Wednesday, February 20, 2008

Criminal Apostate U.S. Supreme Court Gives Free Pass to Criminal Surveillance

Supreme Court won't review Bush domestic spying case 19 Feb 2008 The Supreme Court on Tuesday turned down a legal challenge to the warrantless domestic spying program President [sic] George W. Bush created after the September 11 attacks. The American Civil Liberties Union had asked the justices to hear the case after a lower court ruled the ACLU, other groups and individuals that sued the government had no legal right to do so because they could not prove [?] they had been affected by the program.

Supreme Court Refuses to Review Warrantless Wiretapping Case --Ruling Allows Executive Branch to Police Itself, Says ACLU (ACLU) 19 Feb 2008 The U.S. Supreme Court today refused to review a legal challenge to the Bush administration’s warrantless surveillance program. The case was brought by the American Civil Liberties Union on behalf of prominent journalists, scholars, attorneys and national nonprofit organizations who say that the unchecked surveillance program is disrupting their ability to communicate effectively with sources and clients.

Monday, February 18, 2008

Backbone, at Last

It's about time. The U.S. Congress finally mustered the political courage to slow down the War on Terror' stampede on civil liberties.

By failing to re-authorize the so-called "Protect America Act," Congress reinstated a deeply flawed legal framework for warrantless surveillance. Nonetheless, that framework is preferable to that developed by the Bush administration under this act, which expired on Feb. 16, 2008.

In the Protect America Act, enacted Aug. 6, 2007, Congress authorized the Bush administration to continue two electronic surveillance initiatives it authorized under a 2001 executive order:

  • Warrantless wiretaps of conversations originating in, or terminating in, the United States, of individuals allegedly connected to terrorist groups; and
  • With the cooperation of U.S. telecommunications companies, warrantless mining of data streams to analyze transactional records of telephone and Internet traffic in search of patterns that might point to terrorist suspects.

Despite the "terrorist" appellation, these initiatives weren't limited to terrorist-related intelligence gathering. Any activity, terrorist-related or not, was fair game if deemed of interest to intelligence officials. Vice-President Dick Cheney, for instance, apparently used Bush's 2001 executive order to eavesdrop on members of his staff he suspected of talking to the press without advance authorization.

The Protect America Act bypassed a legal procedure set up 30 years ago to review applications for national security and intelligence-related electronic surveillance. Under the 1978 Foreign Intelligence Surveillance Act (FISA), a secret federal court must review any application for electronic surveillance that has a "substantial likelihood" of monitoring the communications of a U.S. resident.

But with the Protect America Act, the definition of "electronic surveillance" subject to FISA become much narrower, in effect, legalizing the Bush administration initiatives. What's more, the FISA court played a much smaller role. Rather than a court, the act gave the attorney general—a political appointee—the responsibility to authorize FISA-related surveillance requests. The court merely reviewed surveillance already under way.

The Protect America Act also directed telecommunications companies to assist the government in implementing the Bush surveillance initiatives. In addition, it protected those companies from private lawsuits for alleged violations of FISA. Dozens of such lawsuits have been filed.

Despite warnings from the Bush administration of possibly grave consequences if the Protect America Act ever expired, Congress thankfully set a time limit on this authority—February 16, 2008.

That supposedly would give legislators enough time to come up with a framework that would give back the FISA court some of its oversight. In exchange, Congress would presumably permanently legalize the Bush surveillance initiatives.

The Bush administration, however, wanted more. It also demanded that telecom companies receive retroactive legal immunity for their participation in illegal surveillance prior to enactment of the Protect America Act.

Last week, the Senate caved in to Bush, and included telecom immunity in its amendments to FISA. However, the House didn't go along. It adjourned for three weeks on Feb. 16 without renewing the Protect America Act. In the process, it delivered a rare respite to greater privacy intrusions in the never-ending War on Terror.

This certainly isn't the last word, but as it stands now, the FISA court must once again approve any new applications for electronic surveillance under the "substantial likelihood" standard.

Despite my grave misgivings about the entire procedure being shrouded in secrecy, and with near-total lack of accountability, this procedure is far preferable to placing the final decision in the hands of the attorney general. It's hard to forget that only a few months ago, the now thankfully departed Alberto Gonzales occupied this post.

What's more, even though Congress didn't cave in to the Bush administration, the world didn't end on Feb. 16. No mushroom clouds appeared over Washington, D.C., or New York City. Now that Congress has displayed a little backbone in defending civil liberties, it will hopefully have the courage to do so again.

Copyright © 2008 by Mark Nestmann

Friday, February 15, 2008

U.S Halliburton Concentration Camps

Detention camps at undisclosed locations in the US? Rule by Fear or Rule by Law?
Global Research, February 13, 2008

"The power of the Executive to cast a man into prison without formulating any charge known to the law, and particularly to deny him the judgment of his peers, is in the highest degree odious and is the foundation of all totalitarian government whether Nazi or Communist."
-- Winston Churchill, Nov. 21, 1943

Since 9/11, and seemingly without the notice of most Americans, the federal government has assumed the authority to institute martial law, arrest a wide swath of dissidents (citizen and noncitizen alike), and detain people without legal or constitutional recourse in the event of "an emergency influx of immigrants in the U.S., or to support the rapid development of new programs."

Beginning in 1999, the government has entered into a series of single-bid contracts with Halliburton subsidiary Kellogg, Brown and Root (KBR) to build detention camps at undisclosed locations within the United States. The government has also contracted with several companies to build thousands of railcars, some reportedly equipped with shackles, ostensibly to transport detainees.

According to diplomat and author Peter Dale Scott, the KBR contract is part of a Homeland Security plan titled ENDGAME, which sets as its goal the removal of "all removable aliens" and "potential terrorists."

Fraud-busters such as Rep. Henry Waxman, D-Los Angeles, have complained about these contracts, saying that more taxpayer dollars should not go to taxpayer-gouging Halliburton. But the real question is: What kind of "new programs" require the construction and refurbishment of detention facilities in nearly every state of the union with the capacity to house perhaps millions of people?

Sect. 1042 of the 2007 National Defense Authorization Act (NDAA), "Use of the Armed Forces in Major Public Emergencies, " gives the executive the power to invoke martial law. For the first time in more than a century, the president is now authorized to use the military in response to "a natural disaster, a disease outbreak, a terrorist attack or any other condition in which the President determines that domestic violence has occurred to the extent that state officials cannot maintain public order."

The Military Commissions Act of 2006, rammed through Congress just before the 2006 midterm elections, allows for the indefinite imprisonment of anyone who donates money to a charity that turns up on a list of "terrorist" organizations, or who speaks out against the government's policies. The law calls for secret trials for citizens and noncitizens alike.

Also in 2007, the White House quietly issued National Security Presidential Directive 51 (NSPD-51), to ensure "continuity of government" in the event of what the document vaguely calls a "catastrophic emergency." Should the president determine that such an emergency has occurred, he and he alone is empowered to do whatever he deems necessary to ensure "continuity of government." This could include everything from canceling elections to suspending the Constitution to launching a nuclear attack. Congress has yet to hold a single hearing on NSPD-51.

U.S. Rep. Jane Harman, D-Venice (Los Angeles County) has come up with a new way to expand the domestic "war on terror." Her Violent Radicalization and Homegrown Terrorism Prevention Act of 2007 (HR1955), which passed the House by the lopsided vote of 404-6, would set up a commission to "examine and report upon the facts and causes" of so-called violent radicalism and extremist ideology, then make legislative recommendations on combatting it.

According to commentary in the Baltimore Sun, Rep. Harman and her colleagues from both sides of the aisle believe the country faces a native brand of terrorism, and needs a commission with sweeping investigative power to combat it.

A clue as to where Harman's commission might be aiming is the Animal Enterprise Terrorism Act, a law that labels those who "engage in sit-ins, civil disobedience, trespass, or any other crime in the name of animal rights" as terrorists. Other groups in the crosshairs could be anti-abortion protesters, anti-tax agitators, immigration activists, environmentalists, peace demonstrators, Second Amendment rights supporters ... the list goes on and on. According to author Naomi Wolf, the National Counterterrorism Center holds the names of roughly 775,000 "terror suspects" with the number increasing by 20,000 per month.

What could the government be contemplating that leads it to make contingency plans to detain without recourse millions of its own citizens?

The Constitution does not allow the executive to have unchecked power under any circumstances. The people must not allow the president to use the war on terrorism to rule by fear instead of by law.

Lewis Seiler is the president of Voice of the Environment, Inc. Dan Hamburg, a former congressman, is executive director.

Global Research Articles by Lewis Seiler

Republican Party Slits its Wrists in Defending Criminal Government 4th Amendment Violations

We Need to Know More About Criminal Wiretapping

Conyers to White House: We Need to Know More about Wiretapping

Signaling the fight ahead when lawmakers get together to sort out the differences between the Senate and House surveillance bills, House Judiciary Committee Chairman John Conyers (D-MI) wrote White House counsel Fred Fielding today to deliver two messages: 1) from what he's seen of the documents relating to the administration's warrantless wiretapping program, there's no reason to grant the telecoms retroactive immunity (he prefers the term "amnesty"), and 2) Congress needs to know more before it can be expected to consider granting that amnesty.

The administration suddenly gave Conyers, along with a limited number of members of his committee and the full House intelligence committee, access to documents relating to the program late last month. It was obviously part of the administration's drive to secure immunity for the telecoms. But Conyers says that hasn't worked for him: and consideration of the documents and briefings provided so far leads me to conclude that there is no basis for the broad telecommunications company amnesty provisions advocated by the Administration and contained in the Foreign Intelligence Surveillance Act (FISA) bill being considered today in the Senate, and that these materials raise more questions than they answer on the issue of amnesty for telecommunications providers.

Beyond that, Conyers asks a list of questions about the scope and success of the administration's warrantless wiretapping program, along with a slew of documents related to the program that he hasn't seen. Chief among the documents Conyers wants to see is the October, 2001 memo from John Yoo in the Justice Department's Office of Legal Counsel that originally authorized the warrantless wiretapping program.

He also wants the rest of the members on his committee to get a chance to see the documents already turned over; the administration only agreed to allow 19 (10 Dems, 9 GOPers) members to see the documents last month. In the letter, Conyers writes that the administration's reluctance to part with information about the program "belies its position on the importance of the legislation: rather than the Administration giving Congress all the information it needs, the Administration has provided a slow trickle of information to only selected members of Congress, almost assuring that Congress cannot adequately consider its requests."

You can read that letter below in its entirety.

Dear Mr. Fielding:

I am writing to follow up on previous letters and requests of January 5, 2006, February 8, 2006, July 30, 2007, September 11, 2007, October 15, 2007, and October 16, 2007, requesting information and documents from this Administration concerning the warrantless surveillance program, known as the terrorist surveillance program (TSP), first disclosed by the New York Times on December 16, 2005, and related matters. Although some of the requested materials have been provided to some Judiciary Committee members, much of the information has not, and it is crucial that this material be produced as promptly as possible so that Congress may fulfill its legislative and oversight responsibilities. Indeed, review and consideration of the documents and briefings provided so far leads me to conclude that there is no basis for the broad telecommunications company amnesty provisions advocated by the Administration and contained in the Foreign Intelligence Surveillance Act (FISA) bill being considered today in the Senate, and that these materials raise more questions than they answer on the issue of amnesty for telecommunications providers. In order to more fully understand and react to the Administration’s request for broad-based and retroactive amnesty for telecommunications firms, who may be in a position to divulge information concerning misconduct by Administration officials, it is imperative that your provide this information to us as promptly as possible, as we have been asking for many months on numerous occasions.

Throughout this past year, the Administration has sounded a drumbeat that Congress enact the Administration’s request for amendments to the Foreign Intelligence Surveillance Act (FISA). However, during this same time, the Administration has denied to Congress essential documents and information that would permit Congress, in the exercise of its Article I responsibilities, to consider the proposed amendments to FISA in a prudent and careful manner. This Administration cannot be heard to complain about the unwillingness of Congress to enact legislation that the Administration claims to be so vital for the national security when the Administration at the same time has denied to Congress documents and information that are essential to its legislative responsibilities. Frankly, the Administration’s refusal to provide the requested information belies its position on the importance of the legislation: rather than the Administration giving Congress all the information it needs, the Administration has provided a slow trickle of information to only selected members of Congress, almost assuring that Congress cannot adequately consider its requests.

Once again, I have set forth below our request for documents and information. I further reiterate my request that all these materials, as well as those provided so far, be made available to the entire Judiciary Committee and, to the extent possible, to the American public via immediate and appropriate declassification. To assist the Administration in prioritizing its response, without altering our request for all the information below, I would stress three requests in particular:

First, please provide access to all Members of the House Judiciary Committee those briefings and materials you have made available to 19 Members as of now. Currently, it is my understanding that the entire membership of the House Permanent Select Committee on Intelligence and the Senate Committee on the Judiciary and the Senate Select Committee on Intelligence has been permitted to be “read in” to the TSP program. The only Committee of jurisdiction that has not been offered the same access is the House Judiciary Committee. This is unacceptable and serves little purpose but to impede our Members review of the program and understanding of your request for retroactive amnesty.

Second, please provide the Memorandum for Alberto R. Gonzales, Counsel to the President, and William J. Haynes, II, General Counsel Department of Defense, from John C. Yoo, Deputy Assistant Attorney General and Robert J. Delahunty, Special Counsel, Office of Legal Counsel, Re: Authority for Use of Military Force to Combat Terrorist Activities Within the United States. It is believed that this Memorandum is dated either October 17, 2001, or October 23, 2001. Based on the title of this document, and based on the contents of similar memoranda issued at roughly the same time, it appears that a substantial portion of this Memorandum provides a legal determination and analysis as to the nature and scope of the Presidential war powers to accomplish specific acts within the United States. Congress is entitled to know the executive branch’s interpretation of its constitutional powers.

Third, please provide copies of filings, correspondence or transcripts of colloquies with the Foreign Intelligence Surveillance Court about TSP or other warrantless or other electronic surveillance programs, containing legal analysis, arguments, or decisions concerning the interpretation of FISA, the Fourth Amendment to the Constitution, the Authorization for the Use of Military Force enacted on September 18, 2001, or the President's authority under Article II of the Constitution.

In addition, as per our September 11, 2007, letter, we reiterate our requests for the following documents:

1. All documents from September 11, 2001, to the present, including e-mail, that reflect, discuss, or describe agreements or understandings between the White House, the Department of Justice, the National Security Agency, or any other entity of the Executive Branch and telecommunications companies, internet service providers, equipment manufacturers, or data processors regarding criminal or civil liability for assisting with or participating in warrantless electronic surveillance program(s).

2. An unredacted copy of the notes or program log of FBI Director Mueller provided to the House Judiciary Committee on August 14, 2007, concerning the March 2004 hospital visit to former Attorney General John Ashcroft and other events that former Deputy Attorney General James Comey described in his May 15, 2007, testimony before the Senate Judiciary Committee.

3. All documents from December 1, 2005, to the present related to the investigation by the Department of Justice's Office of Professional Responsibility (OPR) into the role of Department of Justice attorneys in the authorization and oversight of the warrantless electronic surveillance program, which was opened on January 11, 2006, and closed approximately three months later after OPR investigators were denied the necessary security clearances (OPR Investigation) that reflect, discuss, or describe the following:

a) consideration of the request for security clearances;

b) communications between White House personnel, including the President or the Vice President, and Department of Justice personnel about the OPR investigation or consideration of the request for security clearances; and

c) the reasons for suspending that investigation (since revived by the Attorney General).

4. Since September 11, 2001, all audits, reports, or evaluations of or concerning any warrantless surveillance program(s), whether conducted by government employees or private companies, including any reports as to the effectiveness of minimization standards to protect U.S. persons’ communications.

I would also again ask that you ensure that the appropriate entity in the Administration immediately provide written responses to the following questions, which we have previously submitted last year:

1. Since September 11, 2001, has the Administration conducted any warrantless surveillance in the United States, other than through the warrantless electronic surveillance program the President acknowledged in late 2005 (known now as the Terrorist Surveillance Program), or as explicitly authorized by FISA, or any other warrantless surveillance techniques such as physical searches of home or offices or opening of mail? Are such activities continuing? Is the Administration currently conducting any foreign intelligence surveillance in the United States, other than that explicitly authorized by the Foreign Intelligence Surveillance Act (FISA)?

2. How many actionable leads have been referred to operational entities as a result of acquisitions of U.S. persons’ conversations or communications?

a) Please break down the response as follows: 1) between September 11, 2001, and October 25, 2001; 2) between October 25, 2001, and January 10, 2007; 3) between January 10, 2007, and August 5, 2007; and 4) since August 5, 2007.

b) Of the actionable leads referred to operational entities, what have been the results? Please differentiate between counter-terrorism, criminal investigations and prosecutions, counter-espionage, and in-theater combat operations. Please indicate with specificity whether any attacks have been averted.

3. How many conversations or communications (both incoming or outgoing) monitored under the programs have revealed a contact between a U.S. person and someone for whom there was probable cause to believe they were in or supporting al Qaeda? How many people in the U.S. have had email communications with someone considered to be in al Qaeda? How many of these conversations or communications have actually involved terrorist activity, as opposed to other topics of conversation? How many people have been charged with any wrongdoing as a result of such interceptions? How many terrorist activities have been disrupted as a result of such interceptions? How many people have been subjected to surveillance but not charged with any crime or otherwise detained?

4. How many persons whose conversations or communications were monitored under the programs have been subjected to any other surveillance techniques or searches, such as physical searches of home or offices, opening of mail, etc, whether subject to a warrant or not?

5. Have any U.S. persons whose conversations or communications were monitored under the programs been detained within the United States? Have any U.S. or foreign persons been interrogated or detained outside of the United States, whether by the United States or any other government, in significant part as a result of such monitoring?

6. Have journalists, lawyers, lawmakers (whether federal, state, or local), or aides had their conversations or communications monitored under the programs? If so, how many?

7. How many U.S. persons had conversations (voice or email content) or communications (call or email data) acquired through electronic surveillance programs? In how many of these acquisitions was the U.S. person the target of the acquisition? In how many of these acquisitions was the acquisition incidental? How many warrants for continued surveillance were sought after identification of someone as a U.S. person? How many such applications were denied? Please break down the response between warrantless and other electronic surveillance programs as to the following periods:

a) between September 11, 2001, and October 25, 2001;
b) between October 25, 2001, and January 10, 2007;
c) between January 10, 2007, and August 5, 2007; and
d) since August 5, 2007.

8. How many individuals have been targeted for surveillance under the Protect America Act that involved foreign intelligence generally, as opposed to terrorism or nuclear proliferation?

9. Please identify any telecommunication companies or internet service providers that refused to allow access to communication streams without Court sanction or questioned the terms of the requests or demands which were being made of them and, to the extent that discussions with such companies were conducted orally rather than through written dialogue, please authorize the relevant parties to discuss the content of those discussions with Committee staff and Members.

I am enclosing for your information copies of previous requests concerning these matters made to the Administration.

Monday, February 11, 2008

Bush Administration Seeks to Cover Up Criminal Surveillance of Dissidents

Because the Said So

Even by the dismal standards of what passes for a national debate on intelligence and civil liberties, last week was a really bad week.

The Senate debated a bill that would make needed updates to the Foreign Intelligence Surveillance Act — while needlessly expanding the president’s ability to spy on Americans without a warrant and covering up the unlawful spying that President Bush ordered after 9/11.

The Democrat who heads the Senate Intelligence Committee, John Rockefeller of West Virginia, led the way in killing amendments that would have strengthened requirements for warrants and raised the possibility of at least some accountability for past wrongdoing. Republicans declaimed about protecting America from terrorists — as if anyone was arguing the opposite — and had little to say about protecting Americans’ rights.

We saw a ray of hope when the head of the Central Intelligence Agency conceded — finally — that waterboarding was probably illegal. But his boss, the director of national intelligence, insisted it was legal when done to real bad guys. And Vice President Dick Cheney — surprise! — made it clear that President Bush would authorize waterboarding whenever he wanted.

The Catch-22 metaphor is seriously overused, but consider this: Attorney General Michael Mukasey told Congress there would be no criminal investigation into waterboarding. He said the Justice Department decided waterboarding was legal (remember the torture memo?) and told the C.I.A. that.

So, according to Mukaseyan logic, the Justice Department cannot investigate those who may have committed torture, because the Justice Department said it was O.K. and Justice cannot be expected to investigate itself.

As it was with torture, so it was with wiretaps.

After the 2001 terrorist attacks, the president decided to ignore the Foreign Intelligence Surveillance Act, or FISA, and authorized wiretaps without a warrant on electronic communications between people in the United States and people abroad. Administration lawyers ginned up a legal justification and then asked communications companies for vast amounts of data.

According to Mr. Rockefeller, the companies were “sent letters, all of which stated that the relevant activities had been authorized by the president” and that the attorney general — then John Ashcroft — decided the activity was lawful. The legal justification remains secret, but we suspect it was based on the finely developed theory that the president does not have to obey the law, and not on any legitimate interpretation of federal statutes.

When Mr. Bush started his spying program, FISA allowed warrantless eavesdropping for up to a year if the president certified that it was directed at a foreign power, or the agent of a foreign power, and there was no real chance that communications involving United States citizens or residents would be caught up. As we now know, the surveillance included Americans and there was no “foreign power” involved.

The law then, and now, also requires the attorney general to certify “in writing under oath” that the surveillance is legal under FISA, not some fanciful theory of executive power. He is required to inform Congress 30 days in advance, and then periodically report to the House and Senate intelligence panels.

Congress was certainly not informed, and if Mr. Ashcroft or later Alberto Gonzales certified anything under oath, it’s a mystery to whom and when. The eavesdropping went on for four years and would probably still be going on if The Times had not revealed it.

So what were the telecommunications companies told? Since the administration is not going to investigate this either, civil actions are the only alternative.

The telecoms, which are facing about 40 pending lawsuits, believe they are protected by a separate law that says companies that give communications data to the government cannot be sued for doing so if they were obeying a warrant — or a certification from the attorney general that a warrant was not needed — and all federal statutes were being obeyed.

To defend themselves, the companies must be able to show they cooperated and produce that certification. But the White House does not want the public to see the documents, since it seems clear that the legal requirements were not met. It is invoking the state secrets privilege — saying that as a matter of national security, it will not confirm that any company cooperated with the wiretapping or permit the documents to be disclosed in court.

So Mr. Rockefeller and other senators want to give the companies immunity even if the administration never admits they were involved. This is short-circuiting the legal system. If it is approved, we will then have to hope that the next president will be willing to reveal the truth.

Mr. Rockefeller argues that companies might balk at future warrantless spying programs. Imagine that!

This whole nightmare was started by Mr. Bush’s decision to spy without warrants — not because they are hard to get, but because he decided he was above the law. Discouraging that would be a service to the nation.

This debate is not about whether the United States is going to spy on Al Qaeda, it is about whether it is going to destroy its democratic principles in doing so. Senators who care about that should vote against immunity.

Immunity means the U.S. government having full reign to target people for their political views, creating a climate subverting the 1st Amendment via subverting the 4th Amendment of the U.S. Constitution.

Thursday, February 07, 2008

U.S. Congress to Empower Criminal Apostate Shadow Government to Target Dissidents, Subverting the 1st Amendment via Subverting the 4th Amendment

Will Congress Vote "Yes" to More Bush Spying?

By Ari Melber, The Nation. Posted February 6, 2008.

As the country focuses on the primaries, the Senate is poised for a FISA vote

This week Americans face a profound choice -- and it has nothing to do with the presidential election.

The Senate is about to vote on legislation, favored by President Bush, to strip American courts of their authority to supervise massive government surveillance. The Senate intelligence bill sidelines the U.S. intelligence court, established by a 1978 law, and grants Bush new spying powers. Under the proposal, the Administration merely needs to "certify" it will not abuse them.

Of course, Bush already has abused his spying powers. He conceded in 2005 that the Administration conducted massive surveillance without the warrants required by law. A judge resigned in protest; Bush's former attorney general, his deputy attorney general and the FBI director also threatened to resign; and one federal court found the warrantless spying illegal.

Yet the Senate's legislation fails to confront that history. Instead, Democratic leaders are poised to validate Bush's illegal surveillance -- giving even more ground than the Republican Congress ever did. Worse, the current bill would cover up Bush's abuse by granting retroactive amnesty to telecommunications companies accused of breaking the law, even if the people involved acted knowingly or maliciously.

The retroactive amnesty proposal is so extreme, in fact, it is hard to fathom how Congress, as a law-making body, can advance this blatantly lawless approach. This amnesty makes presidential pardons look tough. While pardons save convicted felons from jail, a controversial tack, they still require a full public trial. Retroactive amnesty just squashes entire cases. No investigation. No judicial fact-finding. And the public gets no information about these alleged crimes at the highest levels of American government and business. What if the spying was abused to distort elections or pad corporate profits? The bill would keep the public in the dark.

The intelligence bill is not just unpalatable; it is indefensible on the facts. That may be why the Senate is pushing the bill now, during the distractions of the busiest week in presidential politics. (The ACLU, MoveOn and liberal bloggers have also been fighting the bill, causing some delays and fortifying efforts by Senators Feingold and Dodd to amend it this week.) The Administration has also savaged the facts to bolster a weak hand. Bush officials have mischaracterized the bill, impugned the security credentials of their opponents and threatened to veto a temporary version so they could blame any ensuing intelligence problems on Democrats.

Bush's bad faith nearly derailed everything, because his veto threat enraged the bill's chief sponsor, Senator Jay Rockefeller, a Bush ally on intelligence issues. Last week, in a showdown on the Senate floor, the normally mild-mannered Rockefeller even accused the White House of "political terrorism." Then Bush buckled, signing a temporary measure despite his veto threats, while reiterating his demand for amnesty in a final bill. Jacob Sullum, a conservative writer for the libertarian Reason magazine, described it as "the latest in a series of Bush administration reversals and self-contradictions" on intelligence legislation. "If the president and his men can't even get their public story about warrantless surveillance straight, how can we trust them to secretly exercise the unilateral powers they are seeking?" he asked.

We can't. And it's not just Bush, who has little time to exercise these unfettered powers, anyway. Spying abuse has bipartisan roots, from Democratic administrations infiltrating the anti-war movement to Nixon taping everyone from John Kerry to his own aides.

Surveillance is only more crucial and ubiquitous now, in an asymmetric war with elusive non-state actors. The core issue is whether Congress will ensure that our government conducts surveillance the American way, with oversight by American courts and public accountability for anyone who would exploit security concerns for illicit ends.

Proponents of warrantless surveillance like to say that "you have no problem if you have nothing to hide." Put aside the unconstitutional premise about individual rights, though, and that dare works in the other direction. Congress can confront Bush with a similar imperative: court oversight is no problem for you or the telecommunication companies, as long as you have nothing to hide.


See more stories tagged with: warrantless wiretapping, spying, fisa

Ari Melber is a regular contributor to The Nation magazine and writer for The Nation's Campaign '08 blog, and a contributing editor at the Personal Democracy Forum. He served as a Legislative Aide in the U.S. Senate and was a national staff member of the 2004 John Kerry Presidential Campaign.

Wednesday, February 06, 2008

U.S. Pentagon Seeks to Subvert Internet Free Speech

Pentagon: The internet needs to be dealt with as if it were an enemy "weapons system".

by Brent Jessop

Global Research, February 2, 2008

Information Operation Roadmap Part 3 The Pentagon's Information Operations Roadmap is blunt about the fact that an internet, with the potential for free speech, is in direct opposition to their goals. The internet needs to be dealt with as if it were an enemy "weapons system".

The 2003 Pentagon document entitled the Information Operation Roadmap was released to the public after a Freedom of Information Request by the National Security Archive at George Washington University in 2006. A detailed explanation of the major thrust of this document and the significance of information operations or information warfare was described by me here.

Computer Network Attack

From the Information Operation Roadmap:

"When implemented the recommendations of this report will effectively jumpstart a rapid improvement of CNA [Computer Network Attack] capability." - 7

"Enhanced IO [information operations] capabilities for the warfighter, including: ... A robust offensive suite of capabilities to include full-range electronic and computer network attack..." [emphasis mine] - 7

Would the Pentagon use its computer network attack capabilities on the Internet?

Fighting the Net

"We Must Fight the Net. DoD [Department of Defense] is building an information-centric force. Networks are increasingly the operational center of gravity, and the Department must be prepared to "fight the net." " [emphasis mine] - 6

"DoD's "Defense in Depth" strategy should operate on the premise that the Department will "fight the net" as it would a weapons system." [emphasis mine] - 13
It should come as no surprise that the Pentagon would aggressively attack the "information highway" in their attempt to achieve dominance in information warfare. Donald Rumsfeld's involvement in the Project for a New American Century sheds more light on the need and desire to control information.

PNAC Dominating Cyberspace

The Project for a New American Century (PNAC) was founded in 1997 with many members that later became the nucleus of the George W. Bush administration. The list includes: Jeb Bush, Dick Cheney, I. Lewis Libby, Donald Rumsfeld, and Paul Wolfowitz among many other powerful but less well know names. Their stated purpose was to use a hugely expanded U.S. military to project "American global leadership." In September of 2000, PNAC published a now infamous document entitled Rebuilding America's Defences. This document has a very similar theme as the Pentagon's Information Operations Roadmap which was signed by then Secretary of Defense Donald Rumsfeld.

From Rebuilding America's Defenses:
"It is now commonly understood that information and other new technologies... are creating a dynamic that may threaten America's ability to exercise its dominant military power." [emphasis mine] - 4

"Control of space and cyberspace. Much as control of the high seas - and the protection of international commerce - defined global powers in the past, so will control of the new "international commons" be a key to world power in the future. An America incapable of protecting its interests or that of its allies in space or the "infosphere" will find it difficult to exert global political leadership." [emphasis mine] - 51

"Although it may take several decades for the process of transformation to unfold, in time, the art of warfare on air, land, and sea will be vastly different than it is today, and "combat" likely will take place in new dimensions: in space, "cyber-space," and perhaps the world of microbes." [emphasis mine] - 60
For more on Rebuilding America's Defences read this.

Internet 2

Part of the Information Operation Roadmap's plans for the internet are to "ensure the graceful degradation of the network rather than its collapse." (pg 45) This is presented in "defensive" terms, but presumably, it is as exclusively defensive as the Department of Defense.

As far as the Pentagon is concerned the internet is not all bad, after all, it was the Department of Defense through DARPA that gave us the internet in the first place. The internet is useful not only as a business tool but also is excellent for monitoring and tracking users, acclimatizing people to a virtual world, and developing detailed psychological profiles of every user, among many other Pentagon positives. But, one problem with the current internet is the potential for the dissemination of ideas and information not consistent with US government themes and messages, commonly known as free speech. [emphasis FSBUSHS] Naturally, since the plan was to completely dominate the "infosphere," the internet would have to be adjusted or replaced with an upgraded and even more Pentagon friendly successor.

In an article by Paul Joseph Watson of Prison, he describes the emergence of Internet 2.
"The development of "Internet 2" is also designed to create an online caste system whereby the old Internet hubs would be allowed to break down and die, forcing people to use the new taxable, censored and regulated world wide web. If you're struggling to comprehend exactly what the Internet will look like in five years unless we resist this, just look at China and their latest efforts to completely eliminate dissent and anonymity on the web."


The next article will examine the Pentagon's use of psychological operations or PSYOP and the final article in this series will examine whether or not there are any limits to using information operations on the American public or foreign audiences.

Brent Jessop is a frequent contributor to Global Research. Global Research Articles by Brent Jessop

Monday, February 04, 2008

U.S. F.B.I. Seeks Tools For Dissident Tracking

From Kelli Arena and Carol Cratty
Decrease font Decrease font
Enlarge font Enlarge font

CLARKSBURG, West Virginia (CNN) -- The FBI is gearing up to create a massive computer database of people's physical characteristics, all part of an effort the bureau says to better identify criminals and terrorists.


The FBI wants to use eye scans, combined with other data, to help identify suspects.

Click to view previous image
1 of 3
Click to view next image

But it's an issue that raises major privacy concerns -- what one civil liberties expert says should concern all Americans.

The bureau is expected to announce in coming days the awarding of a $1 billion, 10-year contract to help create the database that will compile an array of biometric information -- from palm prints to eye scans.

Kimberly Del Greco, the FBI's Biometric Services section chief, said adding to the database is "important to protect the borders to keep the terrorists out, protect our citizens, our neighbors, our children so they can have good jobs, and have a safe country to live in."

But it's unnerving to privacy experts.

"It's the beginning of the surveillance society where you can be tracked anywhere, any time and all your movements, and eventually all your activities will be tracked and noted and correlated," said Barry Steinhardt, director of the American Civil Liberties Union's Technology and Liberty Project.

The FBI already has 55 million sets of fingerprints on file. In coming years, the bureau wants to compare palm prints, scars and tattoos, iris eye patterns, and facial shapes. The idea is to combine various pieces of biometric information to positively identify a potential suspect.

A lot will depend on how quickly technology is perfected, according to Thomas Bush, the FBI official in charge of the Clarksburg, West Virginia, facility where the FBI houses its current fingerprint database. Video Watch what the FBI hopes to gain »

"Fingerprints will still be the big player," Bush, assistant director of the FBI's Criminal Justice Information Services Division, told CNN.

But he added, "Whatever the biometric that comes down the road, we need to be able to plug that in and play."

First up, he said, are palm prints. The FBI has already begun collecting images and hopes to soon use these as an additional means of making identifications. Countries that are already using such images find 20 percent of their positive matches come from latent palm prints left at crime scenes, the FBI's Bush said.

The FBI has also started collecting mug shots and pictures of scars and tattoos. These images are being stored for now as the technology is fine-tuned. All of the FBI's biometric data is stored on computers 30-feet underground in the Clarksburg facility.

In addition, the FBI could soon start comparing people's eyes -- specifically the iris, or the colored part of an eye -- as part of its new biometrics program called Next Generation Identification.

Nearby, at West Virginia University's Center for Identification Technology Research, researchers are already testing some of these technologies that will ultimately be used by the FBI.

"The best increase in accuracy will come from fusing different biometrics together," said Bojan Cukic, the co-director of the center.

But while law enforcement officials are excited about the possibilities of these new technologies, privacy advocates are upset the FBI will be collecting so much personal information.

"People who don't think mistakes are going to be made I don't think fly enough," said Steinhardt.

He said thousands of mistakes have been made with the use of the so-called no-fly lists at airports -- and that giving law enforcement widespread data collection techniques should cause major privacy alarms.

"There are real consequences to people," Steinhardt said. Video Watch concerns over more data collection »

You don't have to be a criminal or a terrorist to be checked against the database. More than 55 percent of the checks the FBI runs involve criminal background checks for people applying for sensitive jobs in government or jobs working with vulnerable people such as children and the elderly, according to the FBI.

The FBI says it hasn't been saving the fingerprints for those checks, but that may change. The FBI plans a so-called "rap-back" service in which an employer could ask the FBI to keep the prints for an employee on file and let the employer know if the person ever has a brush with the law. The FBI says it will first have to clear hurdles with state privacy laws, and people would have to sign waivers allowing their information to be kept.

Critics say people are being forced to give up too much personal information. But Lawrence Hornak, the co-director of the research center at West Virginia University, said it could actually enhance people's privacy.

"It allows you to project your identity as being you," said Hornak. "And it allows people to avoid identity theft, things of that nature." Video Watch Hornak describe why he thinks it's a "privacy enhancer" »

There remains the question of how reliable these new biometric technologies will be. A 2006 German study looking at facial recognition in a crowded train station found successful matches could be made 60 percent of the time during the day. But when lighting conditions worsened at night, the results shrank to a success rate of 10 to 20 percent.

As work on these technologies continues, researchers are quick to admit what's proven to be the most accurate so far. "Iris technology is perceived today, together with fingerprints, to be the most accurate," said Cukic.

But in the future all kinds of methods may be employed. Some researchers are looking at the way people walk as a possible additional means of identification.

The FBI says it will protect all this personal data and only collect information on criminals and those seeking sensitive jobs.


The ACLU's Steinhardt doesn't believe it will stop there.

"This had started out being a program to track or identify criminals," he said. "Now we're talking about large swaths of the population -- workers, volunteers in youth programs. Eventually, it's going to be everybody." E-mail to a friend E-mail to a friend

All About Privacy RightsInformation PrivacyFederal Bureau of Investigation

  • Share this on:
  • E-mail
  • Save
  • Print

Friday, February 01, 2008

G.W. Bush and Mormon Hierarchy Silence 911 Researcher

According to Christopher Bollyn – Rumor Mill News January 29, 2008

user posted image

9/11: Bush Was Behind Silencing of Dr. Steven E. Jones on Thermite

Christopher Bollyn – Rumor Mill News January 29, 2008

When I met with 9-11 researcher and scientist Professor Steven E. Jones at Brigham Young University in the winter and spring of 2006, I tried to impress upon him that there were people in the 9-11 movement who were dangerous and who were not at all interested in finding the truth about what happened on September 11, 2001. The 9-11 movement was infested with agents, as one should expect.

I also told him we were in very real danger for exposing and speaking about the lies of 9-11. My wife and I knew that we were being monitored by the FBI at my home in Illinois. For this reason we were very reluctant to even visit our home. I told Jones and others about this threat that I had discovered in the summer of 2005.

user posted image
Bollyn and Jones

I visited Professor Jones twice in Provo on the campus of BYU, in March and June of 2006. Jones and I discussed his research on the use of Thermite in the World Trade Center and I tried to merge his thesis with the data from the U.C. Davis DRUM, which measured the particles in the smoke rising from the rubble from October until late December 2001.

This was a very successful exchange of information which proved conclusively that the temperatures the existed at the bottom of the rubble pile were higher than the BOILING point of steel. These super-intense and quite unnatural fires persisted beneath the pile for more than three months. They produced nano-size particles of the metals and elements that were burning.

Think about that for a minute.

In mid-August 2006, I was attacked at my house by a three-man undercover tactical unit of the Hoffman Estates Police Dept. These three men, trained by the U.S. military as MPs in the Gulf War era, quickly assaulted me and broke my right elbow and TASERed me - for no reason except to torture and injure me.

In typical Chicago style, I was then charged with assaulting the police. A malicious prosecution followed and I was found guilty by a jury which obviously believed the very obvious lies of the three thugs who attacked me and one extremely corrupt witness.

Shortly after the brutal attack by HEPD officers Michael Barber, Timothy Stoy, and Darin Felgenhauer, I was invited to speak in Salt Lake City. In early September 2006, I drove out to Utah with my family since I had been told to stay away from the American Free Press conference in Washington on the Labor Day weekend.

Michael Piper of AFP had insisted that I not be allowed to speak at the conference, so Willis A. Carto had told me to stay away from the conference.

In early September, the Salt Lake City affiliate of NPR had done an interview with Steven Jones, which was designed to make him look anti-Semitic. Although he said nothing that could be construed in any way to be anti-Semitic, the people who followed Jones in the show accused him of using "code language," which they said clearly showed that he was an anti-Semite.

Within a day or two, Jones was suspended from his teaching duties at BYU and put on suspension pending a peer review of his thesis. The peer review never happened. Jones was given terms of resignation and took them. The much awaited examination of his thesis never occurred.

Mormon friends of mine told me that President Bush had visited the elders of the church shortly before Jones was framed by the NPR affiliate at the University of Utah. One of the subjects of the meeting, I was told, was how to silence Professor Jones.

Today, on the passing of the head of the Mormon church, a photo of the meeting between President Bush and the church elders is on-line.

user posted image

President Bush ® holds a crisis meeting with the leadership of the Church of Jesus Christ of Latter-day Saints to discuss what to do to silence the honest professor, Steven E. Jones of BYU who was actively exposing the lies of 9-11 by proving scientifically that Thermite had been used to cut the core columns and bring down all three towers at the World Trade Center on 9-11.

In this meeting with church president Gordon B. Hinckley (L) in Salt Lake City, Utah on August 31, 2006, it was evidently decided that Jones would be smeared as an anti-Semite and removed from his teaching position. Less than one week after this meeting, Jones was removed from his teaching position in Provo.

George W. Bush is related to Joseph Smith, the founder of the Mormon church.

Christopher Bollyn is an independent journalist and historian known for his in-depth research articles about 9-11, the dangers of TASERs and depleted uranium, electronic vote fraud, and other under-reported issues of the day.

To support his research efforts, please send a donation by PayPal using one of his email addresses:

A Different View of Christopher Bollyn