Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "counseling" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
7More

Bechtel Corporation: Key Australian Benefits - 0 views

  • company-paid accident insurance at no cost.
  • Under the Choice of Super Legislation, employees are eligible to nominate a super fund of their choice
  • provides at least the Superannuation Guarantee Charge, which is determined in accordance with federal government legislation
  • ...4 more annotations...
  • The plan also includes insurances for death coverage and income protection coverage
  • Confidential counseling services are offered at no cost to help
  • Additional benefits include
  • cholarship availability for children of full-time employees
23More

Bechtel Corporation: Key UK Benefits - 0 views

  • employees can opt to include spouse/family members under the company scheme at a cost
  • Business travel accident insurance Company paid accident insurance
  • employee contributions, plus company contributions, into an employees
  • ...20 more annotations...
  • pension account.
  • offering financial protection for the employee and the employee and their families, both during the employee’s career
  • and after retirement.
  • employees can change which funds the pension account is invested in. 
  • Long Term Disability insurance
  • at no cost. 
  • Employees will receive 50 percent of base salary from the scheme after six months absence from work. 
  • benefits including Bechtel University online training, mentoring and leadership programmes
  • professional membership reimbursement.
  • The Well programme is offered to all employees at no cos
  • nutrition advise and guidance
  • breast cancer awareness workshops
  • provides a health manager who is on site every Thursday and Friday
  • advises employees on health issues such as high blood pressure, BMI, high cholesterol, diabetes, weight management, and work life balance;
  • all employees receive at the beginning of employment with Bechtel.
  • Confidential telephone and face-to-face counselling services are offered to all employees at no cost
  • Bechtel recognises that everyone needs some assistance in dealing with the changes and challenges in their lives.
  • a season ticket loan scheme for London office permanent staff
  • Loans will be based on the actual cost of second class rail season tickets and/or London Zone Travel Cards between the employee’s home and London office by the most direct route that does not impose undue travel restrictions on the employee.
  • mployees to sacrifice a maximum of £220 per month; in return, the employee receives childcare vouchers and savings in tax and National Insurance contributions.
4More

Fanniegate: Gamechanger For The GOP? | Via Meadia - 0 views

  • The story doesn’t just attack a failure of Democratic policy execution; it exposes a key flaw in New Democratic thinking.  The Third Way as dreamed up by Bill Clinton and Tony Blair sought to harness the power of financial markets to a public service agenda.  Old style command and control liberalism believed in directly mandating business to do what politicians thought should be done.  AT&T had to serve rural communities, but in exchange it had a phone monopoly and regulators made sure that it made a good profit.  The airlines and bus companies had to service unprofitable routes, but regulators made sure that their route networks as a whole were profitable.
  • a new and updated liberalism appeared.
  • The sad fact remains that the current president, according to longstanding government clearance protocols, could not be hired as a janitor in a federal building with the amount of personal background information that he has provided. Run for President? No problem. Get any other federal job? No way. Quite apart from the issue of any sort of birth certificates, real or imagined, genuine or forged, is the fact that Barack Obama’s school records, SAT and LSAT scores, college and law school admission records and scholarship paperwork and grade transcripts and thesis papers, medical records, passport history, Illinois state senate tenure records, presidential campaign foreign donor lists, complete White House visitor logs and many other relevant records and documents have all never been released or allowed to be subjected to any sort of scrutiny, despite several years of repeated requests for disclosure by numerous individuals and non-traditional media organizations. Virtually the entire paper trail of Barack Obama’s existence has always been deeply hidden away in a tight shroud of secrecy. The Obama 2008 campaign and subsequent administration have to date spent a substantial sum on legal fees, estimated in the millions of dollars, to fight Freedom of Information Act filings and other motions and requests to examine some of this material. The powerful international law firm Perkins Coie, the counsel of record to the Democractic National Committee, has been their primary provider of these services and continues in that role.
  •  
    excerpt:  Democrats, watch out. The Republican Party and especially its Tea Party wing have just acquired a new weapon of mass destruction - and it has nothing to do with any of Congressman Wiener's rogue body parts.  If they deploy this weapon effectively in the next election cycle - a big if - then they have the biggest opportunity to move the country rightward since Ronald Reagan took the oath of office back in 1981. The Tea Party WMD stockpile is currently stored in book form:  Reckless Endangerment: How Outsized Ambition, Greed, and Corruption Led to Economic Armageddon. By Gretchen Morgenson, one of America's best business journalists who is currently at The New York Times, and noted financial analyst Joshua Rosner, Reckless Endangerment gives the best available account of how the growing chaos in the mortgage and personal finance markets and the rampant bundling of dubious loans into exotically toxic securities plunged the world, and millions of American families, into the gravest financial crisis since World War Two. It is gripping reading as well, and its explanations are clear enough that readers without any background in finance will have no trouble following the plot.  The villains?  An unholy alliance between Wall Street, the Democratic establishment, community organizing groups like ACORN and La Raza, and politicians like Barney Frank, Nancy Pelosi and Henry Cisneros.  (Frank got a cushy job for a lover, Pelosi got a job and layoff protection for a son, Cisneros apparently got a license to mint money bilking Mexican-Americans of their life savings in cheesy housing developments.)
5More

Schneiderman Is Said to Face Pressure to Back Bank Deal - NYTimes.com - 0 views

  • Terms of the possible settlement under consideration center on foreclosure improprieties like so-called robo-signing and submitting apparently forged documents to the courts to speed up the process of removing troubled borrowers from homes.
  • An initial term sheet outlining a possible settlement emerged in March, with institutions including Bank of America, Citigroup, JPMorgan Chase and Wells Fargo being asked to pay about $20 billion that would go toward loan modifications and possibly counseling for homeowners
  • In exchange, the attorneys general participating in the deal would have agreed to sign broad releases preventing them from bringing further litigation on matters relating to the improper bank practice
  • ...1 more annotation...
    • Gary Edwards
       
      You've got to be kidding me!  $20 Billion and these crooks get to illegally foreclose on mortgages they can't document or prove they own?  They've stolen trillions of dollars, sunk the worlds economy, and maybe ended the greatest experiment in self government / individual liberty in mankind's 4,000 year history.  And the tab is only $20 Billion?  The Banksters steal that much in while putting on their pants in the morning.
  •  
    By GRETCHEN MORGENSON Published: August 21, 2011 Eric T. Schneiderman, the attorney general of New York, has come under increasing pressure from the Obama administration to drop his opposition to a wide-ranging state settlement with banks over dubious foreclosure practices, according to people briefed on discussions about the deal. Eric T. Schneiderman has objected to elements of the settlement for months.  In recent weeks, Shaun Donovan, the secretary of Housing and Urban Development, and high-level Justice Department officials have been waging an intensifying campaign to try to persuade the attorney general to support the settlement, said the people briefed on the talks. Mr. Schneiderman and top prosecutors in some other states have objected to the proposed settlement with major banks, saying it would restrict their ability to investigate and prosecute wrongdoing in a variety of areas, including the bundling of loans in mortgage securities. But Mr. Donovan and others in the administration have been contacting not only Mr. Schneiderman but his allies, including consumer groups and advocates for borrowers, seeking help to secure the attorney general's participation in the deal, these people said. One recipient described the calls from Mr. Donovan, but asked not to be identified for fear of retaliation.
6More

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
11More

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
31More

The Purchase Of Our Republic | Zero Hedge - 0 views

  • The massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government. Today I am publishing a comprehensive and important guest essay, The Purchase of Our Republic, by longtime correspondent Y. Falkson.
  • Americans know that something is wrong, deeply wrong. They see signs of the problem everywhere: income inequality, growing concentration and power of mega corporations, political donations/corruption, the absence of jobs with decent salaries, the explosion of the US prison population, healthcare costs, student loan debt, homelessness, etc. etc.  However, the true causes and benefactors behind these problems are purposely hidden from view. What Americans see is Kabuki Theater of a functioning form of capitalism and democracy, but beyond this veneer our country has devolved into the exact opposite. Those who benefit from this crony capitalist state go to extreme lengths to paper over the reality and convince Americans that the system works, the American Dream is still a reality and that American democracy is in fact democratic. Below I hope to begin to outline some of the underlying dynamics and trends that have evolved in recent decades and led us so far from what we once were. As fun as it would be, the answer is not some evil conspiracy by the Illuminati, but rather the unfortunate result of three long term and mutually reinforcing components that have been attacking the fundamental roots of the structure of our Republic. The first is the increased concentr
  • ation of corporate and private wealth. Both of which are quickly yelled down in the media as anti-free market and class war hysteria. The second is the use of this wealth to capture all three branches of government in order to ensure the continued extraction of capital from the many and to the few.The rich might have climbed the ladder because they earned it, but they have then purchased government to pull up the ladder behind them. The consequence of the first two components is a democracy in name only that represents the very few.
  • ...28 more annotations...
  • 1. Faux Capitalism = Wealth Consolidation / Income Inequality
  • While there is no true beginning to the story, we can start with the incredible build up and concentration of wealth among corporations in recent decades. The USA now boasts a cartel-like set of corporate titans in almost every industry. It goes beyond, but certainly includes, our Too Biggerer To Fail banks, merged from what was 37 banks in 1995 into a Frankenstein’s monster like 5 (Citigroup, JP Morgan-Chase, Bank of America, Wells Fargo and Goldman Sachs). In agriculture, Monsanto alone controls over 85% of all corn and soy bean crops, four companies control 83% of the beef market, 66% of the hog market and 58% of the chicken market. So while shopping at the grocery store might appear to be the manifestation of capitalism at its finest, it doesn’t take much digging to look behind the curtain to see how little competition truly exists.
  • When the average American goes to pick up some groceries, they are shopping at Walmart and buying something from P&G that is mostly made of Monsanto corn. Is that true choice? The same story plays out with our news and media (and other industries) where we have gone from 50 companies in 1983 to the big 6 which control over 90% of all media. Is choosing to watch one of 30 news channels, all of which are owned by News Corp (Rupert Murdoch) a real choice? This is not capitalism and they are not competing, not in the true sense of the word. Along with this consolidation of corporations in recent decades, their senior leaders have taken up a larger and larger piece of the pie at the expense of their employees. In particular, the ratio of CEO-to-worker pay has increased 1,000 percent since 1950. Unsurprisingly, Walmart is both the largest employer in the country and the worst CEO pay offender with a ratio of over 1000:1. This is at a time where worker productivity has increased significantly, something that historically correlated with increased pay. But no more. It’s a new twist on the old Soviet saying “we pretend to work and they pretend to pay us”, but now it’s closer to “we do all of the work and they pretend to pay us”.
  • Private Wealth: As a consequence of the royal tribute we pay to the C-suite class these days, we have likely surpassed the pre-Depression Roaring Twenties in terms of inequality.
  • This, amazingly, has only accelerated since the crisis in 2008 in thanks to bailouts, Quantitative Easing and other gifts from Congress and the Fed. The wealthy 1% and in particular the .01% have now grown their fortunes to levels that tax comprehension and even their ability to spend it (the decisions by a few billionaires such as Bill Gates to essentially donate his fortune is a tacit acknowledgement that our current system over provides wealth to a select few).
  • So what is an incredibly wealthy capitalist CEO of a mega-corporation do once they control their industry and have essentially limitless wealth? Well in a competitive market, the only way to go from the top is down and the only thing that can make that happen is competition. Consequently, competition must be avoided whenever possible.
  • To squash or prevent competition, the oligopolies and oligarchs target their resources on the one place that can make competition illegal, our government.Something to keep in mind the next time you see a corporate billionaire grandstanding about the importance of “Free Markets” when their strategy is quite the opposite. As this capture of the government has taken place we have essentially shifted from capitalism and to crony capitalism. So we now have industries that have mastered the art of faking capitalism by turning our government into one that fakes democracy. This government takeover took time, but the purchase of all 3 branches of government has almost been completed by 2014. You don’t have to take my word for it, luckily that has now been empirically proven in an analysis of over 20 years of government policy where the clear conclusion was that policy makers respond solely to those in the top 90th percentile and essentially ignore the large majority of Americans.
  • 2. Wealthy Purchase of Government Institutions / Elections
  • Purchase of the Executive Branch:
  • Let’s take a step back and take a glimpse at how the government was purchased, beginning with the executive branch. In 1980, Reagan’s election cost less than $300 million. When Bush beat Kerry in 2004, it cost almost 3x times as much, almost $900 Million. 4 years later, the 2008 election cost a record $1.3 Billion. It was in this election where Obama hammered the final nail in the coffin for government funded for elections. Obama, more so than any other candidate in recent decades had the widespread support of millions of small donors, but in the end I guess it wasn’t enough. So when Obama “leaned to the green”, it forever set the precedent that you can’t win without the backing of our nation’s oligarchs. Consequently, the money has only gushed in since as the cost of Obama’s reelection in 2012 skyrocketed to an unfathomable $7 billion. Needless to say this is slightly above the rate of inflation. Our Presidents are now preselected exclusively by a tiny fraction of Americans can have the money to fund what has become necessary for a legitimate run. Summary: Candidates spend years courting the super-rich to build up a multi-billion dollar war chest. Only those who succeed can actually run a campaign that an average American will be aware of. Then Americans get to choose one of the pre-selected “candidates”. No wonder voter turnout is so low… Executive branch, check!
  • – Note that media corporations benefit doubly as they can use their cash to fund elections, but are also the beneficiary of all that money as it is used for campaign spending.
  • Purchase of the Legislative Branch:
  • The process has progressed similarly in Congress. In 1978, outside groups spent $303,000 on congressional races. In 2012 that was up to $457,000,000. That is over 1,500 times the level in 1978. It would be funny, if it was so blatant and terrifying. By many accounts, our “leaders” in Congress spend 50% or more of their time working the phones or fundraisers rather than trying (and failing) to actually do the “people’s business”. Let’s also take a minute to appreciate the hypocrisy of anyone that pretends that the money doesn’t influence our government. Businesses do not give to politicians for charity. This is a payment for services that has proven exceedingly reliable and profitable. The ROI for money invested in purchasing Congressman is what CEO dreams are made of. No wonder the incentive is to invest in Congress rather than R&D or marketing. There are very few places in the world or times in history where you can find ROI’s in the thousands, or even the tens of thousands.
  • Review: Congressmen beg for money to get elected, make sure to vote the way your benefactors would like, consequently get more money to get elected again. If at any point they do lose or quit, they take the big payday to work for those who have been paying them all along. Legislative Branch, Check!
  • In addition, increasingly those who work on Congress (and regulators) were previously employed by these large corporations or expect to work there later. A recent example is Chris Dodd who left the Senate the head lobbyist for Hollywood at the MPAA, the guys behind SOPA and PIPA, but there are many many others.
  • Judicial Branch Endorsement of the Purchase of Government:
  • Last but not least, we have the enabling Judicial Branch. It only took a few purchased presidents to ensure the appointment of a majority of “free market” and “pro-business” judges. For instance, and disgracefully, Clarence Thomas was once legal counsel for Monsanto, but has not once recused himself from any cases involving Monsanto and always votes in their favor. These radicals have now fully endorsed and enabled the influx of money used to purchase the other branches. Specifically, 2 major decisions have completely opened the floodgates, Citizens United and McCutcheon. The first allowed unlimited contributions of corporate money into elections and brought us the notorious declaration that “corporations are people” and that “money is free speech”. This was more recently followed up with the private wealth equivalent in McCutcheon. In this ruling, Supreme Court Chief Justice John Roberts said as part of his majority opinion (presumably with a straight face) “… nor does the possibility that an individual who spends large sums may garner influence over or access to elected officials or political parties”. And with this, the Supreme Court has fully endorsed both major sources of immense wealth to purchase our elections and consequently our government. Review: The rich fund Presidential elections, Presidents nominate “business-friendly” judges and then the bought Congress approves their nominations. New judge then votes to ensure even more money is allowed to purchase elections. Judicial Branch, CHECK!
  • 3. A Faux Republic Dependent Upon the Funders and Not the Voters
  • The Founder’s Hope and the Sad Reality:
  • Acknowledging where we are as a country, it is often helpful to look to where we started for some perspective. Unsurprisingly, this type of problem was not overlooked back in the 18th century. In 1776, James Madison stated that his goal was to design a republic in which “powerful interest groups would be rendered incapable of subdoing the general will”. Madison hoped, perhaps naively, that factions would be thwarted by competing with other factions. Sadly, we are now in a time where factions (aka wealthy special interests) subdue the will of the people and ensure the government responds to them alone on those issues where they have a “special interest” and consequently asymmetric stakes in the game (Charles Hugh Smith). As a result, these groups essentially collude to allocate their resources to their own issues, but do not “thwart” or compete with other factions as they do the same. It’s a pretty great system, as long as you’re one of the wealthy few who can use their money to drown out the poor and voiceless many. And just like that, what was once a Republic has become a corrupt shell of its past self. All the signs are still there; votes, elections, campaigns, branches of government, etc., but behind the scenes the only ones represented are those who can afford to be heard.
  • Summary: This massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government, or as Dick Durban once stated, “frankly they [the banks in this case] own the place”. If money = free speech, then those with all the money, have all the free speech.
  • What Might Help? Now that I have likely and thoroughly depressed the reader, let’s bounce around some ideas for what can be done. As stated in the beginning, this is not an unknown problem and many people are promoting a number of ways to fix or at least ameliorate the problem. I will briefly describe just a few which I think provide some direction any of us could easily implement or support.
  • Change the Rules: Laurence Lessig of Harvard Law has put forward a visionary proposal for re-writing the way that campaigns are financed in his book, Republic, Lost: How Money Corrupts Congress--and a Plan to Stop It. Put simply, he would like to empower every voter with a stipend, say $150 per election to give to whatever candidate or candidates they prefer. If you would like to accept this money, you would need to forgo any other contributions or support (one would hope including the indirect PAC kind). This would actually provide even more money than is used in current elections, but would effectively democratize the funding process. While there would still be a “funding election” that takes place before the actual election, the funding would not be unequally provided. Lessig’s work has only begun, as this sort of bill or likely constitutional reform is nearly impossible to achieve, but he has undertaken and I assume will continue to implement many brave and creative ways of bringing about the change all American’s should support. Most recently he has suggested we begin to fund, ironically enough, a Super PAC to end all Super PACs. It would be funded with the solitary goal of changing how money impacts our elections. Please support them here: www.mayone.us/
  • Change Our Day-to-Day: At the more micro level, Charles Hugh Smith believes that we will inevitably see our overly centralized and inefficient system erode away as it is replaced by more resilient, local and efficient businesses and societies outside of the current system. With that in mind, he recommends that “all anyone can do is the basic things--lower our energy footprint, stay healthy and avoid unnecessary medications and procedures, support local businesses, organic food growers, etc. In other words, what we can do is support local businesses that are part of the emerging economy rather than support corporate cartels.” Your Vote Does Matter: Do you live in Ohio, Florida or New Hampshire? Probably not. Despite what we are told every 4 years, there are actually states outside of the “swing states”, and even more surprising, the very large majority of Americans live in those states where your “vote doesn’t matter”. New Yorkers an Californians all know their state will turn Blue no matter who the candidates are and either don’t vote at all, or often vote for the Blue team in order to feel like they are on the winning side.
  • The truth is that if you see the election as Red vs. Blue, you vote probably doesn’t matter. But here is the trick, if all the people who think their vote didn’t matter decided to vote for whom they might actually believe in, then their votes just might matter.
  • What if all the growing number of “Independents” (who usually still vote Blue), chose to vote for a third party? What if a third party candidate won a state like New York or California? What if that candidate was one whose primary promise to the voters was to champion a change to the role of money in government (perhaps in line with what Lessig proposes)? Would you vote for such a person?I would argue you should. If California alone (with 55 electoral votes) were to vote for a 3rd party that would likely prevent either Red or Blue candidate from winning the requisite 270 electoral votes.
  • Think about the message that would send to both parties. I would predict that both sides would start to bend over backwards for an endorsement from that 3rd party and they would have to get it by taking up the same primary cause for reforming money in government. Consequently, at the root of our corrupted system which is perpetually ignored as both sides might suddenly become the big issue of the election. Then maybe we might begin to turn things around.
  • Sources: Charles Hugh Smith (oftwominds, Surivival+, etc.), Yves Smith (Naked Capitalism, Econned), Laurence Lessig (Republic Lost, multiple TED Talks), Matt Taibbi (blog at Rolling Stone and now at The Intercept), Zero Hedge, John Robb, Max Keiser, Clay Shirky (Cognitive Surplus), Aldous Huxley (Brave New World, Brave New World Revisited), George Orwell (1984), Michael Lewis, Daniel Kahneman (Thinking Fast and Slow), James Richards (Currency Wars), Han Joon Chang (23 Things They Don’t Tell You About Capitalism) and Joseph Stiglitz (Mismeasuring Our Lives) 
6More

Vodafone reveals existence of secret wires that allow state surveillance | Business | T... - 0 views

  • Vodafone, one of the world's largest mobile phone groups, has revealed the existence of secret wires that allow government agencies to listen to all conversations on its networks, saying they are widely used in some of the 29 countries in which it operates in Europe and beyond.The company has broken its silence on government surveillance in order to push back against the increasingly widespread use of phone and broadband networks to spy on citizens, and will publish its first Law Enforcement Disclosure Report on Friday. At 40,000 words, it is the most comprehensive survey yet of how governments monitor the conversations and whereabouts of their people.The company said wires had been connected directly to its network and those of other telecoms groups, allowing agencies to listen to or record live conversations and, in certain cases, track the whereabouts of a customer. Privacy campaigners said the revelations were a "nightmare scenario" that confirmed their worst fears on the extent of snooping.
  • Vodafone's group privacy officer, Stephen Deadman, said: "These pipes exist, the direct access model exists."We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used."Vodafone is calling for all direct-access pipes to be disconnected, and for the laws that make them legal to be amended. It says governments should "discourage agencies and authorities from seeking direct access to an operator's communications infrastructure without a lawful mandate".
  • In America, Verizon and AT&T have published data, but only on their domestic operations. Deutsche Telekom in Germany and Telstra in Australia have also broken ground at home. Vodafone is the first to produce a global survey.
  • ...2 more annotations...
  • Peter Micek, policy counsel at the campaign group Access, said: "In a sector that has historically been quiet about how it facilitates government access to user data, Vodafone has for the first time shone a bright light on the challenges of a global telecom giant, giving users a greater understanding of the demands governments make of telcos. Vodafone's report also highlights how few governments issue any transparency reports, with little to no information about the number of wiretaps, cell site tower dumps, and other invasive surveillance practices."
  • Snowden, the National Security Agency whistleblower, joined Google, Reddit, Mozilla and other tech firms and privacy groups on Thursday to call for a strengthening of privacy rights online in a "Reset the net" campaign.Twelve months after revelations about the scale of the US government's surveillance programs were first published in the Guardian and the Washington Post, Snowden said: "One year ago, we learned that the internet is under surveillance, and our activities are being monitored to create permanent records of our private lives – no matter how innocent or ordinary those lives might be. Today, we can begin the work of effectively shutting down the collection of our online communications, even if the US Congress fails to do the same."
  •  
    The Vodafone disclosures will undoubtedly have a very large ripple effect. Note carefully that this is the first major telephone service in the world to break ranks with the others and come out swinging at secret government voyeur agencies. Will others follow. If you follow the links to the Vodafone report, you'll find a very handy big PDF providing an overview of the relevant laws in each of the customer nations. There's a cute Guardian table that shows the aggregate number of warrants for interception of content via Vodafone for each of those nations, broken down by content type. That table has white-on-black cells noting where disclosure of those types of surveillance statistics are prohibited by law. So it is far from a complete picture, but it's a heck of a good start.  But several of those customer nations are members of the E.U., where digital privacy rights are enshrined as human rights under an EU-wide treaty. So expect some heat to roll downhill on those nations from the European treaty organizations, particularly the European Court of Human Rights, staffed with civil libertarian judges, from which there is no appeal.     
6More

American Surveillance Now Threatens American Business - The Atlantic - 0 views

  • What does it look like when a society loses its sense of privacy? <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" title=""><img style="border:none;" src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" alt="" /></a></div>In the almost 18 months since the Snowden files first received coverage, writers and critics have had to guess at the answer. Does a certain trend, consumer complaint, or popular product epitomize some larger shift? Is trust in tech companies eroding—or is a subset just especially vocal about it? Polling would make those answers clear, but polling so far has been… confused. A new study, conducted by the Pew Internet Project last January and released last week, helps make the average American’s view of his or her privacy a little clearer. And their confidence in their own privacy is ... low. The study's findings—and the statistics it reports—stagger. Vast majorities of Americans are uncomfortable with how the government uses their data, how private companies use and distribute their data, and what the government does to regulate those companies. No summary can equal a recounting of the findings. Americans are displeased with government surveillance en masse:   
  • A new study finds that a vast majority of Americans trust neither the government nor tech companies with their personal data.
  • What does it look like when a society loses its sense of privacy? <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" title=""><img style="border:none;" src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" alt="" /></a></div>In the almost 18 months since the Snowden files first received coverage, writers and critics have had to guess at the answer. Does a certain trend, consumer complaint, or popular product epitomize some larger shift? Is trust in tech companies eroding—or is a subset just especially vocal about it? Polling would make those answers clear, but polling so far has been… confused. A new study, conducted by the Pew Internet Project last January and released last week, helps make the average American’s view of his or her privacy a little clearer. And their confidence in their own privacy is ... low. The study's findings—and the statistics it reports—stagger. Vast majorities of Americans are uncomfortable with how the government uses their data, how private companies use and distribute their data, and what the government does to regulate those companies. No summary can equal a recounting of the findings. Americans are displeased with government surveillance en masse:   
  • ...3 more annotations...
  • “It’s clear the global community of Internet users doesn’t like to be caught up in the American surveillance dragnet,” Senator Ron Wyden said last month. At the same event, Google chairman Eric Schmidt agreed with him. “What occurred was a loss of trust between America and other countries,” he said, according to the Los Angeles Times. “It's making it very difficult for American firms to do business.” But never mind the world. Americans don’t trust American social networks. More than half of the poll’s respondents said that social networks were “not at all secure. Only 40 percent of Americans believe email or texting is at least “somewhat” secure. Indeed, Americans trusted most of all communication technologies where some protections has been enshrined into the law (though the report didn’t ask about snail mail). That is: Talking on the telephone, whether on a landline or cell phone, is the only kind of communication that a majority of adults believe to be “very secure” or “somewhat secure.”
  • According to the study, 70 percent of Americans are “at least somewhat concerned” with the government secretly obtaining information they post to social networking sites. Eighty percent of respondents agreed that “Americans should be concerned” with government surveillance of telephones and the web. They are also uncomfortable with how private corporations use their data: Ninety-one percent of Americans believe that “consumers have lost control over how personal information is collected and used by companies,” according to the study. Eighty percent of Americans who use social networks “say they are concerned about third parties like advertisers or businesses accessing the data they share on these sites.” And even though they’re squeamish about the government’s use of data, they want it to regulate tech companies and data brokers more strictly: 64 percent wanted the government to do more to regulate private data collection. Since June 2013, American politicians and corporate leaders have fretted over how much the leaks would cost U.S. businesses abroad.
  • (That may seem a bit incongruous, because making a telephone call is one area where you can be almost sure you are being surveilled: The government has requisitioned mass call records from phone companies since 2001. But Americans appear, when discussing security, to differentiate between the contents of the call and data about it.) Last month, Ramsey Homsany, the general counsel of Dropbox, said that one big thing could take down the California tech scene. “We have built this incredible economic engine in this region of the country,” said Homsany in the Los Angeles Times, “and [mistrust] is the one thing that starts to rot it from the inside out.” According to this poll, the mistrust has already begun corroding—and is already, in fact, well advanced. We’ve always assumed that the great hurt to American business will come globally—that citizens of other nations will stop using tech companies’s services. But the new Pew data shows that Americans suspect American businesses just as much. And while, unlike citizens of other nations, they may not have other places to turn, they may stop putting sensitive or delicate information online.
6More

WASHINGTON: Not just torture: Senator says CIA stalling over bogus intelligence that le... - 0 views

  • CIA Director John Brennan, under fire over the Senate report on the CIA’s use of torture, is facing new heat over his role in what a senior lawmaker calls an apparent coverup involving bogus intelligence used by the George W. Bush administration to help justify the 2003 invasion of Iraq.Carl Levin, D-Mich., who’s ending 36 years in the Senate, plans to press Brennan one last time to fulfill a pledge to support the full declassification of a CIA cable debunking the claim that the leader of the 9/11 hijackers met with an Iraqi intelligence officer in the Czech capital of Prague just months before the attacks.“Director Brennan’s apparent refusal to do what he has committed to do – to ask the Czech government if it objects to release of the cable – now takes on the character of a continuing coverup,” Levin plans to tell the Senate on Thursday, according to a draft of his speech obtained by McClatchy.
  • At a Christian Science Monitor breakfast with reporters on Wednesday, Levin said he’s been told by Czech officials that “they have no objection” to the release of the cable.Levin also pointed out that the former chief of the Czech counterintelligence service, who was in the post at the time of the alleged meeting, published a memoir this year in which he asserted that the CIA pressured him to confirm the encounter and that U.S. officials pressured the Czech government when he couldn’t do so.“Without any regard to us, they used our intelligence information for propaganda press leaks. They wanted to mine certainty from unconfirmed suspicion and use it as an excuse for military action,” wrote Jiri Ruzek. “We were to play the role of useful idiot.”The CIA declined to comment. But a U.S. intelligence official said that Levin had been told that releasing the full cable couldn’t be done without damaging intelligence sources.
  • The March 13, 2003, cable was sent by CIA field officers in response to a request for more information on a single-source intelligence report of a meeting in a Prague park between Atta and al Ani. The cable warned that U.S. government officials shouldn’t cite the unverified report.Even so, Cheney continued to give the report credibility in media interviews, telling CNN in June 2004 that the truth of the report hadn’t been resolved.“Those statements were simply not true,” Levin said in the draft. “The vice president was recklessly disregarding the truth, and he did so in a way calculated to maintain support for the administration’s decision to go to war in Iraq.”During his February 2013 hearing to be confirmed as CIA director, Brennan was urged by Levin to ask the Czech government if it would object to the release of the cable. “Absolutely, Senator, I will,” Brennan replied.
  • ...3 more annotations...
  • The alleged meeting between Mohammad Atta and Ahmad Samir al Ani was repeatedly cited by former Vice President Dick Cheney before and after the invasion to bolster the Bush administration’s assertion that Saddam was in cahoots with al Qaida and could pass Iraqi weapons of mass destruction – which didn’t exist – to the terrorist group.“The notion of such a meeting was a centerpiece of the administration’s campaign to create an impression in the public mind that Saddam was in league with the al Qaida terrorists who attacked us on 9/11,” Levin planned to tell the Senate, according to the speech draft.“Now why am I bringing up a CIA cable from more than a decade ago?” the draft said. “This is about giving the American people a full account of the march to war as new information becomes available. It is about trying to hold leaders who misled the public accountable.”
  • After receiving no response from Brennan, Levin earlier this year blocked the nomination of Caroline Krass to be the CIA general counsel. He agreed to lift his hold on Krass after receiving a March 13 letter from Brennan that summarized the cable, saying that it cast “serious doubt” that the alleged meeting occurred.Brennan added, “Investigative records subsequently placed Atta in the United States just before and after the date on which the single-source report said the meeting was to have occurred,” according to a copy of the letter obtained by McClatchy.Brennan declassified a single line from the cable that said, “There is not one USG (U.S. government counterterrorism) or FBI expert that . . . has said they have evidence or ‘know’ that (Atta) was indeed (in Prague). In fact, the analysis has been quite the opposite.”
  • In the draft of his remarks, Levin asserted that there was other “critically relevant information” in the cable that had been “denied to the public in order to protect those in the Bush White House who are responsible” for “playing games with intelligence.”“I believe decision-makers should have to face the full, unadulterated, unredacted truth about their decisions,” said Levin. “The American people should know the full story . . . as a warning to future leaders against the misuse of intelligence and the abuse of power.”
4More

The Torture Report and the "Glomar Fig Leaf" | Just Security - 0 views

  • Buried in the SSCI’s report is an arresting passage that suggests that the CIA was quietly releasing information about the torture program to journalists while it was contending in court that release of such information to the public would compromise national security. After the April 15, 2005 National Security Principals Committee meeting, the CIA drafted an extensive document describing the CIA’s Detention and Interrogation Program for an anticipated media campaign.  CIA attorneys, discussing aspects of the campaign involving off-the-record disclosures, cautioned against attributing the information to the CIA itself.  One senior attorney stated that the proposed press briefing was “minimally acceptable, but only if not attributed to a CIA official.”  The CIA attorney continued: “This should be attributed to an ‘official knowledgeable’ about the program (or some similar obfuscation), but should not be attributed to a CIA or intelligence official.”
  • Referring to CIA efforts to deny Freedom of Information Act (FOIA) requests for previously acknowledged information, the attorney noted that, “[o]ur Glomar fig leaf is getting pretty thin.”  Another CIA attorney noted that the draft “makes the [legal] declaration I just wrote about the secrecy of the interrogation program a work of fiction.” The reference to the “Glomar fig leaf” related to an argument the CIA was making in ACLU litigation that was pending before Judge Alvin K.  Hellerstein in the Southern District of New York.  In connection with Freedom of Information Act requests we’d filed in October 2003 and June 2004, we were seeking, among other things, three documents we’d learned of from media reports: the Memorandum of Notification (MON) in which President Bush had authorized the CIA to establish black sites overseas, and two memos in which lawyers from the Office of Legal Counsel had concluded that CIA interrogators could lawfully torture prisoners in their custody.  The CIA responded with a “Glomar” response—it argued that the existence or non-existence of the three documents was a properly classified fact. 
  • As the SSCI report makes clear, CIA lawyers didn’t really believe what the agency was saying in its sworn declarations.  They understood that the sworn declarations the agency was filing in federal court were “work[s] of fiction.”  The agency was telling the courts that nothing could be disclosed about its torture program without compromising national security, but at the same time, it was providing quotations and “facts” to the media in order to persuade the public that its activities were lawful, necessary and effective. If all of this sounds familiar, it’s because the CIA is now doing precisely the same thing with respect to the targeted-killing program. To the courts, the CIA says that any disclosure about the program will gravely compromise national security.  To the media, it supplies a continuous stream of cherry-picked facts meant to cast the program in the most favorable light.
  • ...1 more annotation...
  • The SSCI report makes clear that some CIA lawyers were uncomfortable with the chasm between the agency’s representations to the court in the torture FOIA litigation and the agency’s actual conduct.  According to the SSCI, some CIA lawyers “urged that CIA leadership … ‘confront the inconsistency’ between CIA court declarations ‘about how critical it is to keep this information secret’ and the CIA ‘planning to reveal darn near the entire” program.’” Presumably those lawyers were worried about the possibility that a court would sanction the agency’s declarants; perhaps they were also worried about compliance with their own professional obligations. One wonders whether the CIA’s lawyers are worried about the same things today.
4More

ACLU accuses NSA of using holiday lull to 'minimise impact' of documents | US news | Th... - 0 views

  • The National Security Agency used the holiday lull to “minimise the impact” of a tranche of documents by releasing them on Christmas Eve, the American Civil Liberties Union (ACLU) said on Friday. The documents, which were released in response to a legal challenge by the ACLU under the Freedom of Information Act, are heavily – in some places totally –redacted versions of reports by the NSA to the President’s Intelligence Oversight Board dating back to 2007. A court ordered the documents released this past summer, and a 22 December deadline for that release was agreed upon, according to Patrick Toomey, a staff attorney at the ACLU’s national security project, because the NSA said it needed “six or seven months” to complete its review and redaction process. A spokesperson for the NSA said that the 22 December deadline, “which was agreed to by all parties,” was met.
  • But according to Toomey, the ACLU didn’t receive the documents until “late in the day on the 23rd” – the NSA sent them by FedEx late on the 22nd – and the NSA didn’t publicly release them until Christmas Eve. “I certainly think the NSA would prefer to have the documents released right ahead of the holidays in order to have less public attention on what they contain,” Toomey said. The redactions on the document are extreme, and their omissions tantalising. One entry, from the 4th quarter of 2008, reads: “On [redacted] [redacted] used the US SIGINT System (USSS) to locate [redacted] believed to be kidnapped [redacted] The selectors were tasked before authorization was obtained from NSA. After the NSA Office of General Counsel (OGC) denied the authorization request, [redacted] was found. He had not been kidnapped.” Another reads: “On [redacted] during an experimental collection and processing effort, NSA analysts collected [several lines of text redacted.] The messages were deleted [redacted] when the error was identified.”
  • Many entries are erased entirely, which means the documents reveal very little about how individuals who misuse the data were disciplined by the NSA, or how quickly errors were resolved. But, according to Toomey, they speak to a total picture of a “large number of different compliance violations. We don’t know how many.” He said the documents deepen the picture of the nature and extent of compliance violations by analysts working for the NSA.
  • ...1 more annotation...
  • “There are certain portions of the documents that really vindicate some of the things [Edward] Snowden said when he first described the NSA surveillance in terms of the ability of analysts to conduct queries – without authorisation – of raw internet traffic,” Toomey said. Among the items redacted are sections detailing the total number of violations reported, with many ending up like this entry from 2013 “On [redacted] occasions during the fourth quarter, selectors were incorrectly tasked because of typographical errors.” This makes the scale of the problem difficult to gauge. Toomey said the ACLU would continue to sue for the release of those numbers. “More generally,” Toomey said, “just the range of different compliance violations makes it clear that at every step of the NSA’s collection of information there are vulnerabilities that leave the privacy of Americans at risk.”
3More

Prosecute Torturers and Their Bosses - NYTimes.com - 0 views

  • The American Civil Liberties Union and Human Rights Watch are to give Attorney General Eric Holder Jr. a letter Monday calling for appointment of a special prosecutor to investigate what appears increasingly to be “a vast criminal conspiracy, under color of law, to commit torture and other serious crimes.”
  • The question everyone will want answered, of course, is: Who should be held accountable? That will depend on what an investigation finds, and as hard as it is to imagine Mr. Obama having the political courage to order a new investigation, it is harder to imagine a criminal probe of the actions of a former president. Continue reading the main story Write A Comment But any credible investigation should include former Vice President Dick Cheney; Mr. Cheney’s chief of staff, David Addington; the former C.I.A. director George Tenet; and John Yoo and Jay Bybee, the Office of Legal Counsel lawyers who drafted what became known as the torture memos. There are many more names that could be considered, including Jose Rodriguez Jr., the C.I.A. official who ordered the destruction of the videotapes; the psychologists who devised the torture regimen; and the C.I.A. employees who carried out that regimen.
  •  
    New York Times calls editorially for criminal prosecutions of all involved in the CIA's torture program.
5More

Cost of Medical Bills for Baby Hit by SWAT Grenade? Over $800,000. County's Refusal to ... - 0 views

  • Remember back in May when a gang of uniformed thugs from the  Habersham County SWAT team threw a flash-bang grenade right on top of a sleeping baby? Well, stellar group that they are, they’ve refused to pay the over $800,000 in medical bills for the child that they permanently disfigured and nearly killed. That’s right. They aren’t paying the bills and are leaving the family to try and cover the costs for the toddler’s care. Our militarized police forces are claiming too many innocent victims, and they aren’t being held accountable.
  • The family’s attorneys, from the Davis Bozeman Law Firm in Decatur, Georgia, released a statement this morning: The family of Bounkham “Baby Bou Bou” Phonesavanh, the child severely injured on May 28, 2014 by a flash bang grenade thrown in his play pen during a botched police raid while his family was staying in Georgia, received a copy of the notice sent to their son’s doctor’s office that Habersham County reneges on their public promise to pay for the medical expenses of this working class family’s child. “Bounkham “Baby Bou Bou” Phonesavanh has to date incurred an estimated $800,000 worth of expenses due to his injuries. Shortly after severely burning “Baby Bou Bou” with a flash bang grenade the Habersham County Sheriff’s Department vowed to pay for the child’s medical expenses.  Last week the family discovered through medical providers that the county will not pay any medical bills.  The county stated that it would be “illegal” to pay. Recently, Alecia Phonesavanh shared her son’s injuries are so severe that doctors predict several more surgeries throughout his life to repair the hole in his chest and major facial injuries.
  • he Habersham County Attorney responded on behalf of the county Board of Commissioners with this vague explanation. “The question before the board was whether it is legally permitted to pay these expenses. After consideration of this question following advice of counsel, the board of commissioners has concluded that it would be in violation of the law for it to do so.”
  • ...2 more annotations...
  • It’s important to remember a few things regarding this case. 1.) There is no question or denial that the SWAT team threw a grenade right on top of a sleeping baby. 2.) No drugs were found on the premises. 3.) The person they were looking for was not present at the time of the no-knock raid. It’s bad enough that it happened.  But to cripple the family financially with nearly a million dollars in medical expenses on top of that? This isn’t even about the shoddy police work, the bad intel, or the poor decision to throw a grenade (that was designed to be rolled) into a room full of children. Nor is it about the slimy sheriff of Habersham County, who, if you recall, defended the actions of his SWAT team.
  • This is about a complete lack of accountability. A refusal to take responsibility for a horrible mistake that crosses into criminal negligence, at the very least. What an absolutely repulsive group of individuals. They blew a hole through the face and chest cavity of a 19 month old child, permanently disfigured him,  put him through an unfathomable amount of agony with treatments and repeated surgeries, and now, the family, which was already struggling financially after losing their home in a fire, is stuck with the bill, which will continue to climb, since Bou Bou is looking at several more operations.
8More

U.S. Says It Spied on 89,000 Targets Last Year, But the Number Is Deceptive | Threat Le... - 0 views

  • About 89,000 foreigners or organizations were targeted for spying under a U.S. surveillance order last year, according to a new transparency report. The report was released for the first time Friday by the Office of the Director of Intelligence, upon order of the president, in the wake of surveillance leaks by NSA whistleblower Edward Snowden. But the report, which covers only surveillance orders issued in 2013, doesn’t tell the whole story about how many individuals the spying targeted or how many Americans were caught in the surveillance that targeted foreigners. Civil liberties groups say the real number is likely “orders of magnitude” larger than this. “Even if it was an honest definition of ‘target’—that is, an individual instead of a group—that also is not encompassing those who are ancillary to a target and are caught up in the dragnet,” says Kurt Opsahl, deputy general counsel of the Electronic Frontier Foundation.
  • In its report, the government indicated that the 423 selectors involved just 248 “known or presumed” Americans whose information was collected by the agency in the database. But Opsahl says that both of these numbers are deceptive given what we know about the database and how it’s been used. “We know it’s affecting millions of people,” he points out. But “then we have estimated numbers of affected people [that are just] in the three digits. That requires some effort [on the government's part] to find a way to do the definition of the number [in such a way] to make it as small as possible.”
  • “If you’re actually trying to get a sense of the number of human beings affected or the number of Americans affected, the number of people affected is vastly, vastly larger,” says Julian Sanchez, senior fellow at the Cato Institute. “And how many of those are Americans is impossible to say. But [although] you may not think you are routinely communicating with foreign persons, [this] is not any kind of assurance that your communications are not part of the traffic subject to interception.” Sanchez points out that each individual targeted is likely communicating with dozens or hundred of others, whose communications will be picked up in the surveillance. “And probably a lot of these targets are not individuals but entire web sites or companies. While [a company like the Chinese firm] Huawei might be a target, thousands of emails used by thousands of employees will be swept up.” How many of those employees might be American or communicating with Americans is unknown.
  • ...5 more annotations...
  • Also revealed in today’s report is the number of times the government has queried the controversial phone records database it created by collecting the phone records of every subscriber from U.S. providers. According to the report, the government used 423 “selectors” to search its massive phone records database, which includes records going back to at least 2006 when the program began. A search involves querying a specific phone number or device ID that appears in the database. The government has long maintained that its collection of phone records isn’t a violation of its authority, since it only views the records of specific individuals targeted in an investigation. But such searches, even if targeted at phone numbers used by foreigners, would include calls made to and from Americans as well as calls exchanged with people two or three hops out from the targeted number.
  • The report, remarkably, shows that the government obtained just one order last year under Section 702 of FISA—which allows for bulk collection of data on foreigners—and that this one order covered 89,138 targets. But, as the report notes, “target” can refer to “an individual person, a group, an organization composed of multiple individuals or a foreign power that possesses or is likely to communicate foreign intelligence information.” Furthermore, Section 702 orders are actually certificates issued by the FISA Court that can cover surveillance of an entire facility. And since, as the government points out in its report, the government cannot know how many people use a facility, the figure only “reflects an estimate of the number of known users of particular facilities (sometimes referred to as selectors) subject to intelligence collection under those Certifications,” the report notes.
  • One additional figure today’s report covers is the number of National Security Letters the government issued last year to businesses to obtain data on accountholders and users—19,212. NSLs are written demands from the FBI that compel internet service providers, credit companies, financial institutions and others to hand over confidential records about their customers, such as subscriber information, phone numbers and e-mail addresses, websites visited, and more. These letters are a powerful tool because they do not require court approval, and they come with a built-in gag order, preventing recipients from disclosing to anyone that they have received an NSL. An FBI agent looking into a possible anti-terrorism case can self-issue an NSL to a credit bureau, ISP, or phone company with only the sign-off of the Special Agent in Charge of their office. The FBI has merely to assert that the information is “relevant” to an investigation into international terrorism or clandestine intelligence activities.
  • The FBI has issued hundreds of thousands of NSLs over the years and has been reprimanded for abusing them. Last year a federal judge ruled that the use of NSLs is unconstitutional, due to the gag order that accompanies them, and ordered the government to stop using them. Her ruling, however, was stayed pending the government’s appeal.
  • According to the government’s report today, the 19,000 NSLs issued last year involved more than 38,000 requests for information.
4More

"Washington's Determination to Drive the World to War": Will Putin Realize That Russia ... - 0 views

  • By Russia’s low key and unthreatening response to Washington’s aggression, thereby giving the West the mistaken signal that Russia is weak and fearful, the Russian government has encouraged Washington’s drive to war.
  • The amazing thing about Russia finding herself on the defensive about sanctions is that Russia, not Washington or the impotent EU, holds all the cards.  Putin can bring down the economies of Europe and throw all of Europe into political and economic chaos simply by turning off the energy supply. Putin would not have to turn off the energy supply for very long before Europe tells Washington good-bye and comes to terms with Russia. The longer Putin waits, the longer Europe has to prepare against Russia’s best weapon that can be used to peacefully resolve the conflict that Washington has orchestrated. Washington’s aggressive moves against Russia will not stop until Putin realizes that he, not Washington, holds the cards, and plays them. The world has had enough of Washington, its constant lies, its constant wars, and its bullying.  Putin would do well to spend a few hours with Belisarius, Justinian the Great’s great general.
  • “When I treat with my enemies,” Belisarius said, “I am more accustomed to give than to receive counsel; but I hold in one hand inevitable ruin, in the other peace and freedom.” That is precisely the position that Vladimir Putin is in with regard to Europe.  In one hand he holds the ruin of Europe.  In the other peace and freedom in the relations between Russia and Europe. He needs to call up the dumbshit European “leaders” and tell them. If Putin does not put his foot down hard and make clear to the Europeans what the stakes are, Washington will succeed in its determination to drive the world to war, and “exceptional and indispensable” Americans will die along with all the rest.
  •  
    Paul Craig Roberts thinks he has spotted Europe's jugular vein in the sanctions war over Ukraine. I'll need some time to think about this. Roberts is correct on the location of the jugular vein. But how might the Empire of Chaos with its capitol in Washington, D.C. respond? We've got rabid neocons in control of the Dark State.
6More

Billionaires Make War on Iran - The Unz Review - 0 views

  • All the pro-Israel anti-Iran groups engage in pressure tactics on Capitol Hill and have been effective in dominating the political debate. Of thirty-six outside witnesses brought in to testify at seven Senate hearings on Iran since 2012 only one might be characterized as sensitive to Iranian concerns. The enormous lobbying effort enables the anti-Iran groups to define the actual policies, move their drafts of legislation through congress, and eventually see their bills pass with overwhelming majorities in both the House and Senate. It is democracy in action if one accepts that popular rule ought to be guided by money and pressure groups rather than by national interests. Less well known is United Against Nuclear Iran, which has a budget just shy of $2 million. UANI is involved in the New York lawsuit. The group, which has somehow obtained a 501[c]3 “educational” tax status that inter alia allows it to conceal its donors, has offices in Rockefeller Center in New York City. It is active on Capitol Hill providing “expert testimony” on Iran for congressional committees, to include “help” in drafting legislation. At a July Senate Foreign Relations Committee hearing on Iran all three outside witnesses were from UANI. It is also active in the media but is perhaps best known for its “name and shame” initiatives in which it exposes companies that it claims are doing business with Tehran in violation of US sanctions.
  • UANI is being sued by a Greek billionaire Victor Restis whom it had outed in 2013. Restis, claiming the exposure was fraudulent and carried out to damage his business, has filed suit demanding that UANI and billionaire Thomas Kaplan turn over documents and details of relationships regarding UANI donors who it is claimed are linked to the case. Kaplan, a New York City resident, made his initial fortune on energy exploration and development. More recently he has been involved in commodities trading in precious metals. His wife Daphne is Israeli and his involvement in various Jewish philanthropies both in the US and in Israel have invited comparison with controversial deceased commodities trader Marc Rich, who reportedly worked closely with the Israeli government on a number of projects. The Justice department would like to the see the UANI lawsuit go away as it is aware that what is being described as “law enforcement” documents would include both privileged and classified Treasury Department work product relating to individuals and companies that it has investigated for sanctions busting. Passing either intelligence related or law enforcement documents to a private organization is illegal but the Justice Department’s only apparent concern is that the activity might be exposed. There is no indication that it would go after UANI for having acquired the information and it perhaps should be presumed that the source of the leak is the Treasury Department itself.
  • Who or what provided the documents to a private advocacy group that is also a tax exempt foundation supported by prominent businessmen with interests in the Middle East is consequently not completely clear but Restis is assuming that the truth will out if he can get hold of the evidence. The lawsuit claims that UANI intimidates its targets by defaming their business practices as well as by demanding both examination of their books and an audit carried out by one of its own accountants followed by review from an “independent counsel.” Kaplan is named in the suit as he appears to be the gray eminence behind UANI. He once boasted “we’ve (UANI) done more to bring Iran to heel than any other private sector initiative.” Kaplan also employs as a director or officer in six of his companies the Executive Director of UANI Mark Wallace and reportedly arranged the awarding of the Executive Director position at Harvard’s Belfer Center to its President Gary Samore. Kaplan is a business competitor to Restis, whose lawyers are apparently seeking to demonstrate two things: first, that the US government has been feeding sometimes only partially vetted information to UANI to help in its “name and shame” program and second, that UANI is itself supported by partisan business interests like Kaplan as well as by foreign sources, which apparently is meant to imply Israel. Or even the Israeli intelligence service Mossad. Meir Dagan, former head of Mossad, is on the UANI advisory board, which also includes ex-Senator Joseph Lieberman and former Senior Diplomat Dennis Ross, both of whom have frequently been accused of favoring Israeli interests and both of whom might well have easy access to US government generated information.
  • ...2 more annotations...
  • And then there is the Muhadedin-e-Khalq, the Iranian terrorist group that has assassinated at least six Americans and is now assisting the Israeli government in killing Iranian scientists, a prima facie definition of what constitutes terrorism. The group was on the State Department terrorist list from 1997 until 2012, when Secretary of State Hillary Clinton de-listed it in response to demands coming from friends of Israel in Congress as well as from a large group of ex government officials, many of whom were paid large honoraria by the group to serve as advocates. The paid American shills included former CIA Directors James Woolsey and Porter Goss, New York City Mayor Rudolph Giuliani, former Vermont Governor Howard Dean, former Director of the Federal Bureau of Investigation Louis Freeh and former United Nations Ambassador John Bolton. The promoters of MEK in congress and elsewhere claimed to be primarily motivated by MEK’s being an enemy of the current regime in Tehran, though its virulent anti-Americanism and terrorist history make it a somewhat unlikely poster child for the “Iranian resistance.”
  • Supporters of MEK also ignore the fact that the group is run like a cult, routinely executes internal dissidents, and has virtually no political support within Iran. But such are the ways of the corrupt Washington punditocracy, lionizing an organization that it should be shunning. MEK’s political arm is located in Paris and it has long been assumed that it is funded by the Israeli government and by at least some of the same gaggle of billionaires, possibly including their Israeli counterparts, who support the anti-Iranian agenda in the United States.
  •  
    More detail about the extraordinary action of the Dept. of Justice to negotiate a settlement because discovery requested from the United Against Nuclear Iran private organization would include privileged and classified "law enforcement" records.
4More

Redactions in U.S. Memo Leave Doubts on Data Surveillance Program - NYTimes.com - 0 views

  • The Justice Department has released a newly declassified version of a May 2004 legal memo approving the National Security Agency’s Stellarwind program, a set of warrantless surveillance and data collection activities that President George W. Bush secretly authorized after the terrorist attacks of Sept. 11, 2001. But questions about the program remain.A more heavily redacted version of the memo had been released in 2011 as part of Freedom of Information Act lawsuits by the American Civil Liberties Union and the Electronic Privacy Information Center. The new version includes previously censored references to the existence of the data collection related to Americans’ phone calls and emails.
  • The Obama administration voluntarily reprocessed the memo from Jack Goldsmith, the head of the Justice Department’s Office of Legal Counsel, in light of the fact that it had declassified the existence of the bulk phone and email data programs last year after leaks by Edward J. Snowden, a former N.S.A. contractor.The fuller release adds to the public record of an important historical episode. However, the government continued to redact crucial portions of the memo that would answer a primary remaining question about the history of Stellarwind: What prompted the Justice Department to conclude in early 2004 that one aspect of the program, which collected records about Americans’ emails in bulk, was illegal — even though it permitted other aspects, like warrantless wiretapping and the bulk collection of Americans’ phone records, to continue?“They have continued to keep redacted something very significant,” said Jameel Jaffer, a lawyer with the A.C.L.U.
  • The Justice Department’s conclusion that the email metadata program was illegal led to a March 2004 confrontation between White House and department officials in the hospital room of Attorney General John Ashcroft, after which nearly the entire top leadership of the department threatened to resign, prompting President Bush to agree to changes.
  • ...1 more annotation...
  • parts of what had happened began to become public, starting with a December 2005 article in The New York Times that revealed the warrantless wiretapping portion of the program. The bulk phone and email metadata programs, however, remained secret until 2013, when they came to light in leaks by Mr. Snowden.While the basic existence of the March 2004 crisis has been known, it was not until Mr. Snowden’s leaks that it became clear that it pertained only to the Internet metadata program. However, it has remained murky what Mr. Goldsmith objected to in light of his willingness to bless the rest of Stellarwind based on a sweeping theory of presidential wartime powers.Those portions of the memo remain redacted in the newly released version.
2More

US gov't threatened Yahoo with $250K daily fine if it didn't use PRISM | Ars Technica - 0 views

  • Yahoo reports that it is on the verge of releasing 1,500 pages of documents related to a long court battle over its participation in the PRISM program, a National Security Agency program revealed last summer as part of the Snowden leaks. A leaked top-secret slide about PRISM shows that Yahoo was one of the first participants, having begun contributing to the database in March of 2008. It did so under severe duress. Company executives believed the government's demand for data was "unconstitutional and overbroad" and fought it in court.
  • "Our challenge, and a later appeal in the case, did not succeed," explained Yahoo General Counsel Ron Bell in a blog post published today. "The Foreign Intelligence Surveillance Court (FISC)... ordered us to give the U.S. Government the user data it sought in the matter." After it lost, Yahoo was threatened with $250,000 per day fines if it didn't comply with the program. Not only that, but the government got permission to share the ruling with other companies in order to put pressure on them as well, according to a just-published story by The Washington Post.
10More

The Latest Rules on How Long NSA Can Keep Americans' Encrypted Data Look Too Familiar |... - 0 views

  • Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question first raised in June 2013, after the minimization procedures governing telephone and Internet records collected under Section 702 of the Foreign Intelligence Surveillance Act were disclosed by Edward Snowden. The issue quickly receded into the background, however, as the world struggled to keep up with the deluge of surveillance disclosures. The Intelligence Authorization Act of 2015, which passed Congress this last December, should bring the question back to the fore. It established retention guidelines for communications collected under Executive Order 12333 and included an exception that allows NSA to keep ‘incidentally’ collected encrypted communications for an indefinite period of time. This creates a massive loophole in the guidelines. NSA’s retention of encrypted communications deserves further consideration today, now that these retention guidelines have been written into law. It has become increasingly clear over the last year that surveillance reform will be driven by technological change—specifically by the growing use of encryption technologies. Therefore, any legislation touching on encryption should receive close scrutiny.
  • Section 309 of the intel authorization bill describes “procedures for the retention of incidentally acquired communications.” It establishes retention guidelines for surveillance programs that are “reasonably anticipated to result in the acquisition of [telephone or electronic communications] to or from a United States person.” Communications to or from a United States person are ‘incidentally’ collected because the U.S. person is not the actual target of the collection. Section 309 states that these incidentally collected communications must be deleted after five years unless they meet a number of exceptions. One of these exceptions is that “the communication is enciphered or reasonably believed to have a secret meaning.” This exception appears to be directly lifted from NSA’s minimization procedures for data collected under Section 702 of FISA, which were declassified in 2013. 
  • While Section 309 specifically applies to collection taking place under E.O. 12333, not FISA, several of the exceptions described in Section 309 closely match exceptions in the FISA minimization procedures. That includes the exception for “enciphered” communications. Those minimization procedures almost certainly served as a model for these retention guidelines and will likely shape how this new language is interpreted by the Executive Branch. Section 309 also asks the heads of each relevant member of the intelligence community to develop procedures to ensure compliance with new retention requirements. I expect those procedures to look a lot like the FISA minimization guidelines.
  • ...6 more annotations...
  • This language is broad, circular, and technically incoherent, so it takes some effort to parse appropriately. When the minimization procedures were disclosed in 2013, this language was interpreted by outside commentators to mean that NSA may keep all encrypted data that has been incidentally collected under Section 702 for at least as long as is necessary to decrypt that data. Is this the correct interpretation? I think so. It is important to realize that the language above isn’t just broad. It seems purposefully broad. The part regarding relevance seems to mirror the rationale NSA has used to justify its bulk phone records collection program. Under that program, all phone records were relevant because some of those records could be valuable to terrorism investigations and (allegedly) it isn’t possible to collect only those valuable records. This is the “to find a needle a haystack, you first have to have the haystack” argument. The same argument could be applied to encrypted data and might be at play here.
  • This exception doesn’t just apply to encrypted data that might be relevant to a current foreign intelligence investigation. It also applies to cases in which the encrypted data is likely to become relevant to a future intelligence requirement. This is some remarkably generous language. It seems one could justify keeping any type of encrypted data under this exception. Upon close reading, it is difficult to avoid the conclusion that these procedures were written carefully to allow NSA to collect and keep a broad category of encrypted data under the rationale that this data might contain the communications of NSA targets and that it might be decrypted in the future. If NSA isn’t doing this today, then whoever wrote these minimization procedures wanted to at least ensure that NSA has the authority to do this tomorrow.
  • There are a few additional observations that are worth making regarding these nominally new retention guidelines and Section 702 collection. First, the concept of incidental collection as it has typically been used makes very little sense when applied to encrypted data. The way that NSA’s Section 702 upstream “about” collection is understood to work is that technology installed on the network does some sort of pattern match on Internet traffic; say that an NSA target uses example@gmail.com to communicate. NSA would then search content of emails for references to example@gmail.com. This could notionally result in a lot of incidental collection of U.S. persons’ communications whenever the email that references example@gmail.com is somehow mixed together with emails that have nothing to do with the target. This type of incidental collection isn’t possible when the data is encrypted because it won’t be possible to search and find example@gmail.com in the body of an email. Instead, example@gmail.com will have been turned into some alternative, indecipherable string of bits on the network. Incidental collection shouldn’t occur because the pattern match can’t occur in the first place. This demonstrates that, when communications are encrypted, it will be much harder for NSA to search Internet traffic for a unique ID associated with a specific target.
  • This lends further credence to the conclusion above: rather than doing targeted collection against specific individuals, NSA is collecting, or plans to collect, a broad class of data that is encrypted. For example, NSA might collect all PGP encrypted emails or all Tor traffic. In those cases, NSA could search Internet traffic for patterns associated with specific types of communications, rather than specific individuals’ communications. This would technically meet the definition of incidental collection because such activity would result in the collection of communications of U.S. persons who aren’t the actual targets of surveillance. Collection of all Tor traffic would entail a lot of this “incidental” collection because the communications of NSA targets would be mixed with the communications of a large number of non-target U.S. persons. However, this “incidental” collection is inconsistent with how the term is typically used, which is to refer to over-collection resulting from targeted surveillance programs. If NSA were collecting all Tor traffic, that activity wouldn’t actually be targeted, and so any resulting over-collection wouldn’t actually be incidental. Moreover, greater use of encryption by the general public would result in an ever-growing amount of this type of incidental collection.
  • This type of collection would also be inconsistent with representations of Section 702 upstream collection that have been made to the public and to Congress. Intelligence officials have repeatedly suggested that search terms used as part of this program have a high degree of specificity. They have also argued that the program is an example of targeted rather than bulk collection. ODNI General Counsel Robert Litt, in a March 2014 meeting before the Privacy and Civil Liberties Oversight Board, stated that “there is either a misconception or a mischaracterization commonly repeated that Section 702 is a form of bulk collection. It is not bulk collection. It is targeted collection based on selectors such as telephone numbers or email addresses where there’s reason to believe that the selector is relevant to a foreign intelligence purpose.” The collection of Internet traffic based on patterns associated with types of communications would be bulk collection; more akin to NSA’s collection of phone records en mass than it is to targeted collection focused on specific individuals. Moreover, this type of collection would certainly fall within the definition of bulk collection provided just last week by the National Academy of Sciences: “collection in which a significant portion of the retained data pertains to identifiers that are not targets at the time of collection.”
  • The Section 702 minimization procedures, which will serve as a template for any new retention guidelines established for E.O. 12333 collection, create a large loophole for encrypted communications. With everything from email to Internet browsing to real-time communications moving to encrypted formats, an ever-growing amount of Internet traffic will fall within this loophole.
  •  
    Tucked into a budget authorization act in December without press notice. Section 309 (the Act is linked from the article) appears to be very broad authority for the NSA to intercept any form of telephone or other electronic information in bulk. There are far more exceptions from the five-year retention limitation than the encrypted information exception. When reading this, keep in mind that the U.S. intelligence community plays semantic games to obfuscate what it does. One of its word plays is that communications are not "collected" until an analyst looks at or listens to partiuclar data, even though the data will be searched to find information countless times before it becomes "collected." That searching was the major basis for a decision by the U.S. District Court in Washington, D.C. that bulk collection of telephone communications was unconstitutional: Under the Fourth Amendment, a "search" or "seizure" requiring a judicial warrant occurs no later than when the information is intercepted. That case is on appeal, has been briefed and argued, and a decision could come any time now. Similar cases are pending in two other courts of appeals. Also, an important definition from the new Intelligence Authorization Act: "(a) DEFINITIONS.-In this section: (1) COVERED COMMUNICATION.-The term ''covered communication'' means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage."       
« First ‹ Previous 101 - 120 of 148 Next › Last »
Showing 20 items per page