Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching ""war on drugs"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Marijuana Legalization in CO, WA, AK, OR, and Washington D.C.: So Far, So Good | Drug Policy Alliance - 0 views

  • As Arizona, California, Maine, Massachusetts, and Nevada prepare to vote on the legalization of marijuana for adults 21 and over in a few weeks, all eyes are on the initial outcomes of those states that have already legalized marijuana. A new report from the Drug Policy Alliance finds a massive drop in marijuana arrests, no increase in youth marijuana use, no increase in traffic fatalities, and major fiscal benefits in states with legalized marijuana.
  • The new report reveals that statewide surveys of youth in Colorado, Washington, Alaska, and Oregon found that there were no significant increases in youth marijuana use post-legalization. Tax revenues in Colorado, Washington, and Oregon have all exceeded initial revenue estimates, totaling half a billion dollars in new revenue for those states. (Retail sales have not yet begun in Alaska.) Legalization has not led to more dangerous road conditions, as traffic fatality rates have remained stable in Colorado, Washington, Alaska, and Oregon. Arrests in all states and Washington, D.C. have plummeted since legalization, saving those jurisdictions millions of dollars and preventing the criminalization of thousands of people. Legalization, however, did not abate the disproportionate enforcement of marijuana laws against black people. While thousands less are being arrested, blacks are still arrested at vastly disproportionate rates, even though white people use and sell marijuana at similar rates. By shifting away from counterproductive marijuana arrests and focusing instead on public health, states that have legalized marijuana are diminishing many of the worst harms of the war on drugs, while managing to raise substantial new revenue for their state.
Paul Merrell

Tomgram: Todd Miller, The Creation of a Border Security State | TomDispatch - 0 views

  • Sometimes you really do need a map if you want to know where you are.  In 2008, the ACLU issued just such a map of this country and it’s like nothing ever seen before.  Titled “the Constitution-Free Zone of the United States,” it traces our country’s borders.  Maybe you’re already tuning out.  After all, you probably don’t think you live on or near such a border.  Well, think again.  As it happens, in our brave, new, post-9/11 world, as long as we’re talking “homeland security” or “war on terror,” anything can be redefined.  So why not a border? Our borders have, conveniently enough, long been Constitution-free zones where more or less anything goes, including warrantless searches of various sorts.  In the twenty-first century, however, the border itself, north as well as south, has not only been increasingly up-armored, but redefined as a 100-mile-wide strip around the United States (and Alaska).  In other words -- check that map again -- our “borders” now cover an expanse in which nearly 200 million Americans, or two-thirds of the U.S. population, live.  Included are nine of the 10 largest metropolitan areas.  If you live in Florida, Maine, or Michigan, for example, no matter how far inland you may be, you are “on the border.”
  • Imagine that.  And then imagine what it means.  U.S. Customs and Border Protection, as Todd Miller points out today, is not only the largest law enforcement agency in the country you know next to nothing about, but the largest, flat and simple.  Now, its agents can act as if the Constitution has been put to bed up to 100 miles inland anywhere.  This, in turn, means -- as the ACLU has written -- that at new checkpoints and elsewhere in areas no American would once have considered borderlands, you can be stopped, interrogated, and searched “on an everyday basis with absolutely no suspicion of wrongdoing.” Under the circumstances, it’s startling that, since the ACLU made its case back in 2008, this new American reality has gotten remarkably little attention.  So it’s lucky that TomDispatch regular Miller's invaluable and gripping book, Border Patrol Nation: Dispatches from the Front Lines of Homeland Security, has just been published.  It’s an eye opener, and it’s about time that “border” issues stopped being left to those on the old-fashioned version of the border and immigration mavens.  It’s a subject that, by definition, now concerns at least two-thirds of us in a big way.
  • Border Security Expo 2014 catches in one confined space the expansiveness of a “booming” border market. If you include “cross-border terrorism, cyber crime, piracy, [the] drug trade, human trafficking, internal dissent, and separatist movements,” all “driving factor[s] for the homeland security market,” by 2018 it could reach $544 billion globally. It is here that U.S. Homeland Security officials, local law enforcement, and border forces from all over the world talk contracts with private industry representatives, exhibit their techno-optimism, and begin to hammer out a future of ever more hardened, up-armored national and international boundaries. The global video surveillance market alone is expected to be a $40 billion industry by 2020, almost three times its $13.5 billion value in 2013. According to projections, 2020 border surveillance cameras will be capturing 3.4 trillion video hours globally. In case you were wondering, that’s more than 340 million years of video footage if you were watching 24 hours a day.
  • ...3 more annotations...
  • It is in the U.S. borderlands that, as anthropologist Josiah Heyman once wrote, the U.S. government’s modern expertise in creating and tracking "a marked population” was first developed and practiced. It involved, he wrote prophetically, “the birth and development of a... means of domination, born of the mating between moral panics about foreigners and drugs, and a well-funded and expert bureaucracy.” You may not be able to watch them at the Border Security Expo, but in those borderlands -- make no bones about it -- the Department of Homeland Security, with its tripartite missions of drug interdiction, immigration enforcement, and the war on terror, is watching you, whoever you are. And make no bones about this either: our borders are widening and the zones in which the watchers are increasingly free to do whatever they want are growing.
  • In March, U.S. Customs and Border Protection (CBP) awarded a $145 million contract to that Israeli company through its U.S. division. Elbit Systems prides itself on having spent “10+ years securing the world’s most challenging borders,” above all deploying similar “border protection systems” to the separation wall between Israel and Palestine. It is now poised to enter U.S. indigenous lands.
  • Now, thanks to the Elbit Systems contract, a new kind of border will continue to be added to this layering.  Imagine part of the futuristic Phoenix exhibition hall leaving Border Expo with the goal of incorporating itself into the lands of a people who were living here before there was a “New World,” no less a United States or a Border Patrol. Though this is increasingly the reality from Brownsville, Texas, to San Diego, California, on Tohono O’odham land a post-9/11 war posture shades uncomfortably into the leftovers from a nineteenth century Indian war.  Think of it as the place where the homeland security state meets its older compatriot, Manifest Destiny.
Gary Edwards

The Stunning Hypocrisy of the U.S. Government - BlackListedNews.com - 1 views

  • Please read this rather good summary in this morning’s New York Times of the worldwide debate Snowden has enabled – how these disclosures have “set off a national debate over the proper limits of government surveillance” and “opened an unprecedented window on the details of surveillance by the NSA, including its compilation of logs of virtually all telephone calls in the United States and its collection of e-mails of foreigners from the major American Internet companies, including Google, Yahoo, Microsoft, Apple and Skype” – and ask yourself: has Snowden actually does anything to bring “injury to the United States”, or has he performed an immense public service?
  • The irony is obvious: the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens, are now accusing the person who exposed it of “espionage”.
  • It seems clear that the people who are actually bringing “injury to the United States” are those who are waging war on basic tenets of transparency and secretly constructing a mass and often illegal and unconstitutional surveillance apparatus aimed at American citizens – and those who are lying to the American people and its Congress about what they’re doing – rather than those who are devoted to informing the American people that this is being done.
  • ...13 more annotations...
  • The Obama administration leaks classified information continuously. They do it to glorify the President, or manipulate public opinion, or even to help produce a pre-election propaganda film about the Osama bin Laden raid.
  • The Obama administration does not hate unauthorized leaks of classified information. They are more responsible for such leaks than anyone.
  • What they hate are leaks that embarrass them or expose their wrongdoing.
  • The “enemy” they’re seeking to keep ignorant with selective and excessive leak prosecutions are not The Terrorists or The Chinese Communists.
  • It’s the American people.
  • The people who have learned things they didn’t already know are American citizens who have no connection to terrorism or foreign intelligence, as well as hundreds of millions of citizens around the world about whom the same is true.
  • What they have learned is that the vast bulk of this surveillance apparatus is directed not at the Chinese or Russian governments or the Terrorists, but at them.
  • And that is precisely why the US government is so furious and will bring its full weight to bear against these disclosures.
  • What has been “harmed” is not the national security of the US but the ability of its political leaders to work against their own citizens and citizens around the world in the dark, with zero transparency or real accountability.
  • If anything is a crime, it’s that secret, unaccountable and deceitful behavior: not the shining of light on it.
  • At a press conference to discuss the accusations, an N.S.A. spokesman surprised observers by announcing the spying charges against Mr. Snowden with a totally straight face. “These charges send a clear message,” the spokesman said. “In the United States, you can’t spy on people.”
  • “The American people have the right to assume that their private documents will remain private and won’t be collected by someone in the government for his own purposes.”
  • “Only by bringing Mr. Snowden to justice can we safeguard the most precious of American rights: privacy,” added the spokesman, apparently serious.
  •  
    Extremely well linked story from "Washington's Blog" excerpt: "The Government's Hypocrisy Is the Core Problem Congress has exempted itself from the prohibition against trading on inside information … the law that got Martha Stewart and many other people thrown in jail. There are many other ways in which the hypocrisy of the politicians in D.C. are hurting our country. Washington politicians say we have to slash basic services, and yet waste hundreds of billions of dollars on counter-productive boondoggles.  If the politicos just stopped throwing money at corporate welfare queens, military and security boondoggles and pork, harmful quantitative easing, unnecessary nuclear subsidies,  the failed war on drugs, and other wasted and counter-productive expenses, we wouldn't need to impose austerity on the people. The D.C. politicians said that the giant failed banks couldn't be nationalized, because that would be socialism.  Instead of temporarily nationalizing them and then spinning them off to the private sector - or breaking them up - the politicians have bailed them out to the tune of many tens of billions of dollars each year, and created a system where all of the profits are privatized, and all of the losses socialized. Obama and Congress promised help for struggling homeowners, and passed numerous bills that they claimed would rescue the little guy.  But every single one of these bills actually bails out the banks … and doesn't really help the homeowner. The D.C. regulators pretend that they are being tough on the big banks, but are actually doing everything they can to help cover up their sins. Many have pointed out Obama's hypocrisy in slamming Bush's spying programs … and then expanding them  (millions more). And in slamming China's cyber-warfare … while doing the same thing. And - while the Obama administration is spying on everyone in the country - it is at the same time the most secretive administration ever (ba
Paul Merrell

How Edward Snowden Changed Everything | The Nation - 0 views

  • Ben Wizner, who is perhaps best known as Edward Snowden’s lawyer, directs the American Civil Liberties Union’s Speech, Privacy & Technology Project. Wizner, who joined the ACLU in August 2001, one month before the 9/11 attacks, has been a force in the legal battles against torture, watch lists, and extraordinary rendition since the beginning of the global “war on terror.” Ad Policy On October 15, we met with Wizner in an upstate New York pub to discuss the state of privacy advocacy today. In sometimes sardonic tones, he talked about the transition from litigating on issues of torture to privacy advocacy, differences between corporate and state-sponsored surveillance, recent developments in state legislatures and the federal government, and some of the obstacles impeding civil liberties litigation. The interview has been edited and abridged for publication.
  • en Wizner, who is perhaps best known as Edward Snowden’s lawyer, directs the American Civil Liberties Union’s Speech, Privacy & Technology Project. Wizner, who joined the ACLU in August 2001, one month before the 9/11 attacks, has been a force in the legal battles against torture, watch lists, and extraordinary rendition since the beginning of the global “war on terror.” Ad Policy On October 15, we met with Wizner in an upstate New York pub to discuss the state of privacy advocacy today. In sometimes sardonic tones, he talked about the transition from litigating on issues of torture to privacy advocacy, differences between corporate and state-sponsored surveillance, recent developments in state legislatures and the federal government, and some of the obstacles impeding civil liberties litigation. The interview has been edited and abridged for publication.
  • Many of the technologies, both military technologies and surveillance technologies, that are developed for purposes of policing the empire find their way back home and get repurposed. You saw this in Ferguson, where we had military equipment in the streets to police nonviolent civil unrest, and we’re seeing this with surveillance technologies, where things that are deployed for use in war zones are now commonly in the arsenals of local police departments. For example, a cellphone surveillance tool that we call the StingRay—which mimics a cellphone tower and communicates with all the phones around—was really developed as a military technology to help identify targets. Now, because it’s so inexpensive, and because there is a surplus of these things that are being developed, it ends up getting pushed down into local communities without local democratic consent or control.
  • ...4 more annotations...
  • SG & TP: How do you see the current state of the right to privacy? BW: I joked when I took this job that I was relieved that I was going to be working on the Fourth Amendment, because finally I’d have a chance to win. That was intended as gallows humor; the Fourth Amendment had been a dishrag for the last several decades, largely because of the war on drugs. The joke in civil liberties circles was, “What amendment?” But I was able to make this joke because I was coming to Fourth Amendment litigation from something even worse, which was trying to sue the CIA for torture, or targeted killings, or various things where the invariable outcome was some kind of non-justiciability ruling. We weren’t even reaching the merits at all. It turns out that my gallows humor joke was prescient.
  • The truth is that over the last few years, we’ve seen some of the most important Fourth Amendment decisions from the Supreme Court in perhaps half a century. Certainly, I think the Jones decision in 2012 [U.S. v. Jones], which held that GPS tracking was a Fourth Amendment search, was the most important Fourth Amendment decision since Katz in 1967 [Katz v. United States], in terms of starting a revolution in Fourth Amendment jurisprudence signifying that changes in technology were not just differences in degree, but they were differences in kind, and require the Court to grapple with it in a different way. Just two years later, you saw the Court holding that police can’t search your phone incident to an arrest without getting a warrant [Riley v. California]. Since 2012, at the level of Supreme Court jurisprudence, we’re seeing a recognition that technology has required a rethinking of the Fourth Amendment at the state and local level. We’re seeing a wave of privacy legislation that’s really passing beneath the radar for people who are not paying close attention. It’s not just happening in liberal states like California; it’s happening in red states like Montana, Utah, and Wyoming. And purple states like Colorado and Maine. You see as many libertarians and conservatives pushing these new rules as you see liberals. It really has cut across at least party lines, if not ideologies. My overall point here is that with respect to constraints on government surveillance—I should be more specific—law-enforcement government surveillance—momentum has been on our side in a way that has surprised even me.
  • Do you think that increased privacy protections will happen on the state level before they happen on the federal level? BW: I think so. For example, look at what occurred with the death penalty and the Supreme Court’s recent Eighth Amendment jurisprudence. The question under the Eighth Amendment is, “Is the practice cruel and unusual?” The Court has looked at what it calls “evolving standards of decency” [Trop v. Dulles, 1958]. It matters to the Court, when it’s deciding whether a juvenile can be executed or if a juvenile can get life without parole, what’s going on in the states. It was important to the litigants in those cases to be able to show that even if most states allowed the bad practice, the momentum was in the other direction. The states that were legislating on this most recently were liberalizing their rules, were making it harder to execute people under 18 or to lock them up without the possibility of parole. I think you’re going to see the same thing with Fourth Amendment and privacy jurisprudence, even though the Court doesn’t have a specific doctrine like “evolving standards of decency.” The Court uses this much-maligned test, “Do individuals have a reasonable expectation of privacy?” We’ll advance the argument, I think successfully, that part of what the Court should look at in considering whether an expectation of privacy is reasonable is showing what’s going on in the states. If we can show that a dozen or eighteen state legislatures have enacted a constitutional protection that doesn’t exist in federal constitutional law, I think that that will influence the Supreme Court.
  • The question is will it also influence Congress. I think there the answer is also “yes.” If you’re a member of the House or the Senate from Montana, and you see that your state legislature and your Republican governor have enacted privacy legislation, you’re not going to be worried about voting in that direction. I think this is one of those places where, unlike civil rights, where you saw most of the action at the federal level and then getting forced down to the states, we’re going to see more action at the state level getting funneled up to the federal government.
  •  
    A must-read. Ben Wizner discusses the current climate in the courts in government surveillance cases and how Edward Snowden's disclosures have affected that, and much more. Wizner is not only Edward Snowden's lawyer, he is also the coordinator of all ACLU litigation on electronic surveillance matters.
Paul Merrell

Why Does the FBI Have to Manufacture its Own Plots if Terrorism and ISIS Are Such Grave Threats? - The Intercept - 0 views

  • The FBI and major media outlets yesterday trumpeted the agency’s latest counterterrorism triumph: the arrest of three Brooklyn men, ages 19 to 30, on charges of conspiring to travel to Syria to fight for ISIS (photo of joint FBI/NYPD press conference, above). As my colleague Murtaza Hussain ably documents, “it appears that none of the three men was in any condition to travel or support the Islamic State, without help from the FBI informant.” One of the frightening terrorist villains told the FBI informant that, beyond having no money, he had encountered a significant problem in following through on the FBI’s plot: his mom had taken away his passport. Noting the bizarre and unhinged ranting of one of the suspects, Hussain noted on Twitter that this case “sounds like another victory for the FBI over the mentally ill.” In this regard, this latest arrest appears to be quite similar to the overwhelming majority of terrorism arrests the FBI has proudly touted over the last decade. As my colleague Andrew Fishman and I wrote last month — after the FBI manipulated a 20-year-old loner who lived with his parents into allegedly agreeing to join an FBI-created plot to attack the Capitol — these cases follow a very clear pattern
  • Once again, we should all pause for a moment to thank the brave men and women of the FBI for saving us from their own terror plots.
  • We’re constantly bombarded with dire warnings about the grave threat of home-grown terrorists, “lone wolf” extremists and ISIS. So intensified are these official warnings that The New York Times earlier this month cited anonymous U.S. intelligence officials to warn of the growing ISIS threat and announce “the prospect of a new global war on terror.” But how serious of a threat can all of this be, at least domestically, if the FBI continually has to resort to manufacturing its own plots by trolling the Internet in search of young drifters and/or the mentally ill whom they target, recruit and then manipulate into joining? Does that not, by itself, demonstrate how over-hyped and insubstantial this “threat” actually is? Shouldn’t there be actual plots, ones that are created and fueled without the help of the FBI, that the agency should devote its massive resources to stopping? This FBI tactic would be akin to having the Drug Enforcement Agency (DEA) constantly warn of the severe threat posed by drug addiction while it simultaneously uses pushers on its payroll to deliberately get people hooked on drugs so that they can arrest the addicts they’ve created and thus justify their own warnings and budgets (and that kind of threat-creation, just by the way, is not all that far off from what the other federal law enforcement agencies, like the FBI, are actually doing). As we noted the last time we wrote about this, the Justice Department is aggressively pressuring U.S. allies to employ these same entrapment tactics in order to create their own terrorists, who can then be paraded around as proof of the grave threat.
  • ...1 more annotation...
  • UPDATE: The ACLU of Massachusetts’s Kade Crockford notes this extraordinarily revealing quote from former FBI assistant director Thomas Fuentes, as he defends one of the worst FBI terror “sting” operations of all (the Cromitie prosecution we describe at length here): If you’re submitting budget proposals for a law enforcement agency, for an intelligence agency, you’re not going to submit the proposal that “We won the war on terror and everything’s great,” cuz the first thing that’s gonna happen is your budget’s gonna be cut in half. You know, it’s my opposite of Jesse Jackson’s ‘Keep Hope Alive’—it’s ‘Keep Fear Alive.’ Keep it alive. That is the FBI’s terrorism strategy — keep fear alive — and it drives everything they do.
Gary Edwards

PETITION URGING CONGRESS TO IMPEACH PRESIDENT BARACK OBAMA - 0 views

  •  
    "PETITION URGENTLY REQUESTING THAT CONGRESS LAUNCH AN INDEPENDENT AND COMPREHENSIVE INVESTIGATION INTO UNCONSTITUTIONAL AND IMPEACHABLE OFFENSES ON THE PART OF PRESIDENT BARACK OBAMA To: All members of the U.S. Congress: Whereas, President Barack Obama not only failed to aid U.S. personnel under lethal and prolonged terrorist attack in Benghazi, Libya, on Sept. 11, 2012, resulting in the deaths of a U.S. ambassador and three other Americans, but also led an outrageously deceitful cover-up for weeks afterward, rivaling the Watergate-era cover-up that ended the presidency of Richard Nixon; Whereas, the IRS under Obama - in accord with direct instructions from congressional Democrats - has engaged in the most egregious and widespread attack on conservative groups in modern history, with the knowledge of top agency officials; Whereas, the Obama Justice Department, on top of its many first-term scandals, has spied on and harassed journalists at Fox News and the Associated Press, prompting widespread, bipartisan condemnation of the DOJ for "criminalizing journalism"; Whereas, top constitutional attorneys from across the political spectrum now agree that Obama has committed certain specific offenses that unquestionably rise to the level of impeachable "high crimes and misdemeanors"; Whereas, one of these offenses - that of illegally conducting war against Libya - has been deemed by a bipartisan panel of constitutional experts to be "clearly an impeachable offense" and "gross usurpation of the war power"; Whereas, Obama's policy of targeted assassinations of U.S. citizens without any constitutionally required due process - including the drone assassination of an American-born 16-year-old as he was eating dinner - is unanimously deemed by experts, both liberal and conservative, as "an impeachable offense"; Whereas, Obama's Justice Department has presided over the disastrous "Fast and Furious" operation in which approximately 2
Gary Edwards

Susan Lindauer | Veterans Today - 0 views

  •  
    Recently hear former CIA agent Susan Lindauer interviewed on Coast to Coast.  Stunning story.  This page has articles that read like a book about 911. intro: As a U.S. Intelligence Asset, Susan Lindauer covered anti-terrorism at the Iraqi Embassy in New York from 1996 up to the invasion. Independent sources have confirmed that she gave advance warning about the 9/11 attack. She also started talks for the Lockerbie Trial with Libyan diplomats. Shortly after requesting to testify before Congress about successful elements of Pre-War Intelligence, Lindauer became one of the first non-Arab Americans arrested on the Patriot Act as an "Iraqi Agent". She was accused of warning her second cousin, White House Chief of Staff Andrew Card and Secretary of State Colin Powell that War with Iraq would have catastrophic consequences. Gratis of the Patriot Act, her indictment was loaded with "secret charges" and "secret evidence." She was subjected to one year in prison on Carswell Air Force Base in Fort Worth, Texas without a trial or hearing, and threatened with indefinite detention and forcible drugging to shut her up. After five years of indictment without a conviction or guilty plea, the Justice Department dismissed all charges five days before President Obama's inauguration. Lindauer has written a book Extreme Prejudice: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq about her experience.
Paul Merrell

Data-sharing among US law agencies amounts to 'organised chaos' - report | World news | theguardian.com - 0 views

  • The sharing of crucial intelligence about counter-terrorism between the FBI, the Department of Homeland Security and local police departments takes place through a patchwork process that amounts to “organized chaos”, according to a new report. The report, released Tuesday by the Brennan Center for Justice, a public-policy institute at New York University law school that has a track record of being skeptical of government surveillance, found inconsistent rules, inadequate oversight, apparent wastefulness and insufficient regard for civil liberties nationwide. “This poorly organized system not only wastes time and resources; it also risks masking reliable intelligence that could be crucial to an investigation,” the report says, warning that a “din of data” is overwhelming law enforcement.
  • The Brennan Center report examined 16 major police departments across the US, along with 19 affiliated “fusion centers” – controversial data-sharing pools between federal, state and local agencies – and 14 of the FBI’s joint terrorism task force partnerships with police.
  • Despite efforts by the Department of Homeland Security, most of the fusion centers operate with “minimal oversight, or no oversight whatsoever”, the report found. Out of 19 centers reviewed, only five require independent audits of retained data.
  • ...3 more annotations...
  • Fusion centers have been the subject of criticism from both civil libertarians and powerful elected officials. A 2012 investigation by the bipartisan Senate permanent subcommittee on investigations of more than 80,000 fusion center documents could not find any contribution the centers had made to “disrupt[ing] an active terrorist plot”. DHS disputes the results of that investigation, as do several legislators on committees overseeing the department. Senator Tom Coburn, an Oklahoman who serves as the top Republican on the Senate government reform and homeland security committee, has emerged as a leading legislative critic of fusion centers and joint terrorism task forces, for many of the same reasons detailed in the Brennan Center report. After a government inquiry indicated many federal data-sharing efforts were duplicative, Coburn issued a statement in April calling them “a vital component of national security”, but adding, “that is not an excuse to waste taxpayer funds”.
  • And all that information is on top of the fruits of the NSA’s vast data collection efforts, which are not entirely off limits to federal law enforcement. The controversial bulk collection of Americans’ phone data has been repeatedly described by the NSA as a tool to aid the FBI in detecting domestic terrorism activity. NSA deputy director John C Inglis recently stated that the FBI cannot search directly through the NSA’s data troves, but the agency shares telephone metadata with the bureau following searches through its databases based on “reasonable articulable suspicion” of connections to specific terrorist organizations.
  • The Brennan Center report did not specifically analyze law enforcement tower dumps, but Price called the reports of them alarming. “This is another indication of the vast trove of information that state and local police are collecting about law abiding Americans,” Price said. “To date, that information does not appear to be particularly useful in preventing terror attacks.”
  •  
    The ongoing federalization of state and local law enforcement continues unabated. Today's "fusion centers" have antecedents in the regional "intelligence centers" begun under the guise of Reagan's War on Drugs™, but shifted into a much higher gear under the guise of Bush II's War on Terror™.
Paul Merrell

War Gear Flows to Police Departments - NYTimes.com - 0 views

  • During the Obama administration, according to Pentagon data, police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft. The equipment has been added to the armories of police departments that already look and act like military units. Police SWAT teams are now deployed tens of thousands of times each year, increasingly for routine jobs.
  • As the nation’s wars abroad wind down, many of the military’s surplus tools of combat have ended up in the hands of state and local law enforcement. Totals below are the minimum number of pieces acquired since 2006 in a selection of categories.
  • Congress created the military-transfer program in the early 1990s, when violent crime plagued America’s cities and the police felt outgunned by drug gangs. Today, crime has fallen to its lowest levels in a generation, the wars have wound down, and despite current fears, the number of domestic terrorist attacks has declined sharply from the 1960s and 1970s.Continue reading the main story Police departments, though, are adding more firepower and military gear than ever. Some, especially in larger cities, have used federal grant money to buy armored cars and other tactical gear. And the free surplus program remains a favorite of many police chiefs who say they could otherwise not afford such equipment.
  • ...4 more annotations...
  • The number of SWAT teams has skyrocketed since the 1980s, according to studies by Peter B. Kraska, an Eastern Kentucky University professor who has been researching the issue for decades.The ubiquity of SWAT teams has changed not only the way officers look, but also the way departments view themselves. Recruiting videos feature clips of officers storming into homes with smoke grenades and firing automatic weapons.
  • The Pentagon program does not push equipment onto local departments. The pace of transfers depends on how much unneeded equipment the military has, and how much the police request. Equipment that goes unclaimed typically is destroyed. So police chiefs say their choice is often easy: Ask for free equipment that would otherwise be scrapped, or look for money in their budgets to prepare for an unlikely scenario.
  • Pentagon data suggest how the police are arming themselves for such worst-case scenarios. Since 2006, the police in six states have received magazines that carry 100 rounds of M-16 ammunition, allowing officers to fire continuously for three times longer than normal. Twenty-two states obtained equipment to detect buried land mines.Continue reading the main story Continue reading the main story AdvertisementIn the Indianapolis suburbs, officers said they needed a mine-resistant vehicle to protect against a possible attack by veterans returning from war.
  • The police in 38 states have received silencers, which soldiers use to muffle gunfire during raids and sniper attacks.
Paul Merrell

The Pentagon's slush fund is arming a War Zone on Main Street. Let's end the local-cop addiction to backyard battle | Sadhbh Walshe | Comment is free | theguardian.com - 0 views

  • What many other communities across America have learned since is that we're living in what the writer Radley Balko calls the age of the "warrior cop". And when warrior cops want a straight-outta-Baghdad toy, it's increasingly and unnecessarily simple for them to use a federally enabled slush-fund to wreak havoc – particularly against minorities, and even at a pumpkin festival. It's also pretty simple to start accounting for all the high-tech violence."Before another small town's police force gets a $700,000 gift from the Defense Department that it can't maintain or manage," Rep Hank Johnson of Georgia told me this week, "we need to press pause and revisit the merits of a militarized America."
  • The ACLU released a devastating report this week examining more than 800 incidents of Swat team deployments conducted by 20 law enforcement agencies between 2010 and 2013. It's a small sample of the estimated 45,000 deployments that occur in the US each year (up from 1,400% from the '80s), but the report reveals a picture of law enforcement as flash-bang assault unit, with hardly an actual suspect in harm's way: pandemonium in a baby's crib; a grandfather of 12 killed by a discharged gun; Swat officers gunning down a mother as she died, child in her arms. According to the ACLU study, 79% of the incidents surveyed involved a Swat team searching a person's home, and more than 62% of the cases involved searches for drugs. That's not what Swat teams were made for.America is winding down wars abroad – depending on what the hell happens in Iraq, of course – but we are fueling an addiction to armed conflict here at home.As Balko notes in his book, The Rise of the Warrior Cop, "America's cops have increasingly come to resemble ground troops."
  • But the federal government has been enabling even more localized branches of law enforcement to get its hands on heavy-duty artillery for the last 20 years, when the Reagan administration formalized the Pentagon's so-called 1033 Program. It sends "excess" military equipment to local police departments, and combined with the Homeland Security operation that provides grants to purchase such equipment, we've got a veritable firearms sale funnelling from Washington on down to the local station house. And when local law enforcement is making hundreds of thousands of dollars off seized drug money – sometimes illegally – you've got the makings of a War Zone on Main Street.Rep Johnson has plans to introduce a bill that would reform the 1033 Program, which donated at least $500bn per year in military gear to virtually every police department in the country. "We not only lack serious oversight and accountability," Johnson wrote me in an email on Tuesday, "but we need some parameters put in place for what is appropriate." His legislation would put limitations on the transfer of certain kinds of military-grade equipment, and require the Pentagon to account for transfers of all such equipment in an annual report to Congress.
  • ...1 more annotation...
  • The ACLU also made several recommendations in its report – state laws to restrain Swat teams, plus transparency and strict oversight – that all make sense, as do training sessions for more of our trigger-happy "rescue" officers. But this was perhaps the most endemic part of that report:Overall, 42% of people impacted by a Swat deployment to execute a search warrant were black and 12% were Latino. This means that of the people impacted by deployments for warrants, at least 54% were minorities.Whether this is by accident or design, the racial reality of America's militarized law enforcement offers yet another compelling reason why the dangerous trend of warrior-style policing needs to be re-examined – and then reversed.When the first Swat team was deployed in the late '60s, its target was a single remaining cell of the Black Panthers. Nearly half a century later, all the nation's a theater, and we are merely the pumpkin eaters – with half a million bucks worth of smashing, exploding, high-artillery gear for the taking.
Paul Merrell

Failure of the US coup d'État in Macedonia , by Thierry Meyssan - 0 views

  • Macedonia has just neutralised an armed group whose sponsors had been under surveillance for at least eight months. By doing so, it has prevented a new attempt at a coup d’État, planned by Washington for the 17th of May. The aim was to spread the chaos already infecting Ukraine into Macedonia in order to stall the passage of a Russian gas pipeline to the European Union.
  • n the 9th of May, 2015, the Macedonian police launched a dawn operation to arrest an armed group which had infiltrated the country and which was suspected of preparing a number of attacks. The police evacuated the civilian population before launching the assault.
  • The suspects opened fire, which led to a bitter firefight, leaving 14 terrorists and 8 members of the police forces dead. 30 people were taken prisoner. There were a large number of wounded
  • ...7 more annotations...
  • The Macedonian police were clearly well-informed before they launched their operation. According to the Minister for the Interior, Ivo Kotevski, the group was preparing a very important operation for the 17th May (the date of the demonstration organised by the Albanophone opposition in Skopje). The identification of the suspects has made it possible to determine that they were almost all ex-members of the UÇK (Kosovo Liberation Army) [1].
  • Among them were : • Sami Ukshini, known as « Commandant Sokoli », whose family played a historic rôle in the UÇK. • Rijai Bey, ex-bodyguard of Ramush Haradinaj (himself a drug trafficker, military head of the UÇK, then Prime Minister of Kosovo. He was twice condemned for war crimes by the International Penal Tribunal for ex-Yugoslavia, but was acquitted because 9 crucial witnesses were murdered during the trial). • Dem Shehu, currently bodyguard for the Albanophone leader and founder of the BDI party, Ali Ahmeti. • Mirsad Ndrecaj, known as the « NATO Commandant », grandson of Malic Ndrecaj, who is commander of the 132nd Brigade of the UÇK. The principal leaders of this operation, including Fadil Fejzullahu (killed during the assault), are close to the United States ambassador in Skopje, Paul Wohlers.
  • To eliminate any doubt about the identity of the operation’s sponsors, the General Secretary of NATO, Jens Stoltenberg, intervened even before the assault was over - not to declare his condemnation of terrorism and his support for the constitutional government of Macedonia, but to paint a picture of the terrorist group as a legitimate ethnic opposition : « I am following the events in Kumanovo with deep concern. I would like to express my sympathy to the families of those who were killed or wounded. It is important that all polititcal and community leaders work together to restore order and begin a transparent investigation in order to find out what happened. I am calling for everyone to show reserve and avoid any new escalation of violence, in the intersts of the nation and also the whole region. » You would have to be blind not to understand.
  • In January 2015, Macedonia foiled an attempted coup d’état organised for the head of the opposition, the social-democrat Zoran Zaev. Four peole were arrested, and Mr. Zaev had his passport confiscated, while the Atlantist press began its denunciation of an « authoritarian drift by the régime » (sic). Zoran Zaev is publicly supported by the embassies of the United States, the United Kingdom, Germany and Holland. But the only trace left of this attempted coup d’état indicates the repsponsibility of the US. On the 17th May, Zoran Zaev’s social-democrat party (SDSM) [2] was supposed to organise a demonstration. It intended to distribute 2,000 masks in order to prevent the police from identifying the terrorists taking part in the march. During the demonstration, the armed group, concealed behind their masks, were supposed to attack several institutions and launch a pseudo-« revolution » comparable to the events in Maidan Square, Kiev.
  • This coup d’État was coordinated by Mile Zechevich, an ex-employee of one of George Soros’ foundations. In order to understand Washington’s urgency to overthrow the Macedonian government, we have to go back and look at the gas pipeline war. Because international politics is a huge chess-board on which every move by any piece causes consequences for all the others.
  • The United States have been attempting to sever communications between Russia and the European Union since 2007. They managed to sabotage the projet South Stream by obliging Bulgaria to cancel its participation, but on the 1st December 2014, to everyone’s surprise, Russian President Vladimir Putin launched a new project when he succeeded in convincing his Turkish opposite number, Recep Tayyip Erdoğan, to sign an agreement with him, despite the fact that Turkey is a member of NATO [3]. It was agreed that Moscow would deliver gas to Ankara, and that in return, Ankara would deliver gas to the European Union, thus bypassing the anti-Russian embargo by Brussels. On the 18th of April 2015, the new Greek Prime Minister, Alexis Tsípras, gave his agreement that the pipeline could cross his country [4] . As for Macedonian Prime Minister Nikola Gruevski, he had already conluded discrete negotiations last March [5]. Finally, Serbia, which had been a partner in the South Stream project, indicated to the Russian Minister for Energy Aleksandar Novak, during his reception in Belgrade in April, that Serbia was ready to switch to the Turkish Stream project [6].
  • To halt the Russian project, Washington has multiplied its initiatives :  in Turkey, it is supporting the CHP against President Erdoğan, hoping this will cause him to lose the elections;  in Greece, on the 8th May, it sent Amos Hochstein, Directeur of the Bureau of Energy Ressources, to demand that the Tsípras government give up its agreement with Gazprom;  it plans – just in case – to block the route of the pipeline by placing one of its puppets in power in Macedonia;  and in Serbia, it has restarted the project for the secession of the small piece of territory - Voïvodine - which allows the junction with Hungary [7]. Last comment, but not the least: Turkish Stream will also supply Hungary and Austria, thus ending the alternative project negotiated by the United States with President Hassan Rohani (against the advice of the Revolutionary Guards) for supplying them with Iranian gas [8].
Gary Edwards

FBI Source: Clinton Foundation Can Bring Down Entire Government » Alex Jones' Infowars: There's a war on for your mind! - 1 views

  •  
    "The Clinton Foundation is a "massive spider web of connections and money laundering implicating hundreds of high-level people," according to an anonymous insider who revealed why the FBI stopped short of indicting Hillary Clinton. Before FBI Director James Comey announced the FBI wouldn't recommend pressing charges against Clinton, an insider with "intimate knowledge of the inner workings of the Clinton case" hosted an little-publicized AMA session on 4Chan, and the statements he made on July 2 corroborate with later developments of the scandal. "There is enough for her and the entire government to be brought down," he revealed. "People do not realize how enormous this whole situation actually is." "Whether she will be [indicted] or not depends on how much info others involved gets out, and there are a lot of people involved." Since then, both the FBI and the DOJ declined to press charges against Clinton, and other sources revealed the Clinton Foundation is now under scrutiny. "The problem is with the Clinton Foundation as I mentioned, which you should just imagine as a massive spider web of connections and money laundering implicating hundreds of high-level people," the source said. "Though I do not have a high opinion of Hillary, she is just a piece - albeit a big piece - of this massive sh*tstorm." Those implicated extends to the Justice Dept. "The DOJ is most likely looking to save itself," he continued. "Find everyone involved in the Clinton Foundation, from its donors to its Board of Directors, and imagine they are all implicated." This would explain why Bill Clinton forced himself on Attorney General Loretta Lynch's plane at the Phoenix Sky Harbor International Airport last week; Clinton insider Larry Nichols said blackmail was likely involved. "Bill Clinton met with Lynch, and he was there to assure her that when Hillary gets to be president she'll be able to keep her job," said Nichols on the Alex Jones Sh
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Just Security - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Gary Edwards

Comey has Long History of Cases Ending Favorable to Clintons - Tea Party News - 0 views

  • Messages found stored on Clinton’s private email server show that Berger – a convicted thief of classified documents – had been advising Clinton while she served as secretary of state and had access to emails containing classified information. For example, in an email dated Sept. 22, 2009, Berger advised Clinton advised how she could leverage information to make Israeli Prime Minister Benjamin Netanyahu more cooperative in discussions with the Obama administration over a settlement freeze.
  • Law firm ties Berger, Lynch, Mills Berger worked as a partner in the Washington law firm Hogan & Hartson from 1973 to 1977, before taking a position as the deputy director of policy planning at the State Department in the Carter administration. When Carter lost his re-election bid, Berger returned to Hogan & Hartson, where he worked until he took leave in 1988 to act as foreign policy adviser in Gov. Michael Dukakis’ presidential campaign. When Dukakis was defeated, Berger returned to Hogan & Hartson until he became foreign policy adviser for Bill Clinton’s presidential campaign in 1992. On March 28, WND reported Lynch was a litigation partner for eight years at Hogan & Hartson, from March 2002 through April 2010. Mills also worked at Hogan & Hartson, for two years, starting in 1990, before she joined then President-elect Bill Clinton’s transition team, on her way to securing a position as White House deputy counsel in the Clinton administration. According to documents Hillary Clinton’s first presidential campaign made public in 2008, Hogan & Hartson’s New York-based partner Howard Topaz was the tax lawyer who filed income tax returns for Bill and Hillary Clinton beginning in 2004. In addition, Hogan & Hartson in Virginia filed a patent trademark request on May 19, 2004, for Denver-based MX Logic Inc., the computer software firm that developed the email encryption system used to manage Clinton’s private email server beginning in July 2013. A tech expert has observed that employees of MX Logic could have had access to all the emails that went through her account.
  • In 1999, President Bill Clinton nominated Lynch for the first of her two terms as U.S. attorney for the Eastern District of New York, a position she held until she joined Hogan & Hartson in March 2002 to become a partner in the firm’s Litigation Practice Group. She left Hogan & Hartson in 2010, after being nominated by President Obama for her second term as U.S. attorney for the Eastern District of New York, a position she held until Obama nominated her to serve in her current position as attorney general. A report published April 8, 2008, by The American Lawyer noted Hogan & Hartson was among Hillary Clinton’s biggest financial supporters in the legal industry during her first presidential campaign. “Firm lawyers and staff have donated nearly $123,400 to her campaign so far, according to campaign contribution data from the Center for Responsive Politics,” Nate Raymond observed in The American Lawyer article. “Christine Varney, a partner in Hogan’s Washington, D.C., office, served as chief counsel to the Clinton-Gore Campaign in 1992.” While there is no evidence that Lynch played a direct role either in the tax work done by the firm for the Clintons or in linking Hillary’s private email server to MX Logic, the ethics of the legal profession hold all partners jointly liable for the actions of other partners in a business. “If Hogan and Hartson previously represented the Clintons on tax matters, it is incumbent upon U.S. Attorney General Loretta Lynch to [disclose] what, if any, role she had in such tax matters,” said Tom Fitton, president of Washington-based Judicial Watch.
  • ...4 more annotations...
  • HSBC link When Lynch’s nomination as attorney general was considered by the Senate one year ago, as WND reported, the Senate Judiciary Committee examined her role in the Obama administration’s decision not to prosecute the banking giant HSBC for laundering funds for Mexican drug cartels and Middle Eastern terrorists. WND was first to report in a series of articles beginning in 2012 money-laundering charges brought by John Cruz, a former HSBC vice president and relationship manager, based on his more than 1,000 pages of evidence and secret audio recordings. The staff of the Senate Judiciary Committee focused on Cruz’s allegations that Lynch, acting then in her capacity as the U.S. attorney for the Eastern District of New York, engaged in a Department of Justice cover-up. Obama’s attorney general nominee allowed HSBC in December 2011 to enter into a “deferred prosecution” settlement in which the bank agreed to pay a $1.9 billion fine and admit “willful criminal conduct” in exchange for dropping criminal investigations and prosecutions of HSBC directors or employees. Cruz called the $1.92 billion fine the U.S. government imposed on HSBC “a joke” and filed a $10 million lawsuit for “retaliation and wrongful termination.” From 2002 to 2003, Comey held the position of U.S. Attorney for the Southern District of New York, the same position held by Lynch. On March 4, 2013, he joined the HSBC board of directors, agreeing to serve as an independent non-executive director and a member of the bank’s Financial System Vulnerabilities Committee, positions he held until he resigned on Aug. 3, 2013, to become head of the FBI.
  • Comey, Fitzgerald and Valerie Plame On Jan. 1, 2004, the Washington Post reported that after Attorney General John Aschroft recused himself and his staff from any involvement in the investigation of who leaked the name of CIA employee Valerie Plame after journalist Robert Novak named her in print as a CIA operative, Comey assumed the role of acting attorney general for the purposes of the investigation. Comey appointed Patrick J. Fitzgerald, a U.S. attorney in Chicago, to act as special counsel in conducting the inquiry into what became known as “Plamegate.” At the time Comey made the appointment, Fitzgerald was already godfather to one of Comey’s children. On April 13, 2015, co-authoring a USA Today op-ed piece, Plame and her husband, retired ambassador Joseph Wilson, made public their support for Hillary Clinton’s 2016 presidential campaign, openly acknowledging their political closeness to both Hillary and Bill Clinton. The first two paragraphs of the editorial read: We have known Hillary Clinton both professionally and personally for close to 20 years, dating back to before President Bill Clinton’s first trip to Africa in 1998 — a trip that they both acknowledge changed their lives, and gave considerable meaning to their post-White House years and to the activities of the Clinton Foundation. Joe, serving as the National Security Council Senior Director for African Affairs, was instrumental in arranging that historic visit. Our history became entwined with Hillary further after Valerie’s identity as a CIA officer was deliberately exposed. That criminal act was taken in retribution for Joe’s article in The New York Times in which he explained he had discovered no basis for the Bush administration’s justification for the Iraq War that Saddam Hussein was seeking yellowcake uranium to develop a nuclear weapon.
  • In January 2016, Chuck Ross in the Daily Caller reported that Hillary Clinton emails made public made clear that one of her “most frequent favor-seekers when she was secretary of state was former Ambassador Joseph Wilson, a longtime Clinton friend, an endorser of Clinton’s 2008 presidential campaign, and an Africa expert with deep business ties on the continent.” Ross noted that Wilson emailed Clinton on Dec. 22, 2009, seeking help for Symbion Power, an American engineering contractor for whom Wilson consulted, in the company’s bid to pursue a U.S. Agency of International Development contract for work in Afghanistan. In the case of the Afghanistan project, Ross noted, Clinton vouched for Wilson and Symbion as she forwarded the request to Jack Lew, who served then as deputy secretary of state for management and resources. Ross further reported Wilson’s request might also have been discussed with President Obama, as one email indicates. In 2005, Fitzgerald prosecuted Libby, a prominent adviser to then Vice President Dick Cheney, in the Plame investigation, charging him with two counts of perjury, two counts of making false statements to federal prosecutors and one count of obstruction of justice. On March 6, 2007, Libby was convicted of four of the five counts, and on June 5, 2007, was sentenced by U.S. District Judge Reggie B. Walton to two and a half years in federal prison. On April 6, 2015, the Wall Street Journal reported the publication of New York Times reporter Judith Miller’s memoir “The Story: A Reporter’s Journey” exposed “unscrupulous conduct” by Fitzgerald in the 2007 trial of Libby.
  • WSJ reporter Peter Berkowitz noted Miller “writes that Mr. Fitzgerald induced her to give what she now realizes was false testimony.” “By withholding critical information and manipulating her memory as he prepared her to testify, Ms. Miller relates, Mr. Fitzgerald ‘steered’ her ‘in the wrong direction.’” http://www.wnd.com/2016/07/comey-has-long-history-of-clinton-related-cases/
  •  
    Bend over and grab your ankles. The rats nest of Clinton operatives in Washington DC is far deeper than anyone ever imagined. "FBI Director James Comey has a long history of involvement in Department of Justice actions that arguably ended up favorable to the Clintons. In 2004, Comey, then serving as a deputy attorney general in the Justice Department, apparently limited the scope of the criminal investigation of Sandy Berger, which left out former Clinton administration officials who may have coordinated with Berger in his removal and destruction of classified records from the National Archives. The documents were relevant to accusations that the Clinton administration was negligent in the build-up to the 9/11 terrorist attack. On Tuesday, Comey announced that despite evidence of "extreme negligence by Hillary Clinton and her top aides regarding the handling of classified information through a private email server, the FBI would not refer criminal charges to Attorney General Loretta Lynch and the Justice Department. Curiously, Berger, Lynch and Cheryl Mills all worked as partners in the Washington law firm Hogan & Hartson, which prepared tax returns for the Clintons and did patent work for a software firm that played a role in the private email server Hillary Clinton used when she was secretary of state. Lynch and Comey both served as U.S. attorney for the Southern District of New York. They crossed paths in the investigation of HSBC bank, which avoided criminal charges in a massive money-laundering scandal for which the bank paid a $1.9 billion fine. After Attorney General John Aschroft recused himself in the Valerie Plame affair in 2004, Comey appointed as special counsel Patrick J. Fitzgerald, who ended up convicting "Scooter" Libby, a top aide to then Vice President Dick Cheney, of perjury and obstruction of justice. The charge affirmed the accusations of Plame and her former ambassador husband, Joe Wilson - both partisan supporters of Bill and
  •  
    The "ethical" situation is far worse than described. Attorney disciplinary rules require that a lawyer, including all lawyers in the same firm, owe a lifetime duty of loyalty to a client, a duty that does not end with representation in a particular matter. Accordingly, Lynch had what the disciplinary rules refer to as an "actual conflict of interest" between her duties of loyalty to both Hillary and the U.S. government that required her withdrawal from representing either in the decision whether to prosecute Hillary. Saying that she would rubber stamp what Comey recommended was not the required withdrawal. Comey is an investigator, not a prosecutor. This was a situation for appointment of a special counsel to represent the Department of Justice in the decision whether to prosecute, not satisfied by rubber stamping Comey's recomendation,.
Paul Merrell

How the FBI Created a Terrorist - The Intercept - 0 views

  • Informant-led sting operations are central to the FBI’s counterterrorism program. Of 508 defendants prosecuted in federal terrorism-related cases in the decade after 9/11, 243 were involved with an FBI informant, while 158 were the targets of sting operations. Of those cases, an informant or FBI undercover operative led 49 defendants in their terrorism plots, similar to the way Osmakac was led in his. In these cases, the FBI says paid informants and undercover agents are foiling attacks before they occur. But the evidence suggests — and a recent Human Rights Watch report on the subject illustrates — that the FBI isn’t always nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own.
  • At least in Osmakac’s case, FBI agents seem to agree with that criticism, though they never intended for that admission to become public. In the Osmakac sting, the undercover FBI agent went by the pseudonym “Amir Jones.” He’s the guy behind the camera in Osmakac’s martyrdom video. Amir, posing as a dealer who could provide weapons, wore a hidden recording device throughout the sting. The device picked up conversations, including, apparently, back at the FBI’s Tampa Field Office, a gated compound beneath the flight path of Tampa International Airport, among agents and employees who assumed their words were private and protected. These unintentional recordings offer an exclusive look inside an FBI counterterrorism sting, and suggest that, even in the eyes of the FBI agents involved, these sting targets aren’t always the threatening figures they are made out to be.
  • OW OSMAKAC CAME to the attention of law enforcement in the first place is still unclear. In a December 2012 Senate floor speech, Dianne Feinstein, chairwoman of the Senate Intelligence Committee, cited Osmakac’s case as one of nine that demonstrated the effectiveness of surveillance under the FISA Amendments Act. Senate legal counsel later walked back those comments, saying they were misconstrued. Osmakac is among terrorism defendants who were subjected to some sort of FISA surveillance, according to court records, but whether he was under individual surveillance or identified through bulk collection is unknown. Discovery material referenced in a defense motion included a surveillance log coversheet with the description, “CT-GLOBAL EXTREMIST INSPIRED.” If he first came onto the FBI’s radar as a result of eavesdropping, then it’s plausible that as part of the sting, the FBI manufactured another explanation for his targeting. This is a long-running, if controversial process known as “parallel construction,” which has also been used by the U.S. Drug Enforcement Administration when drug offenders are identified through bulk collection and then prosecuted for drug crimes. In court records, the FBI maintained that Osmakac came to agents’ attention through Dabus. The informant reached out to the FBI after meeting Osmakac, and soon offered him a job at Java Village.
  •  
    A judge denied the defense access to FBI transcripts of conversations among agents on grounds that they would provide no assistance to the defense beyond what was available to the defense by discovery. He also entered a protective order barring their disclosure. The defendant was found guilty and sentenced to 40 years in prison.  But the FBI transcripts were leaked to The Intercept, apparently by someone inside the Dept. of Justice or the judicial system, since the defense never was provided with them. The transcripts along with evidence from the case and gathered through interviews provide a chilling look into the methods the FBI uses to manufacture "terrorists" for prosecution and conviction (in this case victimizing a young Muslim American with a severe mental illness), obviously only for propaganda and to justify its counter-terrorism budget. This is an area that needs Congressional attention. The courts' protections from entrapment are far too lax, particularly when members of a particular religion are being targeted for political reasons and anti-Muslim hysteria is sweeping the land. The government should not be permitted to manufacture criminals.
Paul Merrell

Justice Department seeks to undo thousands of old sentences | Al Jazeera America - 0 views

  • Setting in motion one of the most wide-ranging government efforts to roll back the legacy of harsh anti-crime laws dating to the drug wars of the 1980s, the Justice Department on Wednesday announced an initiative to extend presidential clemency to potentially thousands of federal prisoners who would receive more lenient rulings if they were sentenced and convicted today. 
  • Cole said the department would, in its effort to retrofit penalties, prioritize inmates who are nonviolent, low-level drug offenders without significant ties to large-scale criminal organizations. Such offenders must also have served at least 10 years of their prison sentences, not have a significant history of crime or violence and have demonstrated good conduct in prison. Though Cole declined to say how many prisoners that might encompass, The Associated Press, citing a person familiar with the matter, reported on Wednesday that the Justice Department had identified about 23,000 people who had served sentences of at least 10 years. While Cole said the most obvious candidates would be those inmates sentenced prior to the Fair Sentencing Act of 2010, which narrowed the disparity between sentences for crack and powder cocaine offenders, he said the initiative was not limited to them.
Paul Merrell

SANTIAGO, Chile: Chilean accused of murder, torture taught 13 years for Pentagon | National Security & Defense | McClatchy DC - 0 views

  • A member of the late Chilean dictator Augusto Pinochet’s brutal secret police who’s been accused of murder taught for more than a decade at the Pentagon’s premier university, despite repeated complaints by his colleagues about his past. Jaime Garcia Covarrubias is charged in criminal court in Santiago with being the mastermind in the execution-style slayings of seven people in 1973, according to court documents. McClatchy also interviewed an accuser who identified Garcia Covarrubias as the person who sexually tortured him.Despite knowing of the allegations, State and Defense department officials allowed Garcia Covarrubias to retain his visa and continue working at a school affiliated with the National Defense University until last year .Human rights groups also question the school’s selection of a second professor, Colombia’s former top military commander.
  • Some Latin America experts said the hirings by the William J. Perry Center for Hemispheric Defense Studies reflected a continuing inclination by the U.S government to overlook human rights violations in Latin America, especially in countries where it funded efforts to quash leftists. But those experts were especially troubled by Garcia Covarrubias’ long tenure at one of the nation’s most renowned defense institutions. “His hiring undermines our moral authority on both human rights and in the war on terror,” said Chris Simmons, a former Defense Intelligence Agency and Army intelligence officer from 1982 to 2010 who specializes in Latin America. “If he is in fact guilty of what he is accused of, he is a terrorist. Then who are we to tell other countries how they should be fighting terrorism?” To his supporters, Garcia Covarrubias is a brilliant thinker with a Ph.D. and purveyor of leadership skills. To his alleged victims, he’s a sadistic torturer with a penchant for horsewhips and perversity.
  • A 2008 Chilean military document reviewed by McClatchy identified Garcia Covarrubias as a member of the Dirección de Inteligencia Nacional, the feared spy agency known by its acronym DINA.“DINA was simply the most sinister agency in Latin America,” said Peter Kornbluh, a senior analyst with the National Security Archive, which secured the release of U.S. government classified documents underscoring the complicit relationship between the U.S. and Pinochet. “Anyone associated with that agency should never have been allowed into this country, let alone given this job.”Officials with the Pentagon, the State Department and the school refused to comment. Garcia Covarrubias is now back in Chile, ordered by an investigative judge in January 2014 to remain in the country while an inquiry continues into his alleged role in the deaths of seven people in Temuco weeks after the U.S.-backed Pinochet coup on Sept. 11, 1973. His case is one of 108 involving tortured, disappeared or murdered supporters of the deposed elected president, Salvador Allende. More than 3,000 people died at the hands of the regime, and in 2003, then-Secretary of State Colin Powell offered regrets for U.S. involvement in the coup, calling it “not a part of American history that we're proud of.”
  • ...4 more annotations...
  • The center’s officials who hired and renewed Garcia Covarrubias’ contracts say he was a highly qualified professor and minimize the allegations against him. “We made inquiries with people in the region, in Chile and so forth, and were never given anything negative about Jaime,” said Margaret Daly Hayes, the center’s first director. “He was vetted by the U.S. government, by the (U.S.) Embassy. They obviously didn’t have anything either or he wouldn’t have been hired.”McClatchy, however, located one of his alleged victims, who described being brutalized by him. “They submitted us to torture, twice a day. We were submerged in feces,” Herman Carrasco, who’s now a real estate agent, told McClatchy in Chile. “They stuck rifle barrels in our anuses.”According to Carrasco, the torture unfolded in October and November 1973 – lorded over by the horsewhip-wielding Garcia Covarrubias – and included electric shock administered to eyelids, genitals and other sensitive areas of the body.“He was the person who tortured us, with his face shown,” said Carrasco, who added that he’d known Garcia Covarrubias from social events before the coup. “He forced us into sexual acts, which shows that besides ferocious cruelty there was a level of psychopathic behavior.”
  • Despite very graphic torture accusations against Garcia Covarrubias, U.S. officials are rallying behind him.
  • As the center supported Garcia Covarrubias, it pushed out Andersen in retaliation, the former communications chief said.Last September, Andersen filed a complaint with the Pentagon’s inspector general, with the support of then-Sen. Carl Levin. D-Mich. An inspector general spokeswoman declined to comment. “It’s shameful that at a time the U.S. prestige as a democracy is under attack, that the National Defense University could be playing footsie with a former state terrorism agent,” Andersen said. The details uncovered about Garcia Covarrubias have prompted demands from several members of Congress for a Pentagon accounting of how he was hired and retained his job.“The American people deserve to know that adequate vetting of such individuals would be routine,” said Sen. Patrick Leahy, D-Vt., author of the “ Leahy Law,” which restricts U.S. assistance to foreign security forces that violate human rights.
  • While most of the concerns focused on Garcia Covarrubias, the center also took heat in 2006 for hiring Colombian Gen. Carlos Ospina Ovalle. As army commander, he turned the tables in a decades-old guerrilla war while simultaneously crushing drug cartels. Ospina Ovalle left the center last year and took a post at another National Defense University school.He was hired at the request of the Colombian government and was popular with U.S. military leaders, recalls Downie, the center’s director at the time. “The Colombians wanted, for his own safety, to get him out of Colombia,” said Downie. “This is a guy we certainly wanted to have as a professor.”Human rights groups, however, criticized the general’s hiring and continued employment at the National Defense University. They point to his earlier command in Antioquia province, where right-wing paramilitaries ran roughshod and were linked to the military.“Antioquia in the late 1990s . . . is less than one degree of separation from working with the paramilitaries,” said Adam Isacson, a senior associate specializing in military matters for the Washington Office on Latin America. “If he has not, it’s some miracle that he managed to be the one clean officer.”“Having officers like that, the implicit message is that human rights takes a backseat,” said Isacson.
Paul Merrell

Evaluating Drug Decriminalization in Portugal 12 Years Later - SPIEGEL ONLINE - 0 views

  • Twelve years ago, Portugal eliminated criminal penalties for drug users. Since then, those caught with small amounts of marijuana, cocaine or heroin go unindicted and possession is a misdemeanor on par with illegal parking. Experts are pleased with the results.
Paul Merrell

How NSA Can Secretly Aid Criminal Cases | Consortiumnews - 0 views

  • Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern. By Ray McGovern Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.” Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.
  • For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so. So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke. Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various ”authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”
  • Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.
  • ...8 more annotations...
  • Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October – told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.” These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.
  • Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution? Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment. Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”
  • We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.
  • We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too. The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism. Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.” The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.
  • The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations. Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.
  • Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.
  • “So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us: “It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”
  • Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
Paul Merrell

This Election Could Determine the Future of Pot in America - Rolling Stone - 0 views

  • California, Arizona, Nevada, Maine and Massachusetts will vote on adult-use pot legalization on Election Day, while North Dakota, Arkansas, Montana and Florida are considering medical marijuana. Combined, these states comprise about a quarter of the country's population. With widespread support across the nation – 57 percent of U.S. adults say weed should be legal – the issue of marijuana policy reform has achieved bipartisan regard, prompting active discussion among both laymen and legislators.Nearly 20 percent of states will be deciding on drug policy this election – "a reflection of the fact that we've long passed the tipping point [and] that marijuana advocacy has evolved and matured in the past few years," says Paul Armentano, deputy director of the National Organization for the Reform of Marijuana Laws, or NORML. But on the flip side, he says, it also represents a failure of the democratic process, since elected (federal) officials have yet to enact marijuana policy reform comporting with what polling indicates are their constituents' increasingly progressive views."If an overwhelming number of states that have marijuana-specific initiatives on the ballot pass those measures, that could be interpreted by federal lawmakers as a mandate," says Armentano. "But if several of them do not pass, then it is likely that lawmakers will continue to be reluctant to address marijuana law reform at the federal level."
  • The future of pot policy in America hinges heavily on the election this year. Marijuana law reform is on the ballot in nine states, and has momentum at the federal level in the form of several bills pending in Congress, including ones to deschedule cannabis, reschedule cannabis, legalize hemp and prioritize research trials.
« First ‹ Previous 41 - 60 of 83 Next › Last »
Showing 20 items per page