Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "director" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Officials: NSA programs broke plots in 20 nations - Times Union - 0 views

  • Top U.S. intelligence officials said Saturday that information gleaned from two controversial data-collection programs run by the National Security Agency thwarted potential terrorist plots in the U.S. and more than 20 other countries — and that gathered data is destroyed every five years.Last year, fewer than 300 phone numbers were checked against the database of millions of U.S. phone records gathered daily by the NSA in one of the programs, the intelligence officials said in arguing that the programs are far less sweeping than their detractors allege.
  • No other new details about the plots or the countries involved were part of the newly declassified information released to Congress on Saturday and made public by the Senate Intelligence Committee. Intelligence officials said they are working to declassify the dozens of plots NSA chief Gen. Keith Alexander said were disrupted, to show Americans the value of the programs, but that they want to make sure they don't inadvertently reveal parts of the U.S. counterterrorism playbook in the process.
  • The officials offered more detail on how the phone records program helped the NSA stop a 2009 al-Qaida plot to blow up New York City subways. They say the program helped them track a co-conspirator of al-Qaida operative Najibullah Zazi — though it's not clear why the FBI needed the NSA to investigate Zazi's phone records because the FBI would have had the authority to gather records of Zazi's phone calls after identifying him as a suspect, rather than relying on the sweeping collection program.
  •  
    Fewer than 300 phone numbers checked in 2012 *in one of the programs?*  How many in your other programs, please? Oops! Please don't answer yet; the polygraph isn't properly fastened. Perhaps time to remember that the Director of the NSA has already been caught lying to Congress. Let's also remember that nearly every FBI bust for terrorism has been a case where the FBI had to entice someone with no known "terrorist" organization connections into committing the crime.  Are these the dozens of plots referred to? If not, why no busts of real "terrorists?" This bit of propaganda doesn't pass the smell test. C'mon AP; you can do better than this. 
Paul Merrell

How Israel helps eavesdrop on US citizens | The Electronic Intifada - 0 views

  • It is well-known that the two largest American telecom companies AT&T and Verizon collaborated with the US government to allow illegal eavesdropping on their customers. The known uses to which information obtained this way has been put include building the government’s massive secret “watch lists,” and “no-fly lists” and even, Bamford suggests, to deny Small Business Administration loans to citizens or reject their children’s applications to military colleges. What is less well-known is that AT&T and Verizon handed “the bugging of their entire networks — carrying billions of American communications every day” to two companies founded in Israel. Verint and Narus, as they are called, are “superintrusive — conducting mass surveillance on both international and domestic communications 24/7,” and sifting traffic at “key Internet gateways” around the US.
  • Virtually all US voice and data communications and much from the rest of the world can be remotely accessed by these companies in Israel, which Bamford describes as “the eavesdropping capital of the world.” Although there is no way to prove cooperation, Bamford writes that “the greatest potential beneficiaries of this marriage between the Israeli eavesdroppers and America’s increasingly centralized telecom grid are Israel’s intelligence agencies.” Israel’s spy agencies have long had a revolving-door relationship with Verint and Narus and other Israeli military-security firms. The relationship is particularly close between the firms and Israel’s own version of the NSA, called “Unit 8200.”
  • Israeli companies seeking a share of massively expanded US intelligence budgets formed similarly incestuous relationships with some in the American intelligence establishment: Ken Minihan, a former director of the NSA, served on Verint’s “security committee” and the former Federal Bureau of Investigation (FBI) official responsible for liaison with the telecom industry became head of the Verint unit that sold eavesdropping equipment to the FBI and NSA.
  • ...4 more annotations...
  • FISA — the Foreign Intelligence Surveillance Act of 1978 — required the government to seek court warrants for wiretaps where at least one target was in the US. In 2005, it was revealed that the Bush administration had been flagrantly violating this law. Last July, Congress passed a bill legalizing this activity and giving retroactive immunity to the telecom companies that had assisted.
  • Israel has a well-established record of compromising American national security. The most notorious case was that of convicted spy Jonathan Pollard. Although the full details of his crimes are still secret, he is thought to have passed critical information about US intelligence-gathering methods to Israel, which then traded those secrets to US adversaries. In 2005, Larry Franklin, a Defense Department analyst, pleaded guilty to spying for Israel. Most recently, Ben-Ami Kadish, a retired US army engineer, was indicted in April for allegedly passing classified documents about US nuclear weapons to Israel from 1979 to 1985. Two former officials of AIPAC, the pro-Israel lobbying group, are still awaiting trial on charges that they passed classified information between Franklin and the Israeli government.
  • Nor have particular Israeli firms established a record of trustworthiness that would justify such complacency. Jacob “Kobi” Alexander, the former Israeli intelligence officer who founded Verint, fled the US to Israel in 2006 just before he and other top executives of a subsidiary were indicted for fraud that allegedly cost US taxpayers and company shareholders $138 million. Alexander eventually adopted a fake identity and hid in the southern African country of Namibia where he is now fighting extradition
  • Israeli companies do not assist the US only to spy on its own citizens, of course. Another Israeli firm, Natural Speech Communication (NSC), among whose directors is former Mossad chief Shabtai Shavit, makes software that the US uses to electronically analyze and key-word search recorded conversations in “Levantine Arabic,” the dialects “spoken by Israeli Arabs, Jordanians, Lebanese and Palestinians.” Mexico and Australia are among other countries known to use Israeli technologies and firms to eavesdrop on their citizens.
Paul Merrell

James Clapper must go - Salon.com - 0 views

  • When introducing James Clapper as his director of national intelligence in 2010, President Obama specifically justified the appointment by saying Clapper is someone who “understands the importance of working with our partners in Congress (and) not merely to appear when summoned, but to keep Congress informed.” At the time, it seemed like a wholly uncontroversial statement; it was simply a president making a sacrosanct promise to keep the legislative branch informed, with the insinuation that previous administrations hadn’t.Three years later, of course, James Clapper is now the embodiment of perjury before Congress. Indeed, when you couple Edward Snowden’s disclosures with this video of Clapper’s Senate testimony denying that the National Security Administration collects “any type of data on millions (of Americans),” Clapper has become American history’s most explicit and verifiable example of an executive branch deliberately lying to the legislative branch that is supposed to be overseeing it.Incredibly (or, alas, maybe not so incredibly anymore), despite the president’s original explicit promises about Clapper, transparency and Congress, the White House is nonetheless responding to this humiliating situation by proudly expressing its full support for Clapper. Meanwhile, as of today’s announcement by U.S. Rep. Justin Amash, R-Mich., the demands for Clapper’s resignation are finally being aired on Capitol Hill.
Gary Edwards

Oliver Stone : 'US has become an Orwellian state' - RT - 0 views

  •  
    Interview with Oliver Stone and author Peter Kuznick.  They answer questions related to Oliver Stone's "Show Time" television series, "The Untold History of the United States".  Good stuff - essential information for anyone seeking to understand why the US Constitution and the principles of individual liberty as defined in the Declaration of Independence are being disregarded and discarded by the ruling elites.  The final stages of the New World Feudalism, er "Order", are now unfolding.  Right before our eyes.  And we seem helpless bystanders as the Globalist cabal of banksters, corporatists and ruling elites make their final assault on the world's last best hope for individual liberty. "Americans are living in an Orwellian state argue Academy Award-winning director Oliver Stone and historian Peter Kuznick, as they sit down with RT to discuss US foreign policy and the Obama administration's disregard for the rule of law. Both argue that Obama is a wolf in sheep's clothing and that people have forgiven him a lot because of the "nightmare of the Bush presidency that preceded him." "He has taken all the Bush changes he basically put them into the establishment, he has codified them," Stone told RT. "It is an Orwellian state. It might not be oppressive on the surface, but there is no place to hide. Some part of you is going to end up in the database somewhere." According to Kuznick, American citizens live in a fish tank where their government intercepts more than 1.7 billion messages a day. "That is email, telephone calls, other forms of communication." RT's Abby Martin in the program Breaking the Set discusses the Showtime film series and book titled The Untold History of the United States co-authored by Oliver Stone and Peter Kuznick. "Obama was a great hope for change""
Gary Edwards

Major Banksters, Governmental Officials and Their Comrade Capitalists Targets of Spire Law Group, LLP's Racketeering and Money Laundering Lawsuit Seeking Return of $43 Trillion to the United States Treasury - MarketWatch - 0 views

  •  
    "NEW YORK, Oct. 25, 2012 /PRNewswire via COMTEX/ -- Spire Law Group, LLP's national home owners' lawsuit, pending in the venue where the "Banksters" control their $43 trillion racketeering scheme (New York) - known as the largest money laundering and racketeering lawsuit in United States History and identifying $43 trillion ($43,000,000,000,000.00) of laundered money by the "Banksters" and their U.S. racketeering partners and joint venturers - now pinpoints the identities of the key racketeering partners of the "Banksters" located in the highest offices of government and acting for their own self-interests. In connection with the federal lawsuit now impending in the United States District Court in Brooklyn, New York (Case No. 12-cv-04269-JBW-RML) - involving, among other things, a request that the District Court enjoin all mortgage foreclosures by the Banksters nationwide, unless and until the entire $43 trillion is repaid to a court-appointed receiver - Plaintiffs now establish the location of the $43 trillion ($43,000,000,000,000.00) of laundered money in a racketeering enterprise participated in by the following individuals (without limitation): Attorney General Holder acting in his individual capacity, Assistant Attorney General Tony West, the brother in law of Defendant California Attorney General Kamala Harris (both acting in their individual capacities), Jon Corzine (former New Jersey Governor), Robert Rubin (former Treasury Secretary and Bankster), Timothy Geitner, Treasury Secretary (acting in his individual capacity), Vikram Pandit (recently resigned and disgraced Chairman of the Board of Citigroup), Valerie Jarrett (a Senior White House Advisor), Anita Dunn (a former "communications director" for the Obama Administration), Robert Bauer (husband of Anita Dunn and Chief Legal Counsel for the Obama Re-election Campaign), as well as the "Banksters" themselves, and their affiliates and conduits. The lawsuit alleges serial violations of the United States Patri
  •  
    This is the first time anyone has tried to go after the Bankster class of midievil (mediæval) elites to recover theft of funds. Charges include racketeering, fraud and international money laundering. The mass tort action is now in the Brooklyn Federal Courts. Dead bodies are starting to show up as the Banksters move to shut down press coverage. Amazing stuff.
Paul Merrell

Where Bank Regulators Go to Get Rich - Bloomberg - 0 views

  • Mary Schapiro, the former chairman of the Securities and Exchange Commission, must take us for fools. No need to worry about her and the so-called revolving door between government and Wall Street, she told the Wall Street Journal on April 2, after announcing she would be joining the Promontory Financial Group LLC as a managing director in its Washington office, in charge of its governance and markets practice. “In my case, there’s no revolving door,” she said. “I won’t ever be going back to government.”
  • About 100 of the 400 Promontory employees are former Washington regulators; some 5 percent, like Ludwig, come from the Office of the Comptroller of the Currency, which regulates all banks with federal bank charters, including Citigroup Inc., Bank of America Corp. and JPMorgan Chase & Co. Last year, the firm hired Julie Williams, the former chief counsel of the OCC. To keep things in the family, the agency hired as Williams’s replacement Amy Friend, a Promontory managing director.
Gary Edwards

The Complete Benghazi Timeline in Spreadsheet Format - 0 views

  •  
    The American Thinker has published a comprehensive time line of events surrounding the Benghazi Massacre and Obama Coverup.  Incredible!  I wonder if the Turkish Ambassador is going to be called to testify in front Congress, and asked to explain the transfer of weapons from the Benghazi cache to Syrian Muslim Brotherhood rebels? excerpt: "The evidence of a cover-up is becoming clear, thanks to information recently released about what happened at Benghazi. Doug Ross of Director Blue has pulled together information from  Stephen Hayes and the House Oversight Committee that leads to, in his words, "four inescapable conclusions": a) Hillary Clinton lied under oath to Congress. b) Barack Obama went to sleep knowing that a U.S. Ambassador and other Americans were under terrorist attack. c) Barack Obama awoke refreshed the next day to begin fundraising. d) The entire Executive Branch lied repeatedly to the American people to save Obama's chances for reelection. Here's the spreadsheet:"
Gary Edwards

Guest Post: The Linchpin Lie: How Global Collapse Will Be Sold To The Masses | Zero Hedge - 0 views

  •  
    Stunning guest post at Zero Hedge that attempts to explain it all - Why things happen and who is behind the curtain pulling the strings.  And what are they trying to do?  Excellent piece exposing the Globalists and how they work.  The question of why war and debt is so important to the Globalist one world - new world order viewpoint is also explained. excerpt: "In our modern world there exist certain institutions of power.  Not government committees, alphabet agencies, corporate lobbies, or even standard military organizations; no, these are the mere "middle-men" of power.  The errand boys.  The well paid hitmen of the global mafia.  They are not the strategists or the decision makers.  Instead, I speak of institutions which introduce the newest paradigms.  Who write the propaganda.  Who issue the orders from on high.  I speak of the hubs of elitism which have initiated nearly every policy mechanism of our government for the past several decades.  I am talking about the Council On Foreign Relations, the Tavistock Institute, the Heritage Foundation (a socialist organization posing as conservative), the Bilderberg Group, as well as the corporate foils that they use to enact globalization, such as Monsanto, Goldman Sachs, JP Morgan, the Carlyle Group, etc. Many of these organizations and corporations operate a revolving door within the U.S. government.  Monsanto has champions, like Donald Rumsfeld who was on the board of directors of its Searle Pharmaceuticals branch, who later went on to help the company force numerous dangerous products including Aspartame through the FDA.  Goldman Sachs and JP Morgan have a veritable merry-go-round of corrupt banking agents which are appointed to important White House and Treasury positions on a regular basis REGARDLESS of which party happens to be in office.  Most prominent politicians are all members of the Council on Foreign Relations, an organization which has openly admitted on multiple occasions that thei
Paul Merrell

Reassured by NSA's Internal Procedures? Don't Be. They Still Don't Tell the Whole Story. | Electronic Frontier Foundation - 0 views

  • Yesterday, the Guardian released two previously-classified documents describing the internal "minimization" and "targeting" procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA's vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren't reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant. Which would be bad enough, if it were the end of the story. But it's not.
  • Unless the government substantially changed the procedures between August 2010 and October 2011, these are the very procedures that the FISC eventually found resulted in illegal and unconstitutional surveillance. In October 2011, the FISC issued an 86-page opinion finding that collection carried out under the NSA's classified minimization procedures was unconstitutional. The opinion remains secret, but it is very likely that yesterday's leaked NSA documents show the very minimization procedures the Director of National Intelligence admitted the FISC had found resulted in surveillance that was “unreasonable under the Fourth Amendment" and "circumvented the spirit of the law." And for good reason: the procedures are unconstitutional. They allow for the government to obtain and keep huge amounts of information it could never Constitutionally get without a warrant based on probable cause. As we explained, the procedures are designed such that the NSA will routinely fail to exclude or remove United States persons' communications, and the removal of those communications are wholly entrusted to the "reasonable discretion" of an analyst.  
  • Yesterday, the Guardian released two previously-classified documents describing the internal "minimization" and "targeting" procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA's vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren't reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant. Which would be bad enough, if it were the end of the story. But it's not. The targeting and minimization documents released yesterday are dated a few months after the first publicly known scandal over the new FAA procedures: In April 2009, the New York Times reported that Section 702 surveillance had “intercepted the private e-mail messages and phone calls of Americans . . . on a scale that went beyond the broad legal limits established by Congress." In June 2009, the Times reported that members of Congress were saying NSA's "recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged." Rep. Rush Holt described the problems as "so flagrant that they can't be accidental."
  • ...2 more annotations...
  • Presumably, following these "flagrant" abuses (and likely in response to the Congressional criticism of the original procedures), the government refined the procedures. The documents released yesterday are the "improved" targeting and minimization procedures, which appear to have been reused the following year, in 2010, in the FISC's annual certification. But these amended procedures still didn't stop illegal spying under Section 702. Unless the government substantially changed the procedures between August 2010 and October 2011, these are the mimization rules that the FISC eventually found to result in illegal and unconstitutional surveillance. In October 2011, the FISC issued an 86-page opinion finding that collection carried out under the NSA's minimization procedures was unconstitutional. The opinion remains secret, but it is likely that yesterday's leaked NSA documents show the very procedures the Director of National Intelligence admitted had been found to result in surveillance that was “unreasonable under the Fourth Amendment" and "circumvented the spirit of the law." And for good reason: the procedures are unconstitutional.
  • EFF has been litigating to uncover this critical FISC opinion through the Freedom of Information Act and to uncover the "secret law" the government has been hiding from the American public. And EFF isn't alone in fighting for the release of these documents. A bipartisan coalition of Senators just announced legislation that would require the Attorney General to declassify significant FISC opinions, a move they say would help put an end to precisely this kind of "secret law."
Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
Paul Merrell

CIA Releases Controversial Bay of Pigs History - 0 views

  • The CIA today released the long-contested Volume V of its official history of the Bay of Pigs invasion, which it had successfully concealed until now by claiming that it was a “draft” and could be withheld from the public under the FOIA’s "deliberative process" privilege. The National Security Archive fought the agency for years in court to release the historically significant volume, only to have the U.S. Court of Appeals in 2014 uphold the CIA’s overly-broad interpretation of the "deliberative process" privilege. Special credit for today’s release goes to the champions of the 2016 FOIA amendments, which set a 25-year sunset for the exemption:  Senators John Cornyn, Patrick Leahy, and Chuck Grassley, and Representatives Jason Chaffetz, Elijah Cummings, and Darrell Issa. Chief CIA Historian David Robarge states in the cover letter announcing the document’s release that the agency is “releasing this draft volume today because recent 2016 changes in the Freedom of Information Act (FOIA) requires us to release some drafts that are responsive to FOIA requests if they are more than 25 years old.” This improvement – codified by the FOIA Improvement Act of 2016 – came directly from the National Security Archive’s years of litigation. The CIA argued in court for years – backed by Department of Justice lawyers – that the release of this volume, written by Agency historian Jack B. Pfeiffer, would “confuse the public.” National Security Archive Director Tom Blanton says, “Now the public gets to decide for itself how confusing the CIA can be.  How many thousands of taxpayer dollars were wasted trying to hide a CIA historian's opinion that the Bay of Pigs aftermath degenerated into a nasty internal power struggle?” Archive senior analyst and Cuba Project Director Peter Kornbluh notes, “We know now why the CIA attempted to cover up this document for so long. It is a vivid historical example of what Pfeiffer called ‘the agency's dirty linen’ that CIA officials never wanted to air in public."
Paul Merrell

US Media Ignores CIA Cover-up on Torture - Consortiumnews - 0 views

  • MEMORANDUM FOR: Sen. Dianne Feinstein, Vice Chairman, Senate Select Committee on Intelligence FROM: Veteran Intelligence Professionals for Sanity SUBJECT: U.S. Media Mum On How Your Committee Faced Down Both CIA and Obama We write to thank you for your unwavering support for your extraordinarily courageous and tenacious staff in (1) investigating CIA torture under the Bush/Cheney administration and (2) resisting CIA/White House attempts under the Obama administration to cover up heinous torture crimes like waterboarding.
  • With well over 400 years of intelligence experience under our collective belt, we wondered how you managed to get the investigation finished and the executive summary up and out (though redacted). We now know the backstory – thanks to the unstinting courage of the committee’s principal investigator Daniel Jones, who has been interviewed by Spencer Ackerman, an investigative reporter for The (UK) Guardian newspaper. The titanic struggle depicted by Ackerman reads like a crime novel; sadly, the four-part series is nonfiction: I. “Senate investigator breaks silence about CIA’s ‘failed coverup’ of torture report” II. “Inside the fight to reveal the CIA’s torture secrets” III. ” ‘A constitutional crisis’: the CIA turns on the Senate” IV. “No looking back:  the CIA torture report’s aftermath“
  • Remarkably, a full week after The Guardian carried Ackerman’s revelations, none has been picked up by U.S. “mainstream” newspapers. Not the New York Times, the Wall Street Journal, the Washington Post – not even The Hill. (As for alternative media, Charles P. Pierce’s timely piece for Esquire whetted his readers’ appetite for the gripping detail of the Guardian series, explaining that it would be “unfair both to Ackerman’s diligence and Jones’s courage” to try to summarize even just the first installment. “Read the whole damn thing,” Pierce advises.)
  • ...2 more annotations...
  • And so, the culprits who should be hanging their heads in shame are out and about, with some still collecting book royalties and some blithely working for this or that candidate for president. As if nothing happened. Sadly, given the soporific state of our mainstream media – particularly on sensitive issues like these – their silence is nothing new, although it does seem to have gotten even worse in recent years. The late William Colby, CIA director from 1973 to 1976, has been quoted as saying: “The CIA owns everyone of any significance in the major media.” Whether or not Colby was quoted correctly, the experience of the past several decades suggests it is largely true. Better sourced is a quote from William Casey, CIA director from 1981 to 1987: “We’ll know our disinformation program is complete when everything the American public believes is false.”
  • In these circumstances, we know from sad experience that there is no way any of us can get on any of the Sunday talk shows, for example – despite our enviable record for getting it right. Nor does it seem likely that any of the “mainstream” media will invite you to discuss the highly instructive revelations in The Guardian. We respectfully suggest that you take the initiative to obtain media exposure for this very important story.
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Proposed Drone Strike on Julian Assange | True Pundit - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, Child Exploitation, Pay to Play, Perjury - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
Paul Merrell

WorldLII - WorldLII: About WorldLII - 0 views

  • You are here: WorldLII >> About WorldLII   What is WorldLII? The World Legal Information Institute (WorldLII) is a free, independent and non-profit global legal research facility developed collaboratively by the following Legal Information Institutes and other organisations. Australasian Legal Information Institute (AustLII) British and Irish Legal Information Institute (BAILII) Canadian Legal Information Institute (CanLII) Hong Kong Legal Information Institute (HKLII) Legal Information Institute (Cornell) (LII (Cornell)) Pacific Islands Legal Information Institute (PacLII) Wits University School of Law (Wits Law School) For further details, see the WorldLII brochure. The LIIs, meeting in Montreal in October 2002, adopted the Montreal Declaration on public access to law. WorldLII comprises three main facilities: Databases, Catalog and Websearch.
  • WorldLII Databases WorldLII provides a single search facility for databases located on the following Legal Information Institutes: AustLII; BAILII; CanLII; HKLII; LII (Cornell); and PacLII. WorldLII also includes as part of this searchable collection its own databases not found on other LIIs. These include databases of decisions of international Courts and Tribunals, databases from a number of Asian countries, and databases from South Africa (provided by Wits Law School). Over 270 databases from 48 jurisdictions in 20 countries are included in the initial release of WorldLII. Databases of case-law, legislation, treaties, law reform reports, law journals, and other materials are included. WorldLII welcomes enquiries concerning the possible inclusion of other databases on WorldLII or on one of its collaborating LIIs. WorldLII Catalog and Websearch The WorldLII Catalog provides links to over 15,000 law-related web sites in every country in the world. WorldLII's Websearch makes searchable the full text of as many of these sites as WorldLII's web-spider can reach. WorldLII welcomes enquiries from law librarians and other legal experts who are interested to become Contributing Editors to the WorldLII Catalog.
  • Operation of WorldLII The provision of the WorldLII service is coordinated by the Australasian Legal Information Institute (AustLII), which maintains WorldLII's user interface, the WorldLII Catalog and Websearch, and the databases located only on WorldLII. Technical enhancements to WorldLII are being developed jointly by the cooperating Legal Information Institutes. Contacting WorldLII General contact: feedback@worldlii.org AustLII/WorldLII Co-Directors: Professor Andrew Mowbray, UTS <andrew@austlii.edu.au> Professor Graham Greenleaf, UNSW <graham@austlii.edu.au> Philip Chung, AustLII Executive Director <philip@austlii.edu.au> Mail: WorldLII, c/- AustLII, UTS Faculty of Law, PO Box 123 Broadway NSW 2007 Australia Telephone: +61 2 9514 4921 Fax: +61 2 9514 4908 We hope that you enjoy using WorldLII and find it to be a useful service. Feedback (particularly words of encouragement or constructive criticism) are welcome and may be sent to feedback@worldlii.org. WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback URL: http://www.worldlii.org/worldlii/
  •  
    The various Legal information Institutes that collaborate on WorldLII have the most advanced, integrated, and largest public legal research databases available on the Internet, searchable through a common interface. Still nothing like a complete university law library because so many legal source materials are copyrighted, this is the combined effort of many law schools. A companion browser extension is available for Chrome and Firefox called Jureeka. That extension causes your pages rendered in the browser to contain hyperlinks to all legal authorities cited on the page that are recognized by the extension, with the links going to case law, regulations, and statues that are in the public domain. https://chrome.google.com/webstore/detail/jureeka/ediidjmindkcaflpfjgabfaibhngadbb?utm_source=chrome-app-launcher-info-dialog Thus far, Jureeka is integrated with all legal materials published by the Legal Information Institute long located at Cornell Law School, as well as the Justia archives of U.S. case law. Rumor has it that the extension will be extended to cover materials published by other Legal Information Institutes at various law schools around the globe.
Paul Merrell

Hillary Clinton Blames F.B.I. Director for Election Loss - The New York Times - 0 views

  • Hillary Clinton on Saturday cast blame for her surprise election loss on the announcement by the F.B.I. director, James B. Comey, days before the election that he had revived the inquiry into her use of a private email server.In her most extensive remarks since she conceded the race to Donald J. Trump early Wednesday, Mrs. Clinton told donors on a 30-minute conference call that Mr. Comey’s decision to send a letter to Congress about the inquiry 11 days before Election Day had thrust the controversy back into the news and had prevented her from ending the campaign with an optimistic closing argument.
  •  
    Jeez! No blame to be cast on Hillary herself for setting up the private server; blame the FBI instead? That's blaming the messenger instead of the information in the message.
Paul Merrell

Trump camp denies '100 per cent false' report president-elect plans to cut CIA staff and 'restructure' agency amid fears of 'politicized' agency following Russian hacking saga | Daily Mail Online - 0 views

  • Donald Trump's chief spokesman said Thursday that there's 'no truth' to a news report describing a plan by the president-elect to downsize the CIA's headquarters and 'restructure' America's intelligence agencies in order to de-politicize them.  The Wall Street Journal reported that Trump and his national security team were set to move more CIA agents to foreign posts along with 'streamlining' the Office of the Director of National Intelligence.But in a conference call with reporters, Trump's incoming press secretary Sean Spicer completely denied the story, which was based on anonymous sources who claimed to have inside knowledge of the transition team's intentions.'These reports are false. All transition activities are for information gathering purposes and all discussions are tentative,' Spicer said. 
Gary Edwards

Chris Hedges: The Real Purpose of the U.S. Government's Report on Alleged Hacking by Russia - Truthdig - 0 views

  •  
    "Some thoughts on "Russia's Influence Campaign Targeting the 2016 US Presidential Election," the newly released declassified report from the Office of the Director of National Intelligence. 1. The primary purpose of the declassified report, which offers no evidence to support its assertions that Russia hacked the U.S. presidential election campaign, is to discredit Donald Trump. I am not saying there was no Russian hack of John Podesta's emails. I am saying we have yet to see any tangible proof to back up the accusation. This charge-Sen. John McCain has likened the alleged effort by Russia to an act of war-is the first salvo in what will be a relentless campaign by the Republican and Democratic establishment, along with its corporatist allies and the mass media, to destroy the credibility of the president-elect and prepare the way for impeachment. The allegations in the report, amplified in breathtaking pronouncements by a compliant corporate media that operates in a non-fact-based universe every bit as pernicious as that inhabited by Trump, are designed to make Trump look like Vladimir Putin's useful idiot. An orchestrated and sustained campaign of innuendo and character assassination will be directed against Trump. When impeachment is finally proposed, Trump will have little public support and few allies and will have become a figure of open ridicule in the corporate media. 2. The second task of the report is to bolster the McCarthyist smear campaign against independent media, including Truthdig, as witting or unwitting agents of the Russian government. The demise of the English programming of Al-Jazeera and TeleSur, along with the collapse of the nation's public broadcasting, designed to give a voice to those not beholden to corporate or party interests, leaves RT America and Amy Goodman's Democracy Now! as the only two electronic outlets with a national reach that are willing to give a platform to critics of corporate power and imperialism s
Paul Merrell

Bipartisan Bill Would Forbid US Funding ISIS, al-Qaeda Affiliates -- News from Antiwar.com - 0 views

  • The Stop Arming Terrorists Act (SATA) has been introduced today in the House of Representatives by Rep. Tulsi Gabbard (D – HI). The bill is a bipartisan effort, co-sponsored by Reps. Peter Welch (D – VT), Barbara Lee (D – CA), Dana Rohrabacher (R – CA), and Thomas Massie (R – KY) which would forbid the US government from using taxpayer dollars to arm, fund, or train terrorist organizations.
  • Rep. Gabbard noted that it has been against the law for years for individual Americans to fund terrorist organizations, but that the US has been routinely doing so for years in Syria, providing arms to many terrorist-linked groups within Syria’s rebellion. The bill appears aimed primarily at ending the CIA program smuggling arms to Syrian rebels, something President-elect Donald Trump has also expressed support for. The bill singles out ISIS, al-Qaeda, and Jabhat Fateh al-Sham (the “rebranded” version of al-Qaeda’s Nusra Front) and forbids support to them, their allies, or foreign nations who are themselves providing support for the groups. The part prohibiting funding of foreign nations involved in backing the groups could be hugely impactful, as it would include nations like Saudi Arabia, Qatar and Turkey, which have openly backed a number of the rebel groups targeted. SATA would compel the Director of National Intelligence to provide a list of all the groups affiliated with or cooperating with those three organizations, as well as the countries providing assistance to them to several House committees. This could potentially be an obstacle as reports have suggested Trump does not intend to appoint a Director of National Intelligence.
Paul Merrell

Disclosing Classified Info to the Press - With Permission | - 0 views

  • Intelligence officials disclosed classified information to members of the press on at least three occasions in 2013, according to a National Security Agency report to Congress that was released last week under the Freedom of Information Act. See Congressional Notification — Authorized Disclosures of Classified Information to Media Personnel, NSA memorandum to the staff director, House Permanent Select Committee on Intelligence, December 13, 2013. The specific information that NSA gave to the unnamed reporters was not declassified. But the disclosures were not “leaks,” or unauthorized disclosures. They were, instead, authorized disclosures. For their part, the reporters agreed not to disseminate the information further. “Noteworthy among the classified topics disclosed were NSA’s use of metadata to locate terrorists, the techniques we use and the processes we follow to assist in locating hostages, [several words deleted] overseas support to the warfighter and U.S. allies in war zones, and NSA support to overall USG efforts to mitigate cyber threats. The [deleted] personnel executed non-disclosure agreements that covered all classified discussions.” In one case, “classified information was disclosed in order to correct inaccurate understandings held by the reporter about the nature and circumstances of [deleted].” On another occasion, “classified information was disclosed in an effort to limit or avoid reporting that could lead to the loss of the capability [deleted].”
  • In all three cases, “the decision to disclose classified information was made in consultation with the Director of National Intelligence pursuant to Executive Order 13526, and in each case the information disclosed remains properly classified.” This seems like a generous interpretation of the Executive Order, which does not mention disclosures to the press at all. It does say, in section 4.2(b) that “In an emergency, when necessary to respond to an imminent threat to life or in defense of the homeland, the agency head or any designee may authorize the disclosure of classified information […] to an individual or individuals who are otherwise not eligible for access.” In an emergency, then, but not just “to correct inaccurate understandings.” Still, the report accurately reflects the true instrumental nature of the classification system. That is, the protection of classified information under all circumstances is not a paramount goal. National security secrecy is a tool to be used if it advances the national interest (and is consistent with law and policy) and to be set aside when it does not. So hypocrisy in the handling of classified information is not an issue here. The concern, rather, is that the power of selective disclosure of classified material can be easily abused to manage and to manipulate public perceptions. The congressional requirement to report on authorized disclosures of classified information to the press may help to mitigate that danger.
  •  
    This would set up an interesting Freedom of Information Act case aimed at resolving the issue whether the "authorized" disclosures established a waiver of the FOIA exemption for national security information. A waiver, viewed most simplistically, is any conduct that is inconsistent with later assertion of a right. Deliberate disclosure to anyone who lacks a national security clearance would seem to be inconsistent with later assertion of the exemption. That the purpose of the disclosures was to adjust the attitudes of press members seems a very poor justification in that it establishes particular reporters as a class of persons entitled to more disclosure than other members of the public. Yet the Supreme Court has held time and again that journalists have no more right to access government information than any other member of the public. So there is a strong argument that everyone should be entitled to the same disclosures.
« First ‹ Previous 121 - 140 of 688 Next › Last »
Showing 20 items per page