Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "page" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
8More

The United Nations' Response to ISIS Beheadings in Syria. "Resolutions" Calling for "Re... - 0 views

  • Following the gruesome beheading of James Foley, by a terrorist group called “The Islamic State of Iraq and Syria,” and the group’s threats to behead other captives in August 2014, The New York Times headline on page A19 reads, with Kafkaesque “logic”:  “U.S. Invokes Defense of Iraq in Legal Justification of Syria Strikes.”  US/NATO had failed, for three years, to get UN Security Council authorization for military action against Syria, and unilateral military action against Syria would be a violation of international law. However, the very visible emergence of ISIS, now defined as the most dangerous terrorist organization in the Middle East, or, perhaps, globally, and their widely publicized video beheadings of James Foley, Steve Sotloff and others, appeared to give some form of de facto justification for broader military action, including against Syria.  On August 22, 2014, The New York Times reported, page A6: “When the United States began airstrikes in Iraq this month, senior Obama administration officials went out of their way to underscore the limited nature of their action.  ‘This was not an authorization of a broad-based counterterrorism campaign,’ a senior Obama administration official told reporters at the time.  But the beheading of an American journalist and the possibility that more American citizens being held by the group might be slain has prompted outrage at the highest levels of the American government.”
  • In an interview with Anderson Cooper, Diane Foley stated that a military official forbade the family from going to the media and threatened to prosecute them for supporting terrorism if they attempted to raise the $1.32 million dollar ransom demanded by ISIS. “Three times he intimidated us with that message.  We were horrified he would say that.  He just told us we would be prosecuted.  We knew we had to save our son, we had to try,” Mrs. Foley told Anderson Cooper. Foley’s brother, Michael noted in an interview that he was ‘directly threatened with possible prosecution for violating anti-terrorism laws by a State Department official.”  Reporter Michael Isikoff states, in a September 12 article: “The parents of murdered journalist Steven Sotloff were told by a White House counterterrorism official at a meeting last May that they could face criminal prosecution if they paid ransom to try to free their son.”
  • Indeed, it can be asserted that these same administration officials who claimed “outrage” after the beheadings, inflicted the most extreme psychological torture upon the families of James Foley and Stephen Sotloff, who were desperately trying to save the lives of their sons and brother. On September 12, 2014, ABC news reported:  “Obama administration officials repeatedly threatened the family of murdered journalist James Foley that they might face criminal charges for supporting terrorism if they paid ransom to the ISIS killers who ultimately beheaded their son, his mother and brother said this week.  ‘We were told that several times and we took it as a threat and it was appalling,’ Foley’s mother Diane told ABC news in an interview.  She said the warnings over the summer came primarily from a highly decorated military officer serving on the White House National Security Council staff, which five outraged current and former officials with direct knowledge of the Foley case also recounted to ABC news in recent weeks.”
  • ...4 more annotations...
  • Mrs. Foley diplomatically implies that her son’s death was in the “strategic interest” and she stops just short of accusing the administration of using her son’s beheading as the fig-leaf they needed to justify the administration’s unilateral attack on Syria, which was in violation of international law. If saving Foley was not in the “strategic interest,” a very frightening possibility exists. The murders of Foley and Sotloff, both of whom were beheaded by ISIS, were called ‘acts of barbarism’ by Obama in his speech announcing a military campaign to destroy the terrorist organization. Frenzied hysteria over human rights abuses in Syria continues to be incited by mainstream media, as the middle east is fragmented and decomposed by US/NATO bombings and internecine warfare so complex that the UN’s call for the “diplomatic resolution” of multiple devastating conflicts becomes an increasingly remote possibility.  Saudi Arabia and Qatar continue arming the terrorist opposition.
  • “Sotloff’s father, Art, was ‘shaking’ after the meeting with the official, who works for the National Security Council.  Sources close to the family say that at the time of the White House meeting the Sotloffs and Foleys were exploring lining up donors who would help pay multimillion dollar ransoms to free their sons.  But after the meeting those efforts collapsed, one source said, because of concerns that ‘donors could expose themselves to prosecution.’” James Nye for Mailonline reported:  “Mrs. Foley poured scorn on the Pentagon’s claim they tried to rescue Foley on July 4, only to raid the wrong base…Throughout the 20 month ordeal, Mrs. Foley said she came to regard her and her family’s efforts to rescue James as an ‘annoyance’ to the administration and began to feel that their desperation to bring James Foley home did not ‘seem to be in the strategic interest, if you will.’”
  • The front page headline states:  “U.S. General Says Raiding Syria is Key to Halting Isis.  The Islamic State in Iraq and Syria cannot be defeated unless the United States or its partners take on the Sunni militants in Syria,’ General Martin Dempsey, Chairman of the Joint Chiefs of Staff said on August 21, 2014. ‘This is an organization that has an apocalyptic end-of-days strategic vision that will eventually have to be defeated.  Can they be defeated without addressing that part of the organization that resides in Syria?  The answer is no.” Public horror at the beheading of James Foley and Steven Sotloff transformed public reluctance to engage in yet another seemingly endless and futile distant war, paid for by the U.S. taxpayer, into public outrage and support for retaliation against the terrorists who beheaded Foley and Sotloff.  US/NATO now had a de facto form of support and legitimacy for attacking Syria.  Given little publicity, however, then and now, was the fact that ISIS offered to exchange the lives of James Foley and Stephen Sotloff for $100 million dollars in ransom.  Although top U.S. officials used their “outrage” at the beheading of Foley and Sotloff to “justify” a unilateral attack on Syria, they were not sufficiently outraged to do what was necessary to prevent these beheadings, which, once executed, provided a convenient fig-leaf for the attack on Syria for which  they had sought and failed to attain legal justification during the preceding three years.
  • At the same time that the military-industrial complex thrives on huge profits derived from these geo-politically engineered conflicts, it is worth recalling the September 10, 2014 report by Mazzetti, Schmitt and Landler in The New York Times: “Washington – “The violent ambitions of the Islamic State in Iraq and Syria have been condemned across the world:  in Europe and the Middle East, by Sunni nations and Shiite ones, and by sworn enemies like Israel and Iran.  Pope Francis joined the call for ISIS to be stopped. “As President Obama prepares to send the United States on what could be yearslong military campaign against the militant group (ISIS), American intelligence agencies have concluded that it poses no immediate threat to the United States.  Some officials and terrorism experts believe that the actual danger posed by ISIS has been distorted in hours of television punditry and alarmist statements by politicians, and that there has been little substantive public debate about the unintended consequences of expanding American military action in the Middle East. “Daniel Benjamin, who served as the State Department’s top counterterrorism adviser during Mr. Obama’s first term, said the public discussion about the ISIS threat has been a ‘farce,’ with ‘members of the cabinet and top military officers all over the place describing the threat in lurid terms that are not justified.’  “It’s hard to imagine a better indication of the ability of elected officials and TV talking heads to spin the public into a panic, with claims that the nation is honeycombed with sleeper cells, that operatives are streaming across the border into Texas or that the group will soon be spraying Ebola virus on mass transit systems – all on the basis of no corroborated information,’ said Mr. Benjamin, who is now a scholar at Dartmouth College.”
  •  
    The Feds' "no ransom" policy might better be changed to "pay the ransom then extract retribution." It would still serve as a deterrent. Nonetheless, that policy is now part of a U.N. Security Council Resolution. 
13More

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
5More

The Ron Paul Institute for Peace and Prosperity : End Torture, Shut Down the CIA! - 0 views

  • End Torture, Shut Down the CIA! Written by Ron Paul Sunday July 27, 2014
  • Remember back in April, 2007, when then-CIA director George Tenet appeared on 60 Minutes, angrily telling the program host, “we don’t torture people”? Remember a few months later, in October, President George W. Bush saying, “this government does not torture people”? We knew then it was not true because we had already seen the photos of Iraqis tortured at Abu Ghraib prison four years earlier.   Still the US administration denied that torture was torture, preferring to call it “enhanced interrogation” and claiming that it had disrupted so many terrorist plots. Of course, we later found out that the CIA had not only lied about the torture of large numbers of people after 9/11, but it had vastly exaggerated any valuable information that came from such practices. However secret rendition of prisoners to other places was ongoing.
  • The US not only tortured people in its own custody, however. Last week the European Court of Human Rights found that the US government transferred individuals to secret detention centers in Poland (and likely elsewhere) where they were tortured away from public scrutiny. The government of Poland was ordered to pay hundreds of thousands of dollars in damages to two victims for doing nothing to stop their torture on Polish soil.
  • ...1 more annotation...
  • Meanwhile, former CIA director George Tenet and other senior current and former CIA officials are said to be frantically attempting to prepare a response to a planned release of an unclassified version of a 6,500 page Senate Intelligence Committee study on the torture practices of that agency. The CIA was already caught tapping into the computers of Senate investigators last year, looking to see what information might be contained in the report. Those who have seen the report have commented that it details far more brutal CIA practices than have been revealed to this point.   Revelations of US secret torture sites overseas and a new Senate investigation revealing widespread horrific CIA torture practices should finally lead to the abolishment of this agency. Far from keeping us safer, CIA covert actions across the globe have led to destruction of countries and societies and unprecedented resentment toward the United States. For our own safety, end the CIA!
  •  
    Ron Paul calls for shutting down the CIA. He's not the first. For example, former President Harry Truman, who established the CIA, said years after he left office that the Agency was operating so far outside its authority that it should be shut down. And JFK was also seriously considering ending the CIA. By statute, the CIA is limited to intelligence gathering, acting as the central intelligence agency for gathering and reporting to the President on all intelligence from all other intelligence agencies.  One error in Paul's article, where he says that the recent decisions were the first time the European Court of Human Rights had connected any EU country to U.S. torture practices. The first was in 2012 in the case of El-Masri v. The Former Yugoslav Republic of Macedonia, No. 39630/09, European Court of Human Rights (Grand Chamber Judgment of 13 December 2012), http://hudoc.echr.coe.int/sites/fra-press/pages/search.aspx?i=003-4184975-4955119, also at http://tinyurl.com/c88qs74. See also El-Masri Application, http://www.law.columbia.edu/ipimages/Human_Rights_Institute/ctlm%20docs/ElMasriApplication.pdf.
4More

Hillary Clinton undercut on Libya war by Pentagon and Congress, secret tapes reveal - W... - 0 views

  • First of three partsTop Pentagon officials and a senior Democrat in Congress so distrusted Secretary of State Hillary Rodham Clinton’s 2011 march to war in Libya that they opened their own diplomatic channels with the Gadhafi regime in an effort to halt the escalating crisis, according to secret audio recordings recovered from Tripoli.The tapes, reviewed by The Washington Times and authenticated by the participants, chronicle U.S. officials’ unfiltered conversations with Col. Moammar Gadhafi’s son and a top Libyan leader, including criticisms that Mrs. Clinton had developed tunnel vision and led the U.S. into an unnecessary war without adequately weighing the intelligence community’s concerns.
  • SEE ALSO: Hillary Clinton’s ‘WMD’ moment: U.S. intelligence saw false narrative in Libya “You should see these internal State Department reports that are produced in the State Department that go out to the Congress. They’re just full of stupid, stupid facts,” an American intermediary specifically dispatched by the Joint Chiefs of Staff told the Gadhafi regime in July 2011, saying the State Department was controlling what intelligence would be reported to U.S. officials.At the time, the Gadhafi regime was fighting a civil war that grew out of the Arab Spring, battling Islamist-backed rebels who wanted to dethrone the longtime dictator. Mrs. Clinton argued that Gadhafi might engage in genocide and create a humanitarian crisis and ultimately persuaded President Obama, NATO allies and the United Nations to authorize military intervention.
  • Mr. Kucinich, who challenged Mrs. Clinton and Barack Obama for the 2008 Democratic presidential nomination, acknowledged that he undertook his own conversations with the Gadhafi regime. He said he feared Mrs. Clinton was using emotion to sell a war against Libya that wasn’t warranted, and he wanted to get all the information he could to share with his congressional colleagues.“I had facts that indicated America was headed once again into an intervention that was going to be disastrous,” Mr. Kucinich told The Times. “What was being said at the State Department — if you look at the charge at the time — it wasn’t so much about what happened as it was about what would happen. So there was a distortion of events that were occurring in Libya to justify an intervention which was essentially wrong and illegal.”Mr. Kucinich wrote a letter to Mr. Obama and Mrs. Clinton in August explaining his communications in a last-ditch effort to stop the war.
  •  
    This series should be the end of Hillary's plans to run for the presidency in 2016. Unfortunately, it probably won't stop her and the mere fact that she is female and a Clinton is likely to get her elected. But this article makes a compelling case that she was not even fit to be Secretary of State. This article is seven pages. I'm looking forward to the next in the series. 
5More

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
13More

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
4More

9/11 judge: War court can't order Guantánamo healthcare | Miami Herald Miami ... - 0 views

  • A​ military judge has rejected a request for war court intervention in the healthcare of an alleged 9/11 plotter who, according to his lawyer, still suffers from wounds inflicted at a CIA “black site” where agents subjected him to rectal rehydration.Army Col. James L. Pohl wrote in a two-page order released by the Pentagon Friday that the court “does not have the authority to address issues concerning medical care.” It was dated March 10.In February, the attorney for Saudi captive Mustafa al Hawsawi asked the judge to intervene in the case, referring to a recently released portion of the Senate Intelligence Committee's “Torture Report,” and saying that the 46-year-old man had been rectally abused while in CIA custody — and that he continues to bleed now, at least eight years later. “Some would call that sodomy,” said attorney Walter Ruiz, adding that “those acts caused longstanding chronic medical conditions that have yet to be resolved.”
  • Hawsawi is accused of helping the Sept. 11 hijackers with travel and money. He is awaiting a death-penalty trial with the alleged mastermind, Khalid Sheik Mohammed, and three others, all of whom were subjected to “enhanced interrogation techniques” before they got to Guantánamo in September 2006.Hawsawi has sat on a pillow over years of pretrial hearings. The February hearing was the first time that Ruiz was permitted to explain it under a loosening of censorship at the court that lets lawyers talk about the released, redacted 524-page portion of the 6,200-page Senate report.Guantánamo’s prison spokesmen say war-on-terror captives get the same level of medical care as U.S. service members.Ruiz specifically cited a reference to an investigation of allegations that CIA agents conducted medically unnecessary rectal exams with excessive force on two detainees, one of them Hawsawi, who afterward suffered an anal fissure, rectal prolapse and hemorrhoids. 
  • Ruiz said that guards sometimes find blood in Hawsawi’s clothes. The lawyer asked the judge to order prison legal and medical staff to speak with him, as Hawsawi’s healthcare proxy, and to let him see Hawsawi’s secret medical records. Prosecutors urged the Army judge to stay out of the issue. “No doctor should be treating with a lawyer looking over his shoulder,” said federal attorney Ed Ryan.The Sept. 11 hearings are in recess until April 20.
  •  
    Whereas if he were facing trial in an Article III court, the court would have jurisdiction to protect a prisoner's health and conditons of confinement. This is disgusting.
3More

911 - The New Pearl Harbor by Massimo Mazzucco - 0 views

  • "September 11 - The New Pearl Harbor" is a 5 hour documentary that summarizes 12 years of public debate on 9/11. While aimed primarily at a general, uninformed audience, the film also contains some new findings that may be of interest to advanced researchers. This film is intended as an educational, non-profit operation, and must remain so in order to fulfill all the requirements for the usage of copyrighted material. As such, the entire film is made available online for free from day one. Any purchase of the actual DVD will be considered as a form of donation to the author, in recognition of the time spent to put together this material. Free duplication and distribution of all DVDs is encouraged. At the bottom of the page you will find more information related to this film, including the links to order the DVD, and the TRAILER.
  •  
    The best 911 documentary i've ever seen. Period. ""September 11 - The New Pearl Harbor" is a 5 hour documentary that summarizes 12 years of public debate on 9/11. While aimed primarily at a general, uninformed audience, the film also contains some new findings that may be of interest to advanced researchers. This film is intended as an educational, non-profit operation, and must remain so in order to fulfill all the requirements for the usage of copyrighted material. As such, the entire film is made available online for free from day one. Any purchase of the actual DVD will be considered as a form of donation to the author, in recognition of the time spent to put together this material. Free duplication and distribution of all DVDs is encouraged. At the bottom of the page you will find more information related to this film, including the links to order the DVD, and the TRAILER."
  •  
    Best I've seen so far too. But it dives deep into a critical subset of the evidence that the official version of events is preposterous.There is far more evidence out there. E.g., the documentary doesn't deal with the evidence of Israeli involvement.
5More

Former public testimony disappears from Guantánamo transcripts | Miami Herald - 0 views

  • For hours on a Friday, a staff sergeant using the fake name “Jinx” testified in open court about her yearlong work here at a prison for suspected terrorists once considered the CIA’s prized war-on-terror captives.
  • The few reporters who went to court or watched on video feeds from Guantánamo to Fort Meade, Maryland, as well as a dozen legal observers and the mother and sister of a man killed in the World Trade Center on Sept. 11, 2001, heard her say all that in open court. But as far as the public court record is concerned, those things were never said.
  • In a first for the war court, intelligence agencies scrubbed those and other facts — including questions asked by the judge, Army Col. James L. Pohl — from a 379-page transcript of the Oct. 30 pretrial hearing in the 9/11 death-penalty case. A Miami Herald examination counted more than 130 pages with blacked out public testimony. Of them, 37 pages are completely redacted in the latest challenge to the remote war court’s motto, “Fairness, Transparency, Justice.” Typically the court releases the transcripts “word for word with no redactions,” chief prosecutor Brig. Gen. Mark Martins told reporters Saturday, defending the “rare” exception of “ex-post redactions” as a security necessity.“I have not encountered it actually thus far for a transcript to be redacted. But there is a rule that enables that,” he said. “The government is fully entitled to look and say in the aftermath … ‘It ought to be protected, it could be damaging.’”
  • ...2 more annotations...
  • At issue on Oct. 30 was Pohl’s January restraining order forbidding female guards from touching the alleged Sept. 11 plotters as they come and go from court and legal meetings, an accommodation to their Islamic traditions. The restriction recently sparked outrage among top Pentagon brass and some in Congress. The issue is unlikely to be resolved before a closed session in February to hear classified testimony.But now, in light of the retroactive redacting, case lawyers and the Sept. 11 trial judge will spend Monday huddling in closed court — no public, none of the accused conspirators listening — as they discuss how to go forward with the testimony on Pohl’s controversial restraining order.Yale Law School lecturer Eugene Fidell, whose specialty has long been military justice, said the court has a 40-second audio delay to the public and a security officer assigned to block the feed with white noise and warned that the after-the-fact censorship could be “the new normal.”
  • “The military has a real allergy to transparency,” said Fidell after declaring himself dumfounded by the effort to “sanitize stuff that has already been uttered in open court.”“Obviously there are things that can and must be kept secret,” he said. “But to try to get the genie back in the bottle for information that has already been uttered in a public proceeding — especially where there’s a time delay to protect classified information — is preposterous.”
8More

Courthouse News Service - 0 views

  • During secret proceedings in Washington, a key witness in undermining the $9.5 billion judgment Chevron faces in Ecuador repudiated much of his explosive testimony, transcripts made public today show.     Since agreeing to testify for the oil giant, Judge Alberto Guerra's fortunes have changed, and so have Chevron's.     Roughly two years ago, Guerra took to the witness stand in a New York federal courtroom and swore that lawyers for rainforest villagers bribed him to ghostwrite a multibillion-dollar Ecuadorean court judgment against Chevron for oil contamination to the Amazon jungle.     About a year before he made a deal with Chevron, Guerra had little more than $100 to his name. He also owed tens of thousands of dollars in debt and could not afford to visit his children living in the United States.     U.S. District Judge Lewis Kaplan had warned early on in proceedings that he did not "assume that anyone's hands in this are clean," yet he credited Guerra's testimony last year in ruling that the Ecuadoreans obtained their award "by corrupt means."     The Ecuadoreans have long attacked Guerra, who has a contract with Chevron for various perks, including at least $326,000, an immigration attorney and a car, as a "paid-for" participant in the oil giant's self-styled witness-protection program.     Kaplan's decision conceded that "Guerra's credibility is not impeccable," but found that his account was "corroborated extensively by independent evidence."
  • Both that credibility and the corroborating evidence came under withering attack this year during closed-door proceedings before an international arbitration tribunal.     Though the hearings took place without press or public access at the World Bank in Washington on April 23 and 24, the tribunal agreed to release transcripts of the proceedings in response to a Courthouse News request that the Reporters Committee for Freedom of the Press supported.     Courthouse News obtained advanced copies of more than 3,000 pages of transcripts, which were formally released on Monday.     They show Guerra putting a new twist on an old saying. "Money talks, gold screams," Guerra said in a June 25, 2012, meeting with Chevron representatives - a meeting Chevron recorded.     Testifying about this comment at the arbitration hearing, Guerra said Chevron showed him a safe filled with money. He recounted Chevron's representatives telling him: "Look, look, look what's down there. We have $20,000 there."     He remembered replying: "Oh, OK, very well, very well."     Guerra said he had only $146 in his bank account a year earlier, and owed tens of thousands more to finish the construction of his house. He said he could not scrape money for airfare to visit his children in the United States.
  •  Minutes from Guerra's meeting with Chevron that came to light during the tribunal proceedings showed that Chevron's lawyers hoped to find evidence that the Ecuadorean government had pressured the Guerra to rule against the company.     Guerra disappointed by saying that Ecuadorean President Rafael Correa's administration "never butted in" to the process, the transcript shows.     "These guys are idiots, but the truth, the truth, I attest, damn, they never got involved," Guerra added, referring to Correa's government.     The remark appears to undercut the foundation of Chevron's arbitration case, which asks the tribunal to blame the Ecuadorean government for a miscarriage of justice.     Guerra stood by those comments on the arbitration panel's witness stand.      "My position is that the government did not intervene," Guerra said.     The only time an Ecuadorean government official tried to elbow into the case, Guerra testified, was under a prior administration. Correa's predecessors pushed to dismiss the case in Chevron's favor in 2003, he said.
  • ...4 more annotations...
  •  Guerra also acknowledged bluntly on the witness stand that he had lied in telling Chevron's team that attorneys for the Ecuadoreans offered him $300,000.     "Yes, sir, I lied there," Guerra told Eric Bloom, who represents Ecuador for the firm Winston & Strawn. "I wasn't truthful."     Guerra maintains that other attorneys for the Ecuadoreans, specifically Steven Donziger and Pablo Fajardo, offered money in return for ghostwriting the judgment on behalf of Judge Nicolas Zambrano, the final jurist to preside over the case.     Shifting the details of this supposed arrangement, though, Guerra walked back his allegation that Zambrano offered him 20 percent.     "That was my sworn statement in New York, but what I said is that, because of a circumstance, because of a situation, I mentioned 20 percent when it wasn't true, and I think that, as a gentleman, I should say the truth, and we did not discuss - I did not discuss 20 percent with Mr. Zambrano - but we did discuss that he would share with me from what he received," he said.     In his nearly 500-page ruling, Judge Kaplan pointed to bank records, daily planners, shipping records and airplane tickets as corroborating evidence that outweighed Guerra's credibility problems.
  • Particularly persuasive for Kaplan was evidence that Ecuador's national airline, Tame, certified delivery of packages between Guerra and Zambrano.     Guerra told the arbitrators this spring, however, that all 11 of these packages "had nothing to do with the [Chevron] case."     As for his plane tickets to the rainforest from Aug. 11 and 12, 2010, Guerra said they occurred during an irrelevant time period.     "If I traveled during those dates, it wasn't for me to provide assistance to the Chevron case," he said.     Guerra testified that Chevron representatives told him that they would have raised his pay if he could provide them with the key physical evidence they were looking for: a draft of the judgment.     "We were unable to find the main document," Guerra recalled them saying. "Had we been able to find it, we would have been able to offer you a larger amount, something like that, we have $18,000 for you, and we're going to take the computer with us."     Though Guerra did not have a copy of the judgment, Ecuador's forensic expert Christopher Racich testified that he found a running draft of the judgment against Chevron on Zambrano's hard drives.
  • Ecuador now argues that this forensic evidence - which Courthouse News reported exclusively early this year - proves Zambrano painstakingly wrote the ruling and saved it hundreds of times throughout the case.     Chevron has not been able to produce emails between Guerra, Zambrano and the purported ghostwriters, Donziger and Fajardo, Ecuador's forensic expert says.     Guerra acknowledged to the arbitrators that that the bounty of physical evidence he promised Chevron fell short.     There are no calendars and day planners marked with meetings scheduled between Fajardo, Donziger or Guerra, he acknowledged.     While Guerra said he had payments from Zambrano from April 2011 and February 2012, he testified that these "had no connection to the Chevron case."     For Chevron, the thousands of pages of transcripts show that the company "proved its case before the International Arbitration Tribunal."     "Witness and expert testimony confirmed that the Ecuadorean judgment against Chevron was ghostwritten by Steven Donziger and his team and that the Ecuadorian government is responsible for any further remediation," Chevron spokesman Morgan Crinklaw said in a statement. "Chevron also proved that Ecuador breached the U.S.-Ecuador Bilateral Investment Treaty and international law."     Donziger, who still works for the Ecuadorean villagers seeking to collect from Chevron, said in a statement that Guerra's latest testimony "demonstrates once and for all that Chevron's so-called racketeering case has completely fallen apart."
  •   "Guerra has been the linchpin of Chevron's entire body of trumped up evidence and he now stands not only as an admitted liar, but also as a shocking symbol of how Chevron's management has become so obsessed with evading its legal obligations in Ecuador that it is willing to risk presenting false evidence in court to try to frame adversary counsel and undermine the rule of law," Donziger added.
  •  
    Chevron has a "witness-protection program" as an excuse for paying off witnesses? And for paying them to lie under oath, it appears. Never in my legal career did I ever here of a non-governmental entity with a witness protection program. This reeks to high heavens.  Hats off to Courthouse News for digging deep on this one.   
3More

» The government has made an "absolute mockery" of Bradley Manning's right to... - 0 views

  • It’s appropriate that David Coombs’ longest motion of this trial yet, which argues for dismissal of all charges, details PFC Bradley Manning’s extraordinarily and illegally long pretrial confinement. The prosecution’s repeated and unjustifiable delays point “unmistakably to the conclusion that PFC Manning’s statutory and constitutional speedy trial rights have been trampled upon with impunity.”
  • “As of the date of this motion, PFC Manning has been in pretrial confinement for 845 days. Eight hundred forty-five days…. With trial scheduled to commence on 4 February 2013, PFC Manning will have spent a grand total of 983 days in pretrial confinement before even a single piece of evidence is offered against him. To put this amount of time into perspective, the Empire State Building could have been constructed almost two-and-a-half times over in the amount of time it will have taken to bring PFC Manning to trial.” The Rule for Court Martial (RCM) 707 affords 120 days from arrest to arraignment to constitute a speedy trial. However, Bradley was arraigned nearly two years after his arrest and will have been imprisoned for nearly 1,000 days if his court-martial begins as scheduled on February 4, 2013.
  •  
    I've read the 117-page brief. This is an outrageous violation of our Constitution.
1More

DEMOCRATS  AGAINST  U. N.  AGENDA  21 - OK, So what is Agenda 21? And why sho... - 0 views

  •  
    "UN Agenda 21/Sustainable Development is implemented worldwide to inventory and control all land, all water, all minerals, all plants, all animals, all construction, all means of production, all information, and all human beings in the world.   INVENTORY AND CONTROL. Have you wondered where these terms 'sustainability' and 'smart growth' and 'high density urban mixed use development' came from?  Doesn't it seem like about 10 years ago you'd never heard of them and now everything seems to include these concepts?  Is that just a coincidence?  That every town and county and state and nation in the world would be changing their land use/planning codes and government policies to align themselves with...what? First, before I get going, I want to say that yes, I know it's a small world and it takes a village and we're all one planet etc.  I also know that we have a government of the people, by the people, and for the people, and that as cumbersome as that can be sometimes (Donald Rumsfeld said that the Chinese have it easy; they don't have to ask their people if they agree.  And Bush Junior said that it would be great to have a dictator as long as he was the dictator), we have a three branch government and the Bill of Rights, Constitution, and self-determination.  This is one of the reasons why people want to come to the US, right?  We don't have Tiananmen Square here, generally speaking (yes, I remember Kent State--not the same, and yes, an outrage.) So I'm not against making certain issues a priority, such as mindful energy use, alternative energy sponsorship, recycling/reuse, and sensitivity to all living creatures. But then you have UN Agenda 21.  What is it?  See our videos and radio shows at the bottom of this page (or search YouTube for Rosa Koire) or buy BEHIND THE GREEN MASK: U.N. Agenda 21 by Rosa Koire click here"
1More

Romney Did Not Lose - 0 views

  •  
    excerpt: I'm still formulating how I need to proceed in light of this new understanding, but what I know, and what I need to factor into my future calculations is the fact that we - the people who love our country and favor fiscal sanity and subscribe to the ideals of the Founders - are not outnumbered. We remain in the majority. I can't remember ever having been here. I grew up in the '60s, but served in the military rather than in Haight-Ashbury. I raised my family to be responsible and self-sufficient, just as my parents did. I guess you could say I was more or less aligned with the "establishment" of the day, even though I have for years disagreed with the trend toward more socialism and fascism. Today, the Establishment has crossed a line. They have arrayed themselves against the majority of the American people. I won't be joining them. I won't be agreeing with them. I won't be accepting their "truth." I will, instead, stand for my truth. And I suspect I am not alone. The usurpers (for I can't reasonably refer to them otherwise) are now the "establishment" even though they are really in the minority. So… that makes us… what? Well, what do you call someone who stands against the Establishment? Feels kinda odd to be in those shoes, doesn't it? Welcome to the Resistance. ......................... ...................................... Historical data on 56 previous elections indicate at least 15 to 20 million votes flipped and missing. Data available for everyone right in front of our eyes. Out of 56 presidential elections there were only 7 elections that voter turn out was down from previous elections. The combined total for all 7 elections is 13,428,613 or 0.73% out of all 56 elections generating 1,835,207,811 votes. These 7 elections had events such as war of 1812, civil war, ww2, stock market crash attached to declines in voter turn out. The average growth in all presidential elections is 2,892,573 per election. The
1More

What You Can Do About Vote Fraud | Fellowship of the Minds - 0 views

  •  
    "What You Can Do About Vote Fraud Posted on November 17, 2012 by Dr. Eowyn | 2 Comments excerpt: There is now massive compelling evidence that Democrats committed vote fraud in the 2012 presidential election, especially in the four battleground states of Colorado, Florida, Ohio, and Virginia. See FOTM's posts chronicling the extensive pervasive fraud by going to our "2012 Election" page below our FOTM masthead, and click on those post links colored neon green. But the Republican Party won't do anything about the fraud, because it is legally constrained by an agreement the Republican National Committee (RNC) made with the Democratic National Committee (DNC) in 1982, to settle a lawsuit. The agreement or Consent Decree, which is national in scope, limits the RNC's ability to engage or assist in voter fraud prevention unless the RNC obtains the court's approval in advance. Nor can the RNC engage in "ballot security activities" - defined as "ballot integrity, ballot security or other efforts to prevent or remedy vote fraud." Read more about the agreement HERE. Simply put, the GOP is neutered. But we ordinary Americans can do something about vote fraud, in our separate states. FOTM's Hardnox has been urging us to contact our state's attorney general. Here's how." Dr. Eowyn provides a list of all 50 State Attorneys Generals for the purposes of direct mail.  Mailing addresses and phone numbers!  Get writing Patriots.  It's now or never.
1More

Why the GOP won't challenge vote fraud | Fellowship of the Minds - 0 views

  •  
    The Consent Decree of 1982 is an agreement between the Republican and Democrat parties that prohibits the Republican party from enforcing, providing oversight, or challenging allegations of voter fraud.  The Judge who signed the Consent Decree is retired, but comes out of retirement every election year to renew the decree..... Excerpt: The RNC and DNC made their Consent Decree 30 years ago, in 1982. The agreement in effect gives a carte blanche to the Democrat Party to commit vote fraud in every voting district across America that has, in the language of the Consent Decree, "a substantial proportion of racial or ethnic populations." The term "substantial proportion" is not defined. "Guy Benson of Townhall.com points out that in last Tuesday's election, Obama only won by 406,348 votes in 4 states: Florida: 73,858 Ohio: 103,481 Virginia: 115,910 Colorado: 113,099 Those four states, with a collective margin of 406,348 votes for Obama, add up to 69 electoral votes. Had Romney won 407,000 or so additional votes in the right proportion in those states, he would have 275 electoral votes. All four states showed Romney ahead in the days leading up to the election. But on November 6, Romney lost all four states by a substantial margin, all of which have precincts that inexplicably went 99% for Obama, had voter registrations that exceeded their population, and had experienced  problems with voting machines. This election was stolen by the Democrats via vote fraud. Despite all the evidence of fraud, the Republican Party has been strangely silent about it. Now you know why." Aftermath: It doesn't matter if this "perfect candidate" has dubious Constitutional eligibility to be president. They would see to it that his original birth certificate (if there is one) would never see the light of day. The same with his other documents - his passports, school and college records, draft registration, and medical records (so we'll never know why Obama has that v
1More

How to Avoid Blame and Maintain the GOP Brand as the Low-Tax Party | Western Free Press - 0 views

  •  
    Lots of comments posted on this page.  Search for "Econ101" and "garylyn" to find my comments.  I have posted here a surprisingly extensive explanation of how i became a libertarian. excerpt: "How's this for a simple GOP strategy to avoid blame for fiscal-cliff tax-rate increases and seize the public relations initiative from an overconfident president? Pass two simple bills in the House.  Bill A extends current tax rates for those with incomes of $250,000 or less.  Bill B extends current tax rates for all the rest.  Keep both bills just that simple - include nothing else in either one.  Both will pass in the House thanks to the Republican majority. As the bills are moving to the Senate, Speaker Boehner holds a press conference and begins with a short address to the American public to promote both bills. First, Boehner points out that Bill A should pass the Senate promptly and be signed by the president.  Reid and Obama have promised as much. Second, the Speaker points out that Bill B will be likely be blocked in the Senate and/or on the president's desk.  Reid and Obama have (virtually) promised to do that too. "
1More

GOP Platform Rejects UN Agenda 21 as Threat to Sovereignty - 0 views

  •  
    Too bad Romney didn't think enough of the GOP Platform to sell it to the American people.  Probably cost him the election, and us our country. "The official GOP platform approved at the Republican National Convention in Tampa included tough language rejecting the United Nations "sustainability" scheme known as Agenda 21 for the threat it represents to national sovereignty, drawing praise from conservative and Tea Party leaders across the country. The Republican Party document also rejected any form of UN global taxes and slammed a wide range of the international body's controversial programs.  In a section of the 54-page platform entitled "Sovereign American Leadership in International Organizations," the GOP noted that multilateral bodies such as the UN and NATO sometimes fail to serve the cause of peace and prosperity. As such, the U.S. government must always reserve the right to go its own way. "There can be no substitute for principled American leadership," the platform says. The UN in particular remains in "dire need of reform," Republicans said in the document, attacking the global organization's "overpaid bureaucrats," its "scandal-ridden management," and the fact that some of the world's most barbaric tyrants hold seats on the so-called "Human Rights Council." Unless and until the situation improves, the platform stated, the UN can never expect the full support of the American people. Some Republicans such as Congressman Ron Paul go further, calling for the United States to get out of the UN entirely. Some matters, however, are non-negotiable. "We strongly reject the U.N. Agenda 21 as erosive of American sovereignty, and we oppose any form of U.N. Global Tax," the platform explains. The language echoes a resolution adopted by the GOP earlier this year slamming the planetary scheme to enforce so-called "sustainable development" on the world. Since then, state and local Republican parties as well as state legisl
1More

We Call a Top NSA Whistleblower … And Get the REAL SCOOP on Spying | Washingt... - 0 views

  •  
    "NSA whistleblower Thomas Drake corroborated Klein's assertions, testifying that while the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications." ..................... I then asked the NSA veteran Binney if the government's claim that it is only spying on metadata - and not content - was correct. We have extensively documented that the government is likely recording content as well. (And the government has previously admitted to "accidentally" collecting more information on Americans than was legal, and then gagged the judges so they couldn't disclose the nature or extent of the violations.) Binney said that was not true; the government is gathering everything, including content. Binney explained - as he has many times before - that the government is storing everything, and creating a searchable database … to be used whenever it wants, for any purpose it wants (even just going after someone it doesn't like). ..................... Binney said that former FBI counter-terrorism agent Tim Clemente is correct when he says that no digital data is safe (Clemente says that all digital communications are being recorded). Both Verint and Narus were founded in Israel in the 1990s. *** Binney next confirmed the statement of the author of the Patriot Act - Congressman Jim Sensenbrenner - that the NSA spying programs violate the Patriot Act. After all, the Patriot Act is focused on spying on external threats … not on Americans. Binney asked rhetorically: "How can an American court [FISA or otherwise] tell telecoms to cough up all domestic data?!" Update: Binney sent the following clarifying email about content collection: It's clear to me that they are collecting most e-mail in full plus other text type data on the web. As for phone calls, I don't think they would record/transcribe the approximately 3 billion US-to-US calls every day. It's more likely that they are reco
1More

Do You Want To Be RFID Chipped? Another Hidden Secret in Obama-Care | Pakalert Press - 0 views

  •  
    "Modern technology is growing by leaps and bounds. The corporate-controlled media extolls its virtues, but does not cover the known harm of its dark side. Most of this technology goes unchecked for human safety. The following is a short synopsis of the hazards of several invisible technologies that are already an unreported and grave danger to all of us." Article covers these emerging technology threats: ... Nano-Technology This technology is also in the highly toxic Chemtrails aerosols, as nano-coated fiber Aluminum, that, for the past 15 years, are poisoning us daily.  The coating includes nano particalized BARIUM and Fluoride.  The Air Force has admitted to using them. Documents have been published on the Internet, over many years, listing various patents for these covert and criminal programs. And most recently, a former Air Force Industrial Hygienist has confirmed this stealth geo-engineering program from first-hand knowledge. ... RFID Chips RFID [Radio Frequency Identification] chips. They are made of a two-way radio antenna, and some encasement or support, such as small glass vial implanted under the skin. The origins of this technology go back to 1948 when the idea was first conceived. They are now found in ATM and credit cards, and some "enhanced" driver's licenses, highway toll systems, and inventory tracking systems. The latest direction in chipping the human population comes from the hidden part of the Obama "health care" reform. Who reads more than 1,000 pages of mostly incomprehensible "doublethink" drivel? The Senate Healthcare bill HR3200 was passed in 2010, and requires the implant of an RFID chip in every American. This chip will be inserted into our skin and linked to all our banking, medical, and other personal documents. Here is a short quote: "The Secretary shall establish a national medical device registry (in this subsection referred to as the 'registry') to facilitate analysis of postmarket safety and outcomes d
1More

The Ultimate Net Monitoring Tool: NARUS - 0 views

  •  
    Chilling stuff.  Note that Mark Klien is an important whistleblower whose testimony has helped expose the  Federal Government - NSA domestic dragnet that has violated the constitutional rights of hundreds of thousands of law abiding American citizens.  The question I have concerns cooperation between NSA NARUS spying and the IRS. We know that the IRS used key words such as "TEA PARTY", "PATRIOT", "Constitution", and "Tenth Amendment" to target American citizens.  Does the NSA NARUS target Americans in the same way?  Are there political enemy lists with background surveillance information now circulating through different government agencies based on this targeted and illegal spying? The first thing we need to do is protect whistle blowers who are risking it all to protect the constitutional rights of American citizens and save our country.   "The equipment that technician Mark Klein learned was installed in the National Security Agency's "secret room" inside AT&T's San Francisco switching office isn't some sinister Big Brother box designed solely to help governments eavesdrop on citizens' internet communications. Rather, it's a powerful commercial network-analysis product with all sorts of valuable uses for network operators. It just happens to be capable of doing things that make it one of the best internet spy tools around. "Anything that comes through (an internet protocol network), we can record," says Steve Bannerman, marketing vice president of Narus, a Mountain View, California, company. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their (voice over internet protocol) calls."" Narus' product, the Semantic Traffic Analyzer, is a software application that runs on standard IBM or Dell servers using the Linux operating system. It's renowned within certain circles for its ability to inspect traffic in real time on high-bandwidth pipes, identifying packets of interest as they r
« First ‹ Previous 81 - 100 of 601 Next › Last »
Showing 20 items per page