying goes, “nope.” Instead, for reasons I elaborate upon below the fold, I fear that things have ended up precisely backwards — with the Second Circuit refusing to issue a ruling that could have had significant consequences, and with Judge Leon entering an injunction that will have precisely no impact (other than to waste a lot government lawyers’ and law clerks’ time) — and that could well lead future judges to stay their hand in a similar circumstance when they ought not to.
Paul Merrell

Secret Law Isn't the Public's Fault | Just Security - 0 views

  • Officials in this administration have a funny way of blaming the victim. Did the CIA spy on Senate intelligence committee staffers who were investigating the agency’s torture program? No. OK, yes, you caught us — but the staffers were poking their nose into the CIA’s business. Are communities in some cities suffering from an uptick in crime rates? That must be because they were critical of police practices, and so the police are afraid to do their job. Are American Muslims disproportionately singled out for law enforcement scrutiny? It wouldn’t be necessary if they did a better job of identifying and rooting out the terrorists in their midst. Did a drone strike kill a 16-year-old boy who wasn’t on any target list but happened to be the son of alleged al-Qaeda operative Anwar al-Aulaqi? I guess he “should have had a more responsible father,” as then-White House press secretary Robert Gibbs helpfully explained. At the annual conference of the American Bar Association’s Standing Committee on National Security Law, officials were at it again. Both the CIA’s General Counsel, Caroline Krass, and the acting head of the Justice Department’s Office of Legal Counsel (OLC), Karl Thompson, observed that agencies are issuing fewer requests for formal OLC opinions and are seeking “informal,” unwritten advice from OLC instead. This trend undermines the public’s ability to obtain OLC opinions through FOIA requests. And, according to Krass, we have no one to blame but ourselves:
  • I do think one reason is a focus the office has gotten [in] the past 10 years or so in the public which has now led to Freedom of Information Act requests pretty much anytime the administration adopts a position in the context of domestic law or national security that could be [or] seems a little bit edgy or slightly controversial, immediately the request for the OLC opinion comes. What were we thinking? Well, we might have had in mind OLC officials’ own acknowledgment that their opinions constitute the working law of the executive branch, and are binding on agencies in the same manner that a court’s decision would be. When the public expresses interest in a controversial court opinion, that isn’t cited as a reason to move the judicial system into the shadows. To the contrary, it’s well-understood that the public has a right to know how judges are interpreting the law. That’s true regardless of whether the law deals with the rights and obligations of private parties or (as is usually the case with OLC opinions) the authorities of the government.  It’s high time we stop pretending that OLC opinions are merely attorneys’ advice, and thereby entitled to confidentiality. A private person is free to accept or reject her attorney’s advice. By contrast, as Thompson recognized, OLC opinions — even informal, unwritten ones — are “binding by custom and practice . … People are supposed to and do follow [them].” Moreover, in ordinary circumstances, it is no defense to criminal charges that the defendant’s lawyer gave bad advice. OLC opinions, on the other hand, confer effective immunity, as the Justice Department will not prosecute any official who acted in reliance on OLC’s conclusions.
  • The government nonetheless argues, and many courts have agreed, that OLC opinions are exempt from disclosure under FOIA because they are “deliberative” and “pre-decisional.” This assessment conflates two distinct decisions: the decision of an agency whether to adopt a course of conduct, and OLC’s decision regarding how to interpret the law. The latter decision may be one factor — along with other, non-legal factors, such as political viability, financial cost, and the existence of competing priorities — in the agency’s “deliberations” on the former. The agency ultimately must decide whether to move forward with a policy. But on the question of how the law should be interpreted, it is OLC, not the agency, which has the final word. If the agency were to issue a different legal interpretation, there is no question that OLC’s would take precedence, and the agency would be courting legal jeopardy by adopting a course of action in tension with OLC’s reading of the law. Perhaps the solution is simply to require the government to abide by its own characterization. If OLC opinions are to be given the status of deliberative documents and/or legal advice, so be it; but in that case, they cannot be binding on any agency or official, nor can they mitigate any official’s criminal or civil liability (unless they genuinely negate a required state of mind). If, on the other hand, the government wishes to treat OLC opinions as authoritative and a shield against prosecution or civil suit, then they must be called what they are — law — and made available to the public. Until that happens, the public will remain a victim of secret law, and there will be no one but the administration to blame.
Paul Merrell

Classified Report on the C.I.A.'s Secret Prisons Is Caught in Limbo - The New York Times - 0 views

  • A Senate security officer stepped out of the December chill last year and delivered envelopes marked “Top Secret” to the Pentagon, the C.I.A., the State Department and the Justice Department. Inside each packet was a disc containing a 6,700-page classified report on the C.I.A.’s secret prison program and a letter from Senator Dianne Feinstein, urging officials to read the report to ensure that the lessons were not lost to time. Today, those discs sit untouched in vaults across Washington, still in their original envelopes. The F.B.I. has not retrieved a copy held for it in the Justice Department’s safe. State Department officials, who locked up their copy and marked it “Congressional Record — Do Not Open, Do Not Access” as soon as it arrived, have not read it either. Continue reading the main story Related Coverage document The Senate Committee’s Report on the C.I.A.’s Use of TortureDEC. 9, 2014 Panel Faults C.I.A. Over Brutality and Deceit in Terrorism InterrogationsDEC. 9, 2014 Senate Votes to Turn Presidential Ban on Torture Into LawJUNE 16, 2015 Outside Psychologists Shielded U.S. Torture Program, Report FindsJULY 10, 2015 Nearly a year after the Senate released a declassified 500-page summary of the report, the fate of the entire document remains in limbo, the subject of battles in the courts and in Congress. Until those disputes are resolved, the Justice Department has prohibited officials from the government agencies that possess it from even opening the report, effectively keeping the people in charge of America’s counterterrorism future from reading about its past. There is also the possibility that the documents could remain locked in a Senate vault for good.
  • In a letter to Attorney General Loretta E. Lynch last week, Ms. Feinstein, a California Democrat, said the Justice Department was preventing the government from “learning from the mistakes of the past to ensure that they are not repeated.”Although Ms. Feinstein is eager to see the document circulated, the Senate is now under Republican control. Her successor as head of the Intelligence Committee, Senator Richard M. Burr of North Carolina, has demanded that the Obama administration return every copy of the report. Mr. Burr has declared the report to be nothing more than “a footnote in history.”It was always clear that the full report would remain shielded from public view for years, if not decades. But Mr. Burr’s demand, which means that even officials with top security clearances might never read it, has reminded some officials of the final scene of “Raiders of the Lost Ark,” when the Ark of the Covenant is put into a wooden crate alongside thousands of others in a government warehouse of secrets.
  • The full report is not expected to offer evidence of previously undisclosed interrogation techniques, but the interrogation sessions are said to be described in great detail. The report explains the origins of the program and names the officials involved. The full report also offers details on the role of each agency in the secret prison program.The Justice Department, which played a central role in approving the interrogation methods, has even prohibited its own officials from reading the full report.“The Department of Justice was among those parts of the executive branch that were misled about the program, and D.O.J. officials’ understanding of this history is critical to its institutional role going forward,” Ms. Feinstein wrote to the Justice Department last week in a letter she signed with Senator Patrick J. Leahy of Vermont, the top Democrat on the Judiciary Committee.In court, Justice Department lawyers have agreed with Mr. Burr’s contention that the document belongs to Congress. As evidence, they point to an agreement between the C.I.A. and the Senate as the Intelligence Committee began its lengthy investigation. The Senate was under Democratic control at the time.
  • ...2 more annotations...
  • The American Civil Liberties Union has sued the C.I.A. for access to the document, and at this point the case hinges on who owns it. Senate documents are exempt from public records laws, but executive branch records are not. In May, a federal judge ruled that even though Ms. Feinstein distributed the report to the executive branch, the document still belongs to Congress. That decision is under appeal, with court papers due this month.Justice Department officials defend their stance, saying that handling the document at all could influence the outcome of the lawsuit. They said that a State Department official who opened the report, read it and summarized it could lead a judge to determine that the document was an executive branch record, altering the lawsuit’s outcome. The Justice Department has also promised not to return the records to Mr. Burr until a judge settles the matter.“It’s quite bizarre, and I cannot think of a precedent,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. He said there are any number of classified Senate documents that are shared with intelligence agencies and remain as congressional records, even if they are read by members of the executive branch.
  • The agreement says that any “documents, draft and final recommendations, reports or other materials” generated during the investigation are congressional documents. “As such these records are not C.I.A. records under the Freedom of Information Act,” the agreement says.The A.C.L.U. argues that agreement was void once Ms. Feinstein sent the report to the government agencies. Because she clearly intended the executive branch to use the report, the A.C.L.U. contends, the committee gave up control of the document.If Mr. Burr were to succeed in getting copies of the report returned to the Intelligence Committee, Mr. Aftergood said, he could slowly make it irrelevant.“The longer that it’s buried, the less relevant it becomes,” he said.
  •  
    If it is ultimately found that the report is an Executive Branch record, then the FOIA requires disclosure of all "segregable portions" that are not properly classified.  
« First ‹ Previous 301 - 320 of 342 Next › Last »
Showing 20 items per page