Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "police-investigation" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Brutal Crackdown on Turkish Protests - 0 views

  • Turkey threatens to deploy army to end unrest: Deputy PM says army could be called into action to restore order, as unions go on strike to protest police crackdown. Five Turkish trade unions begin nationwide demonstrations with one-day strike; Five trade unions are set to begin today a nationwide demonstration campaign and one-day strike following the harsh police intervention in Taksim the night of June 15, daily Hürriyet has reported. Turkey Protests: Government Targets Doctors Who Treated Injured Demonstrators: The Health Ministry had demanded a list of the names of all doctors who treated demonstrators from the Turkish Medical Association (TBB), the association said on Friday 14 June.
  •  
    As Erdogan promised, the government has responded brutally to Turkish protests, while concurrently censoring news sources. But the resistance grows as five unions announce a one-day strike in protest over the government violence. 
4More

Pakistan Charges CIA Officials Over Drone Deaths | Al Jazeera America - 0 views

  • A Pakistani judge on Tuesday ordered criminal charges to be filed against a former CIA lawyer who oversaw the agency’s drone program and a former station chief in Islamabad over a 2009 strike that killed two people. Former acting general counsel John A. Rizzo and former station chief Jonathan Bank must face charges of murder, conspiracy, waging war against Pakistan and terrorism, ruled Justice Shaukat Aziz Siddiqui of the Islamabad High Court. A court clerk and a lawyer involved in the case, Mirza Shahzad Akbar, confirmed details of the ruling. Rizzo and Bank could not be immediately reached for comment. The CIA declined to comment when contacted by Al Jazeera America. Bank’s cover was blown in late 2010 when a Pakistani man, Kareem Khan, threatened to sue the CIA and others for $500 million over the deaths of his sons Zaenullah Khan and Asif Iqbal in a Dec. 31, 2009, strike in the North Waziristan tribal region.
  • As the outrage over the deaths grew, protesters in Islamabad began carrying placards bearing Bank's name, as listed in the lawsuit, and urging him to leave the country. The CIA pulled Bank from the country on Dec. 16, 2010, when he began receiving death threats. His outing spurred questions at the time of whether Pakistan's spy service might have leaked the information, something Islamabad denied. The disclosure didn't prevent Bank from landing another sensitive job. He became chief of the Iran operations division at CIA headquarters in Virginia. He was removed from that post after CIA officials concluded that he created a hostile work environment in the division. He has since been detailed to the Pentagon's intelligence arm.   Rizzo was the CIA's acting general counsel overseeing its drone program. He later left the agency and wrote a book about his experiences at the CIA.  
  • It is estimated that since 2004, the U.S. has carried out over 400 drone strikes in the country, killing anywhere from 421 to 960 civilians, according to the Bureau of Investigative Journalism, which tracks the U.S. campaign. The foundation says the last U.S. drone strike in Pakistan was on Jan. 29 and killed at least six suspected fighters. It is not clear how the judge's ruling will affect relations between Pakistan and the U.S., especially over the drone program. While Pakistan's government often decries the strikes, many believe it allows them to target the insurgents who threaten it. Massive protests against the drone program previously blocked a land route used by NATO forces to resupply troops in neighboring Afghanistan.   Any legal action stands no chance of success unless U.S. officials cooperate with the court, something highly unlikely, given the secretive nature of the drone program, which the CIA rarely publicly discusses.
  • ...1 more annotation...
  • Under the judge's order, Pakistan's federal police force must file the charges against Rizzo and Bank, though the police have so far refused, reportedly out of a reluctance to upset the country's diplomatic relations with the U.S.
3More

Canada: The Ottawa Shootings and the Derogation of Constitutional Rights. Did Zebaf-Bib... - 0 views

  • The tragic shooting of Cpl. Nathan Cirillo on October 22, 2014 at the War Memorial in Ottawa, Ontario, Canada followed by a shoot-out at the House of Commons, and the death of the shooter, Michael Zebaf-Bibeau, serves as a catalyst to advance several hidden government agendas. The Canadian government wants to spread unreasonable fear of radical, violent Muslim terrorists so that it can better control all Canadians, especially those who choose to exercise their constitutionally enshrined rights. The government is also advancing a social control mechanism so that it can deny and negate domestic constitutional rights, in particular Section 35 of the Constitution Act, 1982 which recognizes and affirms aboriginal and treaty rights
  • It is very unlikely that Michael Zebaf-Bibeau acted alone. Prof. John McMurtry, author of The Cancer Stage of Capitalism From Crisis to Cure explains in “Canada: Decoding Harper’s Terror Game. Beneath the Masks and Diversions” describes Zebaf-Bibeau as a “ clinically insane, drug-addicted petty criminal living in a homeless shelter in Ottawa who had warned a judge in front of the police back in 2011:”‘If you can’t keep me in, I’m going to do something”. Furthermore, McMurtry wonders, “Who could have been a better tool for the events to come?” The notion that Zebaf-Bibeau was being exploited or set up by a handler/manager/police-informer is further reinforced by observations of investigative reporter Amy MacPherson who credibly claims in “Government Envisages Anti-Constitutional Surveillance Law During Ottawa Shooting” that U.S authorities had advance information. She wonders “… how American intelligence knew the name of a ‘possible terrorist’ as the mayhem was still unfolding. How did Americans know when Canadians didn’t, and how was this information so widespread that American media and Google had access to distribute, but domestic reporters on the scene did not?”
  • The theory that U.S agencies were somehow implicated in the tragedy is further reinforced by the fact that Operation Determined Dragon, a joint Canada/U.S counter-terrorism drill, was executed from 20 to 29 October 2014, so the murder of Cpl. Nathan Cirillo coincided with the time that Determined Dragon was being executed. Yet the Canadian government frames this tragedy as rooted in Islamic terrorism rather than the more credible alternative: that a homeless drug addict could have been used as a tool to further an already finalized agenda to participate in an illegal war in Iraq, and to restrict the rights and freedoms of all Canadians. Not surprisingly, the passing of the anti-constitutional surveillance law – Bill C-13, had also been expedited.
10More

ISIL, Turkey: The Dream of Restoring the Glories of Sublime Ottoman State , by Israa Al... - 0 views

  • The ISIL’s funding father is Erdogan’s personal friend The name of the Saudi businessman Yassin al-Qadi has been linked to organizations classified as terrorist internationally. In particular, the foreign press and the Turkish opposition media describe him as “al-Qaeda’s funding father”. After the events of September 11/2001, al-Qadi- along with other figures- has been included in the world’s list of terrorists, and his name was stereotyped as a terrorist man. This made several countries ban him from entering into their territories, Turkey was one of them. Earlier, the Turkish media documented a photo scandal: Erdogan’s meetings with Yassin al-Qadi as well as long meetings with his son Bilal Recep Tayyip Erdogan. The scandal that was leaked by Turkish security elements came in the context of the case of corruption of which the son of the former Turkish Prime Minister has been accused. Based upon this, a large number of elements of the security corps were arrested being accused of plotting a coup against the government.
  • Nevertheless, the French journalist Thierry Meyssan describes Yassin al-Qadi as a personal friend of both Dick Cheney (former U.S. Vice President) and Recep Tayyip Erdogan. According to him, al-Qadi visited Turkey four times during 2012, and “his plane used to land at the second airport of Istanbul, and was being welcomed by the Prime Minister personally, without going through the smart gate, and after cutting the security cameras’ power supply”. The Turkish Gmehoriet Newspaper intended to publish details about the investigations conducted by the Turkish judiciary on the same case, and mentioned that Recep Tayyip Erdogan introduced Yassine al-Qadi as a Saudi businessman visiting Turkey to invest and denied that he is a terrorist. It quoted him as saying: “I trust Mr. Al-Qadi just as I trust myself. He is an almsgiver”.
  • The Turkish newspaper, after publishing Erdogan’s utterances before the Turkish judiciary, revealed that the Turkish police monitored 12 visits made by the Saudi man to Turkey. Seven out of these visits have been made with the help of Erdogan, the period when he was banned from entering Turkey, because his name was added as one of the world wanted terrorists in the list of the American FBI. The newspaper commented saying: “When the Turkish police was looking for al-Qadi, he was holding meetings with the Prime Minister”. Also, it published a photograph that showed separately the aforesaid man, Erdogan, and the Turkish intelligence chief Hakan Fidan, when they were going to a meeting that gathered them. The newspaper noted that Fidan himself met with al-Qadi 5 times when Al-Qadi has been banned from entering the Turkish territory.
  • ...7 more annotations...
  • Yet, the interesting thing is the leaked recordings published by the newspaper that disclose that Yassin al-Qadi used to give orders to the Erdogan’s office. He used to call to inform them that he had decided today to meet with Erdogan, and that the latter should not engage in any other obligations. The newspaper reported details about the dates of the meetings between the two men, what implies that the meetings were being attended by Fidan and by the Egyptian businessman Osama Qutob; the son of Muhammad Qutob the brother of the Brotherhood leader Sayyid Qutob who holds the Turkish citizenship and is living with his father in Turkey at present. This also mean that the meetings were taking place sometimes at the home of the Turkish businessman Mustafa Latif Topas in Istanbul, attended by Erdogan’s son and Moaz the son of al-Qadi. The recordings verify that Qutob was in charge of delivering the messages from the insurgents in the battlefield in Syria to Erdogan, what signifies that the meetings of these figures exceeded the issues of investment, and perhaps they exploited the title of a charity practice!
  • Those returning from Turkey refer to the public sympathy in the pro-government Turkish street with the ISIL. Social networking websites publish photos of Islamic libraries in Istanbul selling “T-shirts” and goods with the ISIL logo on them. Perhaps this news is no longer shocking after what the German (ARD) Television has revealed regarding the opening of an office for the ISIL in al-Fateh Street in Istanbul, being ran by Turks. Through it, the process of supporting and supplying the Takfiri organization in Iraq and Syria with funds and fighters takes place.
  • The German channel itself revealed in a video report aired by it that the ISIL has training camps on the Turkish territory: 1- The GAZIANTEP Camp: a training camp for the ISIL fighters According to the report published by the website of “Today’s Zaman”, an English-language newspaper in Turkey, the Governor of the Gaziantep (Erdal Ata) rushed to hold a press conference to deny what has been revealed by the German television. However, he spoke about the arrest of 19 elements that belong to the ISIL in the city, among those who came from European countries before committing them to trial.
  • Additionally, the Lebanese journalist Hassan Hamade, in an earlier interview with Al-Manar, drew attention to the existence of three training camps in Turkey for the fighters of extremist organizations [3]. 2- The ORFA Camp, southeastern Turkey: a camp out of which the gunmen came when they attacked the Kasab city that its residents are predominantly Armenian.
  • 3- The OSMANIYA camp in Adana, southern Turkey: It is directly near the major bases of the U.S. Air Force in the Turkish territory. Yet, what is interesting is that the Osmaniya camp is a stone’s throw away from the gas pipelines points of intersection coming from Iraq and Central Asia that empty the freight in the Turkish port of Ceyhan on the Mediterranean Sea. 4- The KARMAN camp, it is also in Adana but is much closer to Istanbul. Moreover, a document published by the French journalist Thierry Meyssan, earlier, revealed that Turkey facilitated the infiltration of 5,000 fighters, who belong to al-Qaeda, to the Syrian territory after receiving training in Libya.
  • Perhaps the report of the American TV Network clarifies the argument of the Turkish journalist Orhan Kama Genghis: “The strongholds of the ISIL are located close to the Turkish border, and this did not happen coincidentally”. The Turkish journalist Kadri Gursel talks about the fact that the Turkish border territories have turned into an easy pathway facilitating the arrival and departure of the militants, where there are no formal procedures (visas, etc…) that could bother them, referring to the cooperation of the Turkish intelligence agency with the militants. Above and beyond, the Turkish opposition Republican People’s Party MP Muharram Ingee said that the ISIL leader “Mazen Abu Mohammed” received treatment in one of the Turkish government hospitals in the city of Hatay on April 2014, publishing a photo of the terrorist man in the hospital.
  • Reviewing these data provide an early answer to the question of the Saudi writer, Nawaf Qadimi, who is known for his support for the Muslim Brotherhood, where the phenomenon of the ISIL leads us to evoke history. The Seljuks drew the policies to expand their influence and their tools were the advocates of takfir and the recruiting of fighters in the name of religion. Here is Erdogan in actual fact walking in the footsteps of the ancestors and painting policies, and the tools are the texts of takfir for which he is recruiting fighters in the name of religion itself! That is how history is enabling us to understand our present...
6More

Venezuelan Opposition Mayor, Alias "The Vampire," Arrested for Role in Blue Coup Plot |... - 0 views

  • Venezuelan opposition Mayor and longtime rightwing politician, Antonio Ledezma, has been arrested by the country’s intelligence services, SEBIN, for his alleged role in plotting to stage a coup against the democratically elected government of Nicolas Maduro.  The planned coup was uncovered last week by security forces, just hours before several US backed Air Force officials had planned to partake in a bombing spree of strategic targets in the capital. They had hoped this would lead to the assassination of the country’s president and bring about regime change in the South American country.  “Antonio Ledezma who, today, by order of the Public Prosecutor’s Office, was captured and is going to be prosecuted by the Venezuelan justice system, to make him answer to all of the crimes committed against the peace and security of the country and the Constitution… We’ve had enough of conspiracies, we want to work in peace!” announced Venezuelan President, Nicolas Maduro, amidst a chorus of cheers from onlookers.
  • Last week, Ledezma, who is current Mayor of the Metropolitan Capital District of Caracas, signed a statement calling for a “National Transition Agreement” alongside opposition politicians, Maria Corina Machado and currently detained leader of the Popular Will party, Leopoldo Lopez.  The document calls on Venezuelans to unite behind a plan to remove elected President Nicolas Maduro and sets out an action programme for the would be provisional government. This includes facilitating the return of “exiled” Venezuelans, prosecuting current members of government and reaching out to international financial lending agencies such as the International Monetary Fund.  Circulated on February 11th, the statement was disclosed just a day before the attempted coup was set to unfold and was reportedly the signal to set the plan in motion.  
  • “It has no base in any juridic text, it is a putschist act of conspiracy that is unfortunately to the liking of thousands of opposition militants who have been indoctrinated to attack democracy,” Constitutional Lawyer, Jesus Silva, told Venezuelanalysis.  Ledezma’s detention comes in the wake of several other arrests, including those of a number of airforce officials implicated in the plan.   According to revelations made by the President of the National Assembly, Diosadado Cabello, on Wednesday night, Ledezma has since been named by one of the arrested officials under questioning.  The confession links Ledezma to a plan to “eliminate” opposition leader Leopoldo Lopez last year in order to create “chaos” and destabilise the government. Fellow opposition politician and National Assembly legislator, Julio Borges, is also implicated in the assassination plan, which forced an intervention by the government in early 2014. At the time, Lopez’s wife, Lilian Tintori, stated that the government had acted to protect her husband’s safety. 
  • ...3 more annotations...
  • Although details surrounding Ledezma’s exact role in the recently discovered “Blue” coup plot are still unclear, it appears that the opposition politician is implicated beyond his call for a transitional government.  Following the announcement of the coup plot last Thursday, the Maduro administration suggested that further arrests were to be made once there was sufficient evidence to prosecute the political ringleaders of the plan.  “In these intelligence investigations, we have discovered a codified message, in another language,  by an important leader of a party. On translating it, we found that it gave the details, the elements of the coup. We are about to capture the person who brought the script that they were going to read, the script they were going to read out was already written, and circulated by a person who I will name at the correct moment”, said Maduro, referencing a preplanned statement which was to be read out to the public following the aerial bombardment, announcing a “rebellion” of the armed forces against the government. 
  • It is not the first time that Ledezma has been implicated in a plan to violently overthrow the government. In 2002, he participated in an attempted coup which saw socialist president of the time, Hugo Chavez, ousted for a period of 47 hours. Last year, he was also named several times as a “principal ally” by currently detained terror plotter, Lorent Saleh. Saleh was one of the main underground activists fuelling the armed barricades known as guarimbas which last year claimed the lives of at least 43 Venezuelans. He had planned to go on a killing spree with the help of Colombian paramilitaries but was arrested before the plan could take place.  
  • Popularly known as “the vampire”, Ledezma began his political career in 1973 as a member of the “Democratic Action” Party. In 1989, he infamously became Governor of the Federal District of Caracas, when he oversaw one of the most violent periods in the history of the Caracas Metropolitan Police.  The police body, which was since disbanded in 2010 due to its human rights violations, regularly opened fire on unarmed student protests, systematically repressed street vendors, pensioners and the unemployed, as well as regularly disappeared political activists.   During this period he also oversaw the “Caracazo,” when up to 3000 people were killed and disappeared by security forces in the wake of violent protests against a government imposed austerity programme.  This particular period of Ledezma’s career earnt him the reputation of “student killer” amongst working class Venezuelans. He is founder and current leader of the rightwing party known as the “Brave People’s Alliance”. 
3More

Belgium on "Red Alert": Gov Suspects Terrorist Attack including Chemical Weapon - nsnbc... - 0 views

  • The Belgian OCAM Crisis Center and the government raised the country’s “terror alert” to the highest level, warning about the imminent risk for a terrorist attack. The measure comes one week after the attacks in Paris that claimed 129 lives and injured hundreds. Experts warn about the possible use of a chemical weapon.
  • The OCAM and the Belgian government announced a “red alert” for Brussels and the region around Brussels, warning that a serious terrorist attack may be imminent. The Belgian Interior Ministry issued a statement, saying: “The analysis shows a serious and imminent threat requiring specific security measures as well as detailed recommendations to the population.” The Belgian capital resembles a city under siege with police and military deployed while a large number of citizens have been scared into staying at home and avoiding public places as much as possible. The OCAM, in fact, called on residents in Brussels and the region around the city to avoid crowded places including transport hubs.
  • Several Belgian security analysts warned about the risk of the possible use of an improvised chemical weapon. Within this context it is noteworthy that chemical weapons attacks in Syria, especially that in the Damascus suburb East Ghouta, has been proven to have been carried out by the Saudi Arabian intelligence asset Liwa-al-Islam. The attack implicated the highest levels of Saudi and US governments, military and intelligence services. Belgium hosts the headquarters of the North Atlantic Treaty Organization (NATO / OTAN) as well as the European Union (EU). Belgian officials declined to provide additional information about the alleged imminent threat, stating that there was a need for time to allow for the ongoing police and judicial investigation to take its course. Hours before the announcement of the “red alert” authorities charged a third “unnamed” suspect who had been arrested the day before for involvement in the terrorist attacks in Paris on Friday, November 13.
5More

Korematsu's Demise? | Just Security - 0 views

  • There’s a lot that’s remarkable about last Tuesday’s Third Circuit decision in Hassan v. City of New York, which Faiza Patel cogently summarized in her post last week. In a nutshell, Hassan involves a challenge to secret intelligence operations carried out by the New York Police Department (NYPD) over the years since September 11 that allegedly targets Muslim communities “based on the false and stigmatizing premise that Muslim religious identity ‘is a permissible proxy for criminality, and that Muslim individuals, businesses, and institutions can therefore be subject to pervasive surveillance not visited upon individuals, businesses, and institutions of any other religious faith or the public at large.'” The district court had tersely granted the City’s motion to dismiss both because it concluded the plaintiffs lacked standing and because, in the alternative, it held that the plaintiffs had failed to overcome the pleading burden articulated by the Supreme Court in Iqbal. But the Third Circuit reversed on both fronts, holding that the plaintiffs’ allegations, if true, were more than enough to establish both that they had suffered an injury in fact sufficient to satisfy Article III standing, and that their equal protection and First Amendment claims were sufficiently plausible to satisfy Iqbal. To be sure, the Third Circuit’s decision is interlocutory — coming at a very preliminary stage in the litigation. But what I want to suggest in the post that follows is that, as much as any other post-September 11 judicial decision, Hassan represents the full-throated repudiation of the Supreme Court’s infamous World War II-era ruling in Korematsu v. United States that has been so long in coming — and so thoroughly overdue.
  • As I’ve written about before, Korematsu reflects two separate — but equally important — constitutional failures. The first failure was the internment policy itself, which we now know (and which the US government knew at the time) to have been a completely unnecessary — if not hysterical — overreaction to hyperbolic and (after Midway, at least) categorically overstated fears of a Japanese invasion of the West Coast. By itself, the camps were a dark stain on the history of civil liberties in the United States — albeit one of many, alas. But the second failure was, historically, the far more significant and unique one — the Supreme Court’s conscious constitutional rationalization of the internment policy, based upon a combination of naïveté on the Justices’ part and the affirmatively misleading (if not downright disingenuous) briefing by the federal government. As Justice Robert H. Jackson understood — and forcefully articulated — in his Korematsu dissent, the real violence to the “rule of law” resulting from the camps was thus not the underlying policy, but rather its validation by the Supreme Court. In his words, “a military commander may overstep the bounds of constitutionality, and it is an incident. But if we review and approve, that passing incident becomes the doctrine of the Constitution.”
  • But we’ve struggled somewhat with the second constitutional failure. The courts have repudiated Korematsu’s conviction; the Office of the Solicitor General has confessed error for its role in perpetuating the government’s misleading case before the Supreme Court; and scholars have suggested that Korematsu itself has become part of the “anti-canon” — the class of Supreme Court decisions so reviled that they are cited, if at all, in support of the wrongness of their holdings. But Korematsu itself remains on the books, as do broader concerns that courts are still vulnerable to Korematsu — style reasoning, i.e., that the need to protect national security might provide legal justification for government conduct that would otherwise be unjustifiable. Indeed, one need look no further than the ongoing debate over the SSCI’s torture report for evidence of the Korematsu mentality being alive and well.
  • ...2 more annotations...
  • That’s why I find the Third Circuit’s analysis in Hassan so significant — not because it allows this particular civil suit to go forward, but because it does so based upon an explicit (and conscious) rejection of Korematsu — style legal reasoning. As Judge Ambro explains, “No matter how tempting it might be to do otherwise, we must apply the same rigorous standards even where national security is at stake. We have learned from experience that it is often where the asserted interest appears most compelling that we must be most vigilant in protecting constitutional rights.” And applying the strict judicial scrutiny that is triggered by government action deemed to be intentionally discriminatory on the basis of religious affiliation, the court proceeds to hold that the NYPD lacked a sufficiently compelling justification for such discriminatory treatment, because even if abstract claims of security necessity could be a compelling government interest, the NYPD’s alleged policy was far too overbroad to survive the narrow tailoring required by strict scrutiny. Thus, quoting directly from Justice Jackson’s Korematsu dissent, Judge Ambro closed his opinion by noting that “Our job is judicial. We ‘can apply only law, and must abide by the Constitution, or [we] cease to be civil courts and become instruments of [police] policy.'”
  • Faiza’s post provides far more detail on the specifics of the Third Circuit’s analysis, and the opinion itself is worth a read. For present purposes, though, it’s this mentality that I find so refreshing — that even when the government invokes the specter of September 11 and the need to prevent future acts of terrorism, courts will not abdicate their responsibility to scrutinize the government’s justifications with care, and to be especially wary of overbroad government programs carried out under the broad guise of “necessity.” Hassan certainly isn’t the first example of this kind of principled judicial decisionmaking in a post-September 11 counterterrorism suit, but it is the one that, at least in my view, most directly confronts — and rejects — the kind of deferential judicial review that was responsible for the second constitutional failure in Korematsu, and all of the pain that followed.
4More

Asia Times Online :: The Syria-Iran red line show - 0 views

  • The Nenets of Siberia - crossing the Ob river to enter the Arctic Circle - could teach a thing or two about real strategy to those limping armchair warriors in US Think Tankland. Even the Nenets would know that the current chemical weapons hysteria is a total fabrication by the CIA, MI6 and Israeli intelligence - corroborated by zero evidence. Still, the prevailing Washington "wisdom" is that a "red line" must be enforced over Syria so a "red line" must be enforced on Iran. The fact is that the al-Assad government initially accused the "rebels" of using chemical weapons - and asked the United Nations for an official investigation.
  • Even the New York Times was forced, grudgingly, to admit the "rebels" acknowledged an attack happened in territory controlled by the government, with 16 Syrian Army dead, plus 10 civilians and over a hundred injured. But then the "rebels" changed the narrative, blaming Damascus of bombing their own soldiers. It was Moscow that introduced a measure of reality, detailing how Washington was stalling the UN investigation. Our Nenets of Siberia would also know there's hardly anything secular leading the "rebels" in Syria; it's a motley crew of varying degrees of fanaticism. Once again, the Nenets would not need to freeze to death reading the New York Times to find out that the CIA is "secretly" funneling a free for all weaponizing to the "rebels" via Saudi Arabia and Qatar. Still the Obama administration peddles the fiction that Washington only supplies "non lethal" aid as Capitol Hill nutters keep insisting that Obama install a "no fly zone" over Syria - as in Libya-style NATO war remix.
  • Follow-on strike package, anyone? US Think Tankland nonetheless is ecstatic that the GCC petro-monarchies now have access to precision-guided munitions to "strike Iranian targets". But nothing compares to the cheerleading of Israel's new access to KC-135 aerial refueling tankers - or Stratotankers. Then there's the imminent transfer of anti-radiation missiles as well - advanced versions of the AGM-88 HARM missiles. These toys will "reduce the threat to Israel's follow-on strike package." No, this is not exactly about "US circumspection", or "US resolve in the campaign against Iranian nuclear weapons"; it's unqualified Dog of War barking.
  • ...1 more annotation...
  • Meanwhile, that police state run by King Playstation, also known as Jordan, has opened its airspace to Israeli drones now engaged in "monitoring" Syria. As Asia Times Online has repeatedly warned, Obama in Syria is fast becoming a remix of Reagan in 1980s Afghanistan. We all know what came out of those "freedom fighters" afterwards. In this context, Robert Ford, Obama's alleged Syria expert, telling the Senate Foreign Relations Committee that it's important for Washington to "weigh in" to affect "the internal balance of power in Syria" qualifies as a joke line, not a red line.
10More

Secret White House Email Accounts Uncover IRS-Obama Smoking Gun : palookavillepost.com - 0 views

  • During an investigation of President Barack Hussein Obama’s political appointees and White House aides, FBI agents discovered secret government email accounts they say were used as primary means for Obama’s staff to interact with IRS officials for day-to-day business.
  • Investigators became curious about the possibility of such accounts after Congress requested all emails from the White House regarding the Benghazi, IRS and other scandals, and the White House could only produce a handful of emails that discussed those topics.
  • “We had one of our hackers get into a White House intern’s computer, and that’s where we located a slew of private email accounts not associated with Federal government accounts,” said a spokesman for the powerful federal police agency.
  • ...6 more annotations...
  • Emails sent to people outside of the secret network of White House email accounts were programmed to automatically be deleted five minutes after opening the message, just like on Mission Impossible. This explains the absence of White House emails received by IRS officials.
  • “The content of the emails is still being reviewed, but it is clear that people inside the White House knew about the IRS targeting conservatives, and that somebody with the nickname “Basketball Jones” was the person who told American forces to stand down during the attacks in Benghazi.”
  • “The White House tried to cover their tracks by saying that former IRS Commissioner Douglas Shulman visited the White House 157 times, and that they never used email to communicate,” said the FBI spokesman.
  • Only a few of the emails have been reviewed, but already several of them indicate that President Obama not only knew about the scheme, but he himself ordered the IRS to flood the Tea Party with paperwork and fees.
  • Here is one transcript of a hidden email from an unknown White House aide in April, 2011:
  • “Hey Shulman… What’s up?… Don’t forget BJ(Basketball Jones) wants you to kick up the fees on anyone with Tea Party or Conservative in their names… try to see if you can make them hire expensive tax attorneys too… bog them down with paperwork so they can’t campaign for milk boy(Mitt Romney) or Ru Paul(Ron Paul)… sorry you missed the Easter Egg Hunt… maybe next year… I’d invite you to stay in the Lincoln bedroom but that costs real money… send me a report on how many Tea Party groups quit because of being jerked around…ASAP… Chow!”
  •  
    Although this article has zero credibility and even less reference checking, everyone in America knows that Obama ordered the IRS hit on Tea Party Patriots, Conservatives and Jewish Homeland organizations.  That the IRS admits to violating the Constitutional civil rights of tens of millions of law abviding Americans, and did so in ways that only benefit the Obama re-election campaign is proof enough for anyone who loves liberty.
7More

The U.S. Government And The Sinaloa Cartel - Business Insider - 0 views

  • An investigation by El Universal found that between the years 2000 and 2012, the U.S. government had an arrangement with Mexico's Sinaloa drug cartel that allowed the organization to smuggle billions of dollars of drugs while Sinaloa provided information on rival cartels. Sinaloa, led by Joaquin "El Chapo" Guzman, supplies 80% of the drugs entering the Chicago area and has a presence in cities across the U.S.
  • There have long been allegations that Guzman, considered to be "the world’s most powerful drug trafficker," coordinates with American authorities. But the El Universal investigation is the first to publish court documents that include corroborating testimony from a DEA agent and a Justice Department official. The written statements were made to the U.S. District Court in Chicago in relation to the arrest of Jesus Vicente Zambada-Niebla, the son of Sinaloa leader Ismael "El Mayo" Zambada and allegedly the Sinaloa cartel’s "logistics coordinator."
  • El Universal, citing court documents, reports that DEA agents met with high-level Sinaloa officials more than 50 times since 2000.
  • ...3 more annotations...
  • "The DEA agents met with members of the cartel in Mexico to obtain information about their rivals and simultaneously built a network of informants who sign drug cooperation agreements, subject to results, to enable them to obtain future benefits, including cancellation of charges in the U.S.," reports El Universal, which also interviewed more than one hundred active and retired police officers as well as prisoners and experts. Zambada-Niebla's lawyer claimed to the court that in the late 1990s, Castro struck a deal with U.S. agents in which Sinaloa would provide information about rival drug trafficking organizations while the U.S. would dismiss its case against the Sinaloa lawyer and refrain from interfering with Sinaloa drug trafficking activities or actively prosecuting Sinaloa leadership. "The agents stated that this arrangement had been approved by high-ranking officials and federal prosecutors," Zambada-Niebla lawyer wrote.
  • After being extradited to Chicago in February 2010, Zambada-Niebla argued that he was also "immune from arrest or prosecution" because he actively provided information to U.S. federal agents. Zambada-Niebla also alleged that Operation Fast and Furious was part of an agreement to finance and arm the cartel in exchange for information used to take down its rivals. (If true, that re-raises the issue regarding what Attorney General Eric Holder knew about the gun-running arrangements.)
  • El Universal reported that the coordination between the U.S. and Sinaloa, as well as other cartels, peaked between 2006 and 2012, which is when drug traffickers consolidated their grip on Mexico. The paper concluded by saying that it is unclear whether the arrangements continue. The DEA and other U.S. agencies declined to comment to El Universal.
  •  
    Another chapter in the long-running history of U.S. government participation in drug-smuggling and gun-running. This one breathes new life into the notorious Fast & Furious scandal.
11More

How NSA Can Secretly Aid Criminal Cases | Consortiumnews - 0 views

  • Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern. By Ray McGovern Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.” Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.
  • For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so. So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke. Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various ”authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”
  • Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.
  • ...8 more annotations...
  • Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October – told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.” These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.
  • Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution? Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment. Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”
  • We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.
  • We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too. The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism. Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.” The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.
  • The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations. Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.
  • Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.
  • “So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us: “It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”
  • Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
4More

Peekaboo, I See You: Government Authority Intended for Terrorism is Used for Other Purp... - 0 views

  • The Patriot Act continues to wreak its havoc on civil liberties. Section 213 was included in the Patriot Act over the protests of privacy advocates and granted law enforcement the power to conduct a search while delaying notice to the suspect of the search. Known as a “sneak and peek” warrant, law enforcement was adamant Section 213 was needed to protect against terrorism. But the latest government report detailing the numbers of “sneak and peek” warrants reveals that out of a total of over 11,000 sneak and peek requests, only 51 were used for terrorism. Yet again, terrorism concerns appear to be trampling our civil liberties. Throughout the Patriot Act debate the Department of Justice urged Congress to pass Section 213 because it needed the sneak and peak power to help investigate and prosecute terrorism crimes “without tipping off terrorists.” In 2005, FBI Director Robert Mueller continued the same exact talking point, emphasizing sneak and peek warrants were “an invaluable tool in the war on terror and our efforts to combat serious criminal conduct.”
  • What do the reports reveal? Two things: 1) there has been an enormous increase in the use of sneak and peek warrants and 2) they are rarely used for terrorism cases. First, the numbers: Law enforcement made 47 sneak-and-peek searches nationwide from September 2001 to April 2003. The 2010 report reveals 3,970 total requests were processed. Within three years that number jumped to 11,129. That's an increase of over 7,000 requests. Exactly what privacy advocates argued in 2001 is happening: sneak and peak warrants are not just being used in exceptional circumstances—which was their original intent—but as an everyday investigative tool.
  • Second, the uses: Out of the 3,970 total requests from October 1, 2009 to September 30, 2010, 3,034 were for narcotics cases and only 37 for terrorism cases (about .9%). Since then, the numbers get worse. The 2011 report reveals a total of 6,775 requests. 5,093 were used for drugs, while only 31 (or .5%) were used for terrorism cases. The 2012 report follows a similar pattern: Only .6%, or 58 requests, dealt with terrorism cases. The 2013 report confirms the incredibly low numbers. Out of 11,129 reports only 51, or .5%, of requests were used for terrorism. The majority of requests were overwhelmingly for narcotics cases, which tapped out at 9,401 requests.
  • ...1 more annotation...
  • Section 213 may be less known than Section 215 of the Patriot Act (the clause the government is currently using to collect your phone records), but it's just as important. The Supreme Court ruled in Wilson v. Arkansas and Richards v. Wisconsin that the Fourth Amendment requires police to generally “knock and announce” their entry into property as a means of notifying a homeowner of a search. The idea was to give the owner an opportunity to assert their Fourth Amendment rights. The court also explained that the rule could give way in situations where evidence was under threat of destruction or there were concerns for officer s
3More

UK Security Enforced Media Blackout of Government Child Abuse | News | teleSUR - 0 views

  • Two British newspaper bosses claim that national security services prevented them from publishing allegations of a government pedophile ring in the 1980s on the grounds that it was intelligence that might damage national security. The executives were issued with the D-notices in 1984, when they were due to print damning details enclosed in a dossier on the child sex abuse scandal handed to them by former Labour minister, Barbara Castle. Officials say that no records of the media blackout notices can be found however, leading investigators into the case to believe that they were destroyed, further heightening suspicions of a government cover-up. Security officials said that files “going back beyond 20 years are not complete because files are reviewed and correspondence of a routine nature with no historical significance destroyed.” However, the security services deny a whitewash.
  • The case, which was finally exposed June of this year, relates to a number of prominent politicians and security chiefs under Margaret Thatcher's government who repeatedly sexually and physically abused young boys, holding ‘sex parties’ in a central London residence. This month, a man who claims to have been a victim of the ring, revealed that he saw a Conservative Member of Parliament murder a young boy during one of these depraved sex parties, and that two other boys were killed by the gang. London's Metropolitan Police say they are taking the man's account seriously and are now investigating a “possible homicide.”
  •  
    Thatcher died last year, which may have something to do with the delay in this story emerging. But this will put the British Conservative Party playing defense in the next election.
3More

Dozens of Israeli Public Officials Held in "Corruption Probe" | nsnbc international - 0 views

  • Israeli police say they have detained over 30 individuals, including former public officials, in an investigation into alleged corruption, and that one of those under suspicion is a deputy minister in Prime Minister Benjamin Netanyahu’s cabinet.
  • Prime Minister Benjamin Netanyahu, however, is reportedly facing probes of his own, within his party. According to a report by Antiwar.com, the Likud party’s comptroller has disqualified the PM from running for Likud leadership, due to misuse of party funds. News of the investigation comes as pending Israeli elections, in which Netanyahu is seeking a fourth term, appear to remain slated for March 17th.
  •  
    It will be interesting to see if Netanyahu's disqualification sticks. 
13More

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
4More

BRAZIL: TORTURE TECHNIQUES REVEALED IN DECLASSIFIED U.S. DOCUMENTS - 0 views

  • The Brazilian military regime employed a "sophisticated and elaborate psychophysical duress system" to "intimidate and terrify" suspected leftist militants in the early 1970s, according to a State Department report dated in April 1973 and made public last week. Among the torture techniques used during the military era, the report detailed "special effects" rooms at Brazilian military detention centers in which suspects would be "placed nude" on a metal floor "through which electric current is pulsated." Some suspects were "eliminated" but the press was told they died in "shoot outs" while trying to escape police custody. "The shoot-out technique is being used increasingly," the cable sent by the U.S. Consul General in Rio de Janeiro noted, "in order to deal with the public relations aspect of eliminating subversives," and to "obviate 'death-by-torture' charges in the international press."
  • Peter Kornbluh who directs the National Security Archive's Brazil Documentation Project called the document "one of the most detailed reports on torture techniques ever declassified by the U.S. government." Titled "Widespread Arrests and Psychophysical Interrogation of Suspected Subversives," the document was among 43 State Department cables and reports that Vice President Joseph Biden turned over on June 17 to President Dilma Rousseff during his trip to Brazil for the World Cup competition for use by the Brazilian Truth Commission. The Commission is in the final phase of a two-year investigation of human rights atrocities during the military dictatorship which lasted from 1964 to 1985. On July 2, the Commission posted all 43 documents on its website, accompanied by this statement: "The CNV greatly appreciates the initiative of the U.S. government to make these records available to Brazilian society and hopes that this collaboration will continue to progress." The records range in date from 1967 to 1977. They report on a wide range of human rights-related issues, among them: secret torture detention centers in Sao Paulo, the military's counter-subversion operations, attitudes of the Church on human rights violations, and the regime's hostile reaction in 1977 to the first State Department human rights report on abuses. Some of the documents had been previously declassified under routine release procedures; others, including the April 1973 report on psychophysical torture, were reviewed for declassification as recently as June 5, 2014, in preparation for Biden's trip.
  • During his meeting with President Rousseff, Biden announced that the Obama administration would undertake a broader review of still highly classified U.S. records on Brazil, among them CIA and Defense Department documents, to assist the Commission in finalizing its report. "I hope that in taking steps to come to grips with our past we can find a way to focus on the immense promise of the future," he noted. Since the inception of the Truth Commission in May 2012, the National Security Archive has been assisting the Commissioners in obtaining U.S. records for their investigation, and pressing the Obama administration to fulfill its commitment to a new standard of global transparency and the right-to-know by conducting a special, Brazil declassification project on the military era. "Advancing truth, justice and openness is precisely the way these classified U.S. historical records should be used," according to Kornbluh. "Biden's declassified diplomacy will not only assist the Truth Commission in shedding light on the dark past of Brazil's military era, but also create a foundation for a better and more transparent future in U.S.-Brazilian relations." To call attention to the records and the Truth Commission's work, the Archive is highlighting five key documents from Biden's timely donation.
  •  
    Unmentioned in this article is the U.S. role in instigating a wave of takeovers of Latin American nations by military juntas, including funding, training in torture, operation of "death squads" and the execution of tens of thousands of left-leaning Latin Americans. For a quick and grossly understated  overview, see https://en.wikipedia.org/wiki/Operation_Condor
5More

GCHQ captured emails of journalists from top international media | UK news | The Guardian - 0 views

  • GCHQ’s bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals. Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency’s intranet as part of a test exercise by the signals intelligence agency. The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.
  • Senior editors and lawyers in the UK have called for the urgent introduction of a freedom of expression law amid growing concern over safeguards proposed by ministers to meet concerns over the police use of surveillance powers linked to the Regulation of Investigatory Powers Act 2000 (Ripa). More than 100 editors, including those from all the national newspapers, have signed a letter, coordinated by the Society of Editors and Press Gazette, to the UK prime minister, David Cameron, protesting at snooping on journalists’ communications. In the wake of terror attacks on the Charlie Hebdo offices and a Jewish grocer in Paris, Cameron has renewed calls for further bulk-surveillance powers, such as those which netted these journalistic communications.
  • The journalists’ communications were among 70,000 emails harvested in the space of less than 10 minutes on one day in November 2008 by one of GCHQ’s numerous taps on the fibre-optic cables that make up the backbone of the internet. The communications, which were sometimes simple mass-PR emails sent to dozens of journalists but also included correspondence between reporters and editors discussing stories, were retained by GCHQ and were available to all cleared staff on the agency intranet. There is nothing to indicate whether or not the journalists were intentionally targeted. The mails appeared to have been captured and stored as the output of a then-new tool being used to strip irrelevant data out of the agency’s tapping process. New evidence from other UK intelligence documents revealed by Snowden also shows that a GCHQ information security assessment listed “investigative journalists” as a threat in a hierarchy alongside terrorists or hackers.
  • ...2 more annotations...
  • One restricted document intended for those in army intelligence warned that “journalists and reporters representing all types of news media represent a potential threat to security”. It continued: “Of specific concern are ‘investigative journalists’ who specialise in defence-related exposés either for profit or what they deem to be of the public interest. “All classes of journalists and reporters may try either a formal approach or an informal approach, possibly with off-duty personnel, in their attempts to gain official information to which they are not entitled.” It goes on to caution “such approaches pose a real threat”, and tells staff they must be “immediately reported” to the chain-of-command.
  • GCHQ’s bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals. Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency’s intranet as part of a test exercise by the signals intelligence agency. The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.
3More

After years of stalemate, Sweden seeks London date with Assange | Reuters - 0 views

  • (Reuters) - Swedish prosecutors want to question Julian Assange in London over allegations of sexual assault, potentially ending an impasse that left the WikiLeaks founder holed up for almost three years in Ecuador's embassy. Swedish prosecutors said on Friday they had asked for Assange's approval to question him in London, a U-turn after years of insisting he must go to Stockholm for questioning about alleged assaults against two women in 2010.Assange denies the allegations, which are not related to WikiLeaks' publication of U.S. military and diplomatic documents, also in 2010. He refused to go, arguing Sweden could send him on to the United States where he might face trial. One of Assange's lawyers said he welcomed the request but expressed concern the process could take time because approval was needed from British and Ecuadorian authorities.
  • He has been nagging for this for four years. He wants nothing more than to have an opportunity ... to give his version of what happened and to clear his name," Assange's lawyer Per Samuelson told Reuters.Ecuador's embassy in London could not immediately be reached for comment.Assange, an Australian citizen, has been unable to leave Ecuador's embassy since claiming asylum there in 2012.Even if Sweden drops the investigation, he faces arrest by British police for jumping bail granted while the UK courts considered a European arrest warrant issued by Sweden.
  • The main reason for prosecutors' change of heart is that several crimes Assange is suspected of are subject to a statute of limitations expiring in August.Prosecutor Marianne Ny said she still believed questioning him at the embassy would lower the quality of the interview and he would need to be in Sweden should the case come to a trial."Now that time is of the essence, I have viewed it therefore necessary to accept such deficiencies to the investigation," she said in a statement.Sweden's Supreme Court is currently weighing whether to hear his request to lift the warrant for Assange's arrest and has asked the prosecutor to submit an opinion before a decision can be taken.
4More

Blackwater Guards Found Guilty in 2007 Iraq Killings - NYTimes.com - 0 views

  • Four former Blackwater Worldwide security guards were convicted and immediately jailed Wednesday for their roles in a deadly 2007 shooting in Baghdad’s Nisour Square that marked a bloody nadir in America’s war in Iraq.A jury in Federal District Court found that the deaths of 17 Iraqis in the shooting, which began when a convoy of the guards suddenly began firing in a crowded intersection, was not a battlefield tragedy, but the result of a criminal act.The convictions on murder, manslaughter and weapons charges represented a legal and diplomatic victory for the United States government, which had urged Iraqis to put their faith in the American court system. That faith was tested repeatedly over seven years as the investigation had repeated setbacks, leaving Iraqis deeply suspicious that anyone would be held responsible for the deaths.
  • One defendant, Nicholas A. Slatten, a sniper who the government said fired the first shots, was convicted of murder. The others — Dustin L. Heard, Evan S. Liberty and Paul A. Slough — were convicted of voluntary manslaughter and using a machine gun to carry out a violent crime. A fifth contractor, Jeremy Ridgeway, previously pleaded guilty to manslaughter and cooperated with prosecutors.Jurors could not reach verdicts on several of the counts against Mr. Heard, but that will have little bearing on the sentencing. The machine-gun charges carry mandatory 30-year minimum prison sentences, more than the manslaughter charges. Mr. Slatten faces possible life in prison. No sentencing date has been set.
  • The trial was an epilogue to the story of Blackwater, which began as a police- and military-training facility in North Carolina and came to symbolize the country’s outsourcing of its wartime responsibilities.About 1,000 of Blackwater’s contractors guarded diplomats in Iraq. Others loaded bombs onto Predator drones. The company’s founder, Erik Prince, tapped retired Central Intelligence Agency officials for executive positions, and at one point, the C.I.A. hired Blackwater contractors to covertly track and kill Qaeda operatives worldwide, a program that was shelved before any killings were conducted. While the company’s security guards were involved in scores of shootings in Iraq, it was the 2007 incident in Nisour Square that helped cement Blackwater’s image as a company that operated with impunity because of its lucrative contracts with the American government. The company became the subject of several Justice Department investigations, all of which the company and its executives survived. But ultimately, public outrage over the shooting contributed to Blackwater’s demise. It lost its contracts and was renamed, sold and renamed again.
  • ...1 more annotation...
  • The criminal trial raised novel legal issues, and the case is expected to wind through the appellate courts for a year or more. One issue — whether the Justice Department had jurisdiction to bring the case at all — could undo the entire case.Under federal law, the government has jurisdiction for overseas crimes committed by defense contractors or those supporting the Pentagon’s mission. Blackwater was working for the State Department, a distinction that jurors concluded did not matter but which has not been tested.
9More

Exclusive: TSA's Secret Behavior Checklist to Spot Terrorists - The Intercept - 0 views

  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening. The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program.
  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening.
  • The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program. The checklist ranges from the mind-numbingly obvious, like “appears to be in disguise,” which is worth three points, to the downright dubious, like a bobbing Adam’s apple. Many indicators, like “trembling” and “arriving late for flight,” appear to confirm allegations that the program picks out signs and emotions that are common to many people who fly.
  • ...5 more annotations...
  • A TSA spokesperson declined to comment on the criteria obtained by The Intercept. “Behavior detection, which is just one element of the Transportation Security Administration’s (TSA) efforts to mitigate threats against the traveling public, is vital to TSA’s layered approach to deter, detect and disrupt individuals who pose a threat to aviation,” a spokesperson said in an emailed statement.
  • Since its introduction in 2007, the SPOT program has attracted controversy for the lack of science supporting it. In 2013, the Government Accountability Office found that there was no evidence to back up the idea that “behavioral indicators … can be used to identify persons who may pose a risk to aviation security.” After analyzing hundreds of scientific studies, the GAO concluded that “the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance.” The inspector general of the Department of Homeland Security found in 2013 that TSA had failed to evaluate SPOT, and “cannot ensure that passengers at United States airports are screened objectively, show that the program is cost-effective, or reasonably justify the program’s expansion.” Despite those concerns, TSA has trained and deployed thousands of Behavior Detection Officers, and the program has cost more than $900 million since it began in 2007, according to the GAO.
  • The 92-point checklist listed in the “Spot Referral Report” is divided into various categories with a point score for each. Those categories include a preliminary “observation and behavior analysis,” and then those passengers pulled over for additional inspection are scored based on two more categories: whether they have “unusual items,” like almanacs and “numerous prepaid calling cards or cell phones,” and a final category for “signs of deception,” which include “covers mouth with hand when speaking” and “fast eye blink rate. Points can also be deducted from someone’s score based on observations about the traveler that make him or her less likely, in TSA’s eyes, to be a terrorist. For example, “apparent” married couples, if both people are over 55, have two points deducted off their score. Women over the age of 55 have one pointed deducted; for men, the point deduction doesn’t come until they reach 65. Last week, the ACLU sued TSA to obtain records related to its behavior detection programs, alleging that they lead to racial profiling. The lawsuit is based on a Freedom of Information Act request the ACLU filed last November asking for numerous documents related to the program, including the scientific justification for the program, changes to the list of behavior indicators, materials used to train officers and screen passengers, and what happens to the information collected on travelers.
  • “The TSA has insisted on keeping documents about SPOT secret, but the agency can’t hide the fact that there’s no evidence the program works,” said Hugh Handeyside, staff attorney with the ACLU National Security Project, in a statement announcing the lawsuit. Being on the lookout for suspicious behavior is a “common sense approach” that is used by law enforcement, according to TSA. “No single behavior alone will cause a traveler to be referred to additional screening or will result in a call to a law enforcement officer (LEO),” the agency said in its emailed statement. “Officers are trained and audited to ensure referrals for additional screening are based only on observable behaviors and not race or ethnicity.” One former Behavior Detection Officer manager, who asked not to be identified, said that SPOT indicators are used by law enforcement to justify pulling aside anyone officers find suspicious, rather than acting as an actual checklist for specific indicators. “The SPOT sheet was designed in such a way that virtually every passenger will exhibit multiple ‘behaviors’ that can be assigned a SPOT sheet value,” the former manager said.
  • The signs of deception and fear “are ridiculous,” the source continued. “These are just ‘catch all’ behaviors to justify BDO interaction with a passenger. A license to harass.” The observations of a TSA screener or a Behavior Detection Officer shouldn’t be the basis for referring someone to law enforcement. “The program is flawed and unnecessarily delays and harasses travelers. Taxpayer dollars would be better spent funding real police at TSA checkpoints,” the former manager said. A second former Behavior Detection Officer manager, who also asked not to be identified, told The Intercept that the program suffers from lack of science and simple inconsistency, with every airport training its officers differently. “The SPOT program is bullshit,” the manager told The Intercept. “Complete bullshit.”
  •  
    I've completely boycotted airlines in the U.S. since 2002 because I refuse to submit to the outrageous treatment by government that is now required to board a commercial airliner. If the airlines want my business, they need to start lobbying to end the politics of fear and the Gestapo tactics of government. plus pushing for an honest investigation of the 9/11/2001 incidents.  
« First ‹ Previous 101 - 120 of 152 Next › Last »
Showing 20 items per page