Aletho News

ΑΛΗΘΩΣ

Obama picks official who approved of dragnet NSA surveillance to head FBI

RT | June 21, 2013

e1d59-showpicturePresident Barack Obama announced Friday afternoon that he’s selected James Comey to head the Federal Bureau of Investigation.

Comey, 52, worked as the deputy attorney general for the United States under President George W. Bush and will replace outgoing FBI Director Robert Mueller when he steps down later this year after he is confirmed by the Senate.

All three men were on hand at the White House Friday afternoon when President Obama formally made his pick after weeks of speculation suggested Comey would be the likely nominee.

Comey, said Obama, embodies the “core principals of fidelity, bravery and integrity” expected of FBI agents and applauded “his fierce independence and his deep integrity.”

In fact, that independence is the focus of perhaps the most widely reported instance from the Bush White House involving Comey. While serving as deputy attorney general in the Department of Justice, Comey rejected the administration’s warrantless wiretapping program that has recently reemerged as the center of controversy.

“In a confrontation he has called the most difficult night of his career, [Comey] rushed to the hospital bedside of his boss, John Ashcroft, in 2004 to stop two senior Bush White House aides from getting the ailing attorney general’s approval to reauthorize a post-9/11 program that allowed government wiretaps to be used without warrants,” the Associated Press recalled this week.

Comey’s insistence in keeping the program off the books was made notwithstanding an earlier decision to favor the surveillance program, though. Glenn Greenwald reported for The Guardian last month that Comey “approved a legal memorandum in 2004 endorsing radical executive power theories and warped statutory interpretations, concluding that the Bush NSA warrantless eavesdropping program was legal, thus making it more difficult to prosecute the Bush officials who ordered it.”

The internal conflict within the administration that erupted years later over that program almost led to Comey, Ashcroft and Mueller offering their resignation, apparently. As Greenwald noted, though, the then-deputy attorney general declined to follow up on his threat after slight adjustments were made to the NSA spy program.

“But the reason they didn’t end up resigning ,” he wrote, “was because Bush officials ‘modified’ that NSA program into something those lawyers could and did endorse: the still-illegal, still-radical NSA eavesdropping program that spied on the communications of Americans without warrants and in violation of the law.”

Those practices have come under question in recent weeks after Edward Snowden, a 29-year-old former intelligence contractor, leaked documents showing the size and scope of the surveillance programs. Mr. Mueller said those disclosures caused “significant harm” to the nation’s security and that the admitted leaker is the “subject of an ongoing criminal investigation.”

“One of the great vulnerabilities terrorists understand is their communications,” Mueller told the House Judiciary Committee last week. “If we lose our ability get their communications, we are going to be exceptionally vulnerable.”

After being picked by Pres. Obama to replace Mueller on Friday, Comey said, “I don’t know whether I can fill those shoes.” Mueller was FBI chief for 12 years, making him the second-longest serving official to ever head the bureau.

June 22, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite | , , , , , , | Leave a comment

Spying by the Numbers

By BILL QUIGLEY | CounterPunch | June 20, 2013

Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying.  There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.

Hundreds of Thousands Subject to Government Surveillance

The first reality is that hundreds of thousands of people in the US have been subject to government surveillance in each of the last few years. Government surveillance of people in the US is much more widespread than those in power want to admit.   In the last three years alone about 5000 requests have been granted for complete electronic surveillance authorized by the secret FISA court.  The FBI has authorized another 50,000 surveillance operations with National Security Letters in the last three years.  The government admits that well over 300,000 people have had their phone calls intercepted by state and federal wiretaps in the last year alone.  More than 50,000 government requests for internet information are received each year as reported by internet providers. And, remember, these are the publicly reported numbers so you can be confident there is a whole lot more going on which has not been publicly reported.

Courts Almost Never Deny Government Requests for Surveillance

The second reality is that there is little to no serious oversight or accountability by the courts of this surveillance.  Government spy defenders keep suggesting the courts are looking carefully and rigorously at all this and only letting a tiny number of really bad people be spied on.  Not true.  Despite thousands of requests by the federal government to look deeply into people’s lives, the secret federal FISA court turned down no requests at all in the last three years.  The state and federal courts report on wiretap applications document over 2000 applications annually for surveillance which authorize the interception of hundreds of thousands of calls and emails.  The courts have turned down the government two times in the most recent report.  FBI national security letters do not even have to be authorized by a court at all.  The lack of Congressional oversight is plain to see but the lack of any judicial review of many of these surveillance actions and the very weak oversight where courts do review should concern anyone who cares about government accountability.

Let’s break down the surveillance by the authority for spying.

In FISA Court Government Always Wins  

The US government has tried to say the public should not worry about government scooping up hundreds of millions of phone calls and internet activities because no real information is disclosed unless it is authorized by what is called the FISA court.  Therefore, you can trust us with this information.

The FISA Court, actually called the Foreign Intelligence Surveillance Court, is made up of ten federal judges who deliberate and decide in secret whether the government can gather and review millions of phone and internet records.  This court, though I know and respect several of its members, cannot, be considered an aggressive defender of constitutional rights and civil liberties.

Government lawyers go to these FISA judges in secret.  Government lawyers present secret evidence in secret proceedings with no defense lawyer or public or press allowed and asks for secret orders allowing the government to secretly spy on people.  Its opinions are secret.  The part the public knows is a one paragraph report which is made every year of the number of applications and the number of denials by the court.

What is worse is that the judges in this secret court never turn the secret government lawyers down.

Over the last three years, the government has made 4,976 requests to the secret FISA court for permission to conduct electronic surveillance for foreign intelligence purposes. But the really big FISA number is zero.  Zero is the number of government requests to conduct electronic surveillance the FISA court has turned down in the last three years.

In 2012, the government asked for permission from the judges of the secret Foreign Intelligence Surveillance Court (FISA) 1,789 times to conduct electronic surveillance for foreign intelligence purposes.  There were zero denials.  One time the government withdrew its request.

In 2011, the government asked FISA judges 1,676 times to conduct electronic surveillance for foreign intelligence services.  There were zero denials.  The government withdrew two requests.

In 2010, the government asked FISA judges 1,511 times to conduct electronic surveillance for foreign intelligence purposes.  There were zero denials.  The government withdrew five requests.

Not a bad record, huh?  Nearly five thousand victories for those who want surveillance powers and no defeats is a record that should concern everyone who seeks to protect civil liberties.

FBI National Security Letters Scoop Up Information No Court Approval Even Needed

With a NSL letter the FBI can demand financial records from any institution from banks to casinos, all telephone records, subscriber information, credit reports, employment information, and all email records of the target as well as the email addresses and screen names for anyone who has contacted that account.  The reason is supposed to be for foreign counterintelligence.  There is no requirement for court approval at all.  The Patriot Act has made this much easier for the FBI.

According to Congressional records, there have been over 50,000 of these FBI NSL requests in the last three years.  This does not count the numerous times where the FBI persuades the disclosure of information without getting a NSL.  Nor does it count FBI requests made just to find out who an email account belongs to.

These reported NSL numbers also do not include the very high numbers of administrative subpoenas issued by the FBI which only require approval of a member of the local US Attorney’s office.

In 2012, the FBI issued 15,229 national security letter requests for information concerning US citizens.

In 2011, the FBI made 16,511 national security letter requests for information concerning US persons.

In 2010, the FBI made 24,287 national security letter requests for information on US citizens.

Since there is no court approval needed, there are no denials.  The NSL record is even better than the FISA record at 56,027 wins and no losses for Team Surveillance.

Thousands of Wiretaps Each Impacting Over One Hundred People Authorized Two Denied

According to the latest report to Congress by the US Courts, there were 2,732 applications for wiretaps submitted to all federal and to half of the state courts in 2011.  Half the states did not report on their numbers, so these numbers are certainly quite much too low.  Also, the term wiretap is out of date as this process currently covers providing information on conventional phone lines, cell phones, secret microphones, texts, fax, paging, and email computer transmissions.

For the year 2011, out of 2,732 applications, only two were denied.  Two losses out of 2700 tries is a comparatively poor win loss record for the surveillance folks.

On average, each wiretap intercepted the communications of 113 people, thus over three hundred thousand people had their calls intercepted.

The most prevalent reason reported for the wiretaps was drug offenses.  The average length of the wiretap was 42 days.  One federal wiretap in Michigan resulted in intercepting over 71,000 cellular messages extending over 202 days.  A New York state wiretap intercepted 274,210 messages over 564 days.

 Company Reports on Spying Show Tens of Thousands of Requests

It is well known that user accounts at Google, Apple and others contain a treasure trove of information on the customer’s basic information including searches, likes and dislikes, purchases, friends, and the like.  Government investigators seek this information tens of thousands times each year as the reports from the companies show.

Apple reported receiving 4,000 to 5,000 government requests for information on customers in just the last six months.  From December 1, 2012 to May 31, 2013 Apple received law enforcement requests for customer data on 9-10,000 accounts or devices.  Most of these requests are from police for robberies, missing children, etc.

Facebook reported that in a six month period ending December 31, 2012, it received between 9,000 and 10,000 requests from the US government for user data on 18,000 to 19,000 accounts.

Google reported it received over 15,000 requests for data by US government officials in 2012 for information on over 30,000 accounts.  It produced some data 88% of the time.

Microsoft (including Skype) reported 75,378 law enforcement requests for information on 137,424 accounts world-wide for the year 2012.  In over 11,000 cases, they could find no data to respond to the requests.  Microsoft disclosed non-content information in 56,388 cases, mostly to the US, UK, Turkey, Germany and France. In the US, Microsoft received 11,073 requests from law enforcement for information on 24,565 accounts.  Microsoft rejected 759 requests or 6.9% on legal grounds.  Microsoft provided user content in 1544 cases and subscriber/transactional data in 7,196 cases.

Yahoo said that in the last six months of 2012 it received between 12,000 and 13,000 requests for user data from law enforcement.

In a democracy, transparency and public participation are critical.  This is not just about “the terrorists.”  This is about civil liberty and government accountability.  Hundreds of thousands of people are being spied upon every year by our own government’s public admissions.  There is little oversight by judges and even less by Congress.  If the government admits this much, you can certainly assume there is more to come out.  It is time to wake up.  These secret subpoenas and secret courts and secret processes should be abolished or fundamentally changed.  Otherwise, change the slogan on the dollar to “In Secrecy We Trust.”

Bill Quigley is a human rights lawyer and law professor at Loyola University New Orleans College of Law.  Bill also works with the Center for Constitutional Rights.  A longer version of this article with full sources is available.  You can reach Bill at quigley77@gmail.com

June 20, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular | , , , , , , , | Leave a comment

US Muslim man sues FBI over months of torture abroad

Press TV – June 2, 2013

An American Muslim man has sued the US Federal Bureau of Investigation (FBI) and the State Department over the claim that he was subjected to torture at their behest while being held abroad.

On Thursday, Yonas Fikre, a Sudanese man of Eritrean descent, filed a lawsuit in US District Court in Oregon seeking USD 30 million in compensation as well as injunctions to prevent the US government from treating anyone else the way he was treated.

The plaintiff says that the FBI took an interest in him in 2009, when he decided to move from Portland, Oregon, to Sudan in order to open an electronics retail business in the North African country.

In April 2010, Fikre was summoned to the US embassy in Khartoum by a man claiming to be an official requiring advice on “how Americans might stay safe during a period of political turmoil in Sudan.”

Upon arrival, he was ushered into a small room and interrogated by FBI agents David Noordeloos and Jason Dundas for information on worshippers at Portland’s largest mosque, Masjid al-Saber.

The agents sought to recruit Fikre as an informant at the mosque, and were angered when he refused.

Fikre left Sudan in June 2010 and arrived in the United Arab Emirates in September 2010, where he obtained a residency permit.

He was apprehended by Emirati police in June 2011, when they “invaded” his house in Abu Dhabi.

Fikre was then incarcerated for 106 days in solitary confinement in a windowless cell, and was beaten repeatedly during the period.

Named in Fikre’s suit are US Attorney General Eric Holder, Secretary of State John Kerry, FBI Director Robert Mueller, FBI Terrorism Screening Center Director Timothy Healy, and FBI agents Noordeloos and Dundas.

Fikre’s story echoes those of Naji Hamdan, Amir Meshal, Sharif Mobley, Gulet Mohamed, as well as Yusuf and Yahya Wehelie.

The six American Muslim men say that, while traveling abroad, they were arrested, questioned, and in some cases abused by local security forces at the behest of the US government.

June 2, 2013 Posted by | False Flag Terrorism, Subjugation - Torture | , , , , , , , , , , , | Leave a comment

FBI shot Todashev in crown of head

Press TV – May 30, 2013

sheidayi20130530171945227Photos shown by the father of Ibragim Todashev, a young man who was killed by FBI agents during investigations into the Boston Marathon bombings, reveal he sustained six gunshot wounds, one in the crown of his head.

27-year-old Todashev was killed by the FBI while he was being questioned about his relationship with Tamerlan Tsarnaev, one of the Boston bombing suspects who was killed by police on April 19.

Law enforcement sources initially said Todashev was armed with a knife and that he “went crazy” brandishing the knife and stabbing an FBI agent. However, unidentified sources said Thursday that Todashev was not armed when the FBI shot him dead.

At a press conference on Thursday in Moscow, Ibragim’s father showed photos of his son’s body which were taken by Ibragim’s friends after the FBI handed the body to them.

“I can show you the photos taken after the killing of my son. I have 16 photographs. I just would like to say that looking at these photos is like being in a movie. I only saw things like that in movies: shooting a person, and then the kill shot. Six shots in the body, one of them in the head,” said Ibragim’s father at the press conference.

On May 22, the day the FBI killed Ibragim, ABC News reported that he was “about to sign a statement” confessing he and Tamerlan Tsarnaev were involved in a 2011 murder of three men in Massachusetts.

However, Ibragim’s father said that his son was questioned twice by the FBI about the Boston Marathon bombings but not about the 2011 murder.

Ibragim’s father also said that his son believed the April 15 Boston attack, in which three people were killed and more than 260 were wounded, was a “set-up.”

Moreover, investigative reporter Ralph Lopez revealed to The Digital Journal on Wednesday that the image released by the FBI as evidence that Tamerlan’s brother left a backpack at the scene of the Boston bombings was made with Photoshop.

May 30, 2013 Posted by | Deception, False Flag Terrorism, Mainstream Media, Warmongering | , , | Leave a comment

What would it take?

Xymphora | May 30, 2013

“Officials: Man who knew Boston bombing suspect was unarmed when shot”

Just to give you a taste of the massive and elaborate lying involved, here’s the original reporting:  “FBI agent fatally shoots man with suspected ties to Boston Marathon bomber: authorities” (my emphasis throughout in red):

“An FBI agent fatally shot a Florida man this morning, after questioning him about ties to Boston Marathon bomber Tamerlan Tsarnaev, authorities said.
Feds, two Massachusetts state troopers and investigators from other agencies were questioning Ibragim Todashev, 27, shortly after midnight when he suddenly pulled a knife and stabbed an FBI agent, law enforcement sources told The Post.
It wasn’t immediately clear if the stabbed FBI agent was the same one who shot and killed Todashev. The wounded FBI agent was taken to the hospital and he was expected to survive his wounds, officials said.

Also!: “Source: Friend of bombing suspect attacked agent with sword“:

“FOX 25’s Bob Ward was told by a confidential informant that the man, who was killed while being questioned by FBI agents in Florida, was in the process of confessing to a triple murder that occurred in Waltham when he suddenly attacked an agent with a sword.

During the interview, investigators took notes and everything appeared to be going well. Eventually, Todashev was asked to write down, in his own handwriting and in his own words, what he had been telling authorities about his role in the murders when in the words of one source – all hell broke loose.

Todashev allegedly began writing, but then flipped a table over, knocking the Boston FBI agent into the wall hitting his head.

FOX 25’s Bob Ward was told the agent looked up to see Todashev waving in his direction what was described as a Banzai ceremonial sword.

Fearing for his life, the FBI agent drew his weapon and fatally shot Todashev. The entire incident taking only seconds.”

There is an attempt to make this seem less outrageous by repeating the story that Todashev was just about to sign a confession implicating himself and Tamerlan Tsarnaev in the Waltham killings:

Todashev became violent as he was signing a written statement based on his confession to the triple murder and attacked the agent with a knife, according to the FBI.”

But note:

But sources say during questioning Tuesday night, Todashev implicated himself and Tamerlan Tsarnaev in the killings. As investigators pushed at him towards a confession, he snapped, reported Orr.”

There’s a big difference between the usual police haranguing towards a confession (which means no confession), and having a written confession ready for him to sign, just as there is a difference between a knife wound which sends an agent to hospital (where ‘he was expected to survive his wounds’!!!), and no wound and no weapon.  The lies are simply too specific and detailed to be mistakes or slips.

Atlantic Wire on the Murder of Ibragim Todashev”

Seven times?!! (note the headline disparages the story by attributing it up front to one of those dastardly ‘Islamic groups’, and the article disparages the photograph by emphasizing its source):  “Islamic group: Slain man was unarmed, shot by FBI agent 7 times”:

“An Islamic group Wednesday called for a federal civil-rights investigation of last week’s fatal shooting of an Orlando man by an FBI agent investigating his connection to the Boston Marathon bombing suspects.

And the Tampa director of that group said not only was 27-year-old Ibragim Todashev unarmed when he was shot by the agent May 22, he was hit seven times, including once in the head.

. . .

At a news conference Wednesday evening, Shibly showed what he said were photos of Todashev’s body after the shooting. The photos were taken at an Orlando funeral home after the Orange-Osceola County Medical Examiner’s office released the body to Todashev’s next of kin, he said.

The photographer was Khusen Taramov — a friend of Todashev’s who lives in Kissimmee — and photos show at least a dozen wounds, although some may have been exit wounds, Shibly said.”

The claim that one shot was to the ‘back of the head’ somehow didn’t make it into all of the stories.

I’m reading a lot of the usual nonsense of the supposed mental and psychological problems of conspiracy theorists, but I would like to ask a question of the Official Story believers.  What would it take for you to entertain the notion that there might be a conspiracy here?  Is there any set of facts of official wrongdoing that might cause you to have even the slightest doubt about what you are being told by official sources?  If there is no possible set of facts which would cause you to start to have doubts, you have a serious mental and psychological problem of needing to believe what your ‘betters’ tell you.

May 30, 2013 Posted by | Civil Liberties, Deception, Mainstream Media, Warmongering | , , , , , | Leave a comment

The Government Wants A Backdoor Into Your Online Communications

By Mark M. Jaycox and Seth Schoen | EFF | May 22, 2013

According to the New York Times, President Obama is “on the verge of backing” a proposal by the FBI to introduce legislation dramatically expanding the reach of the Communications Assistance for Law Enforcement Act, or CALEA. CALEA forces telephone companies to provide backdoors to the government so that it can spy on users after obtaining court approval, and was expanded in 2006 to reach Internet technologies like VoIP. The new proposal reportedly allows the FBI to listen in on any conversation online, regardless of the technology used, by mandating engineers build “backdoors” into communications software. We urge EFF supporters to tell the administration now to stop this proposal, provisionally called CALEA II.

The rumored proposal is a tremendous blow to security and privacy and is based on the FBI’s complaint that it is “Going Dark,” or unable to listen in on Internet users’ communications. But the FBI has offered few concrete examples and no significant numbers of situations where it has been stymied by communications technology like encryption. To the contrary, with the growth of digital communications, the FBI has an unprecedented level of access to our communications and personal data; access which it regularly uses. In an age where the government claims to want to beef up Internet security, any backdoors into our communications makes our infrastructure weaker.

Backdoors also take away developers’ right to innovate and users’ right to protect their privacy and First Amendment-protected anonymity of speech with the technologies of their choice. The FBI’s dream of an Internet where it can listen to anything, even with a court order, is wrong and inconsistent with our values. One should be able to have a private conversation online, just as one can have a private conversation in person.

The White House is currently debating whether or not to introduce the bill. Here’s why it shouldn’t:

There’s Little Darkness: Few Investigations Have Been Thwarted

The starting point for new legislation should be a real, serious, and well-documented need. Despite the FBI’s rhetoric, there are few concrete examples of the FBI’s purported need to expand its already efficient all-seeing eye. Current law requires annual reporting by the Department of Justice (DOJ) regarding the use of the government’s wiretapping powers; the report includes statistics on how often Federal law enforcement has been impeded in a court-authorized investigation by encryption or has been unable to access communications. These statistics show that this has happened only rarely. In its most recent report—from 2010—DOJ reported that encryption had only been encountered all of 12 times.

Did the encryption stop the investigation, or even prevent the wiretappers from figuring out what was being said? No. The report admits that in all of these instances, police were able to obtain the plain text of communications. Previous years’ numbers are similar. Aside from government reports, in 2012 telecommunications companies also revealed that a very low percentage of law enforcement requests for user information were rejected. In AT&T’s case, only 965 out of over 250,000 requests for user information were rejected. Overall, the available public statistics don’t appear to support the FBI’s claims about its inability to access communications.

Law Enforcement Already Has Unprecedented Access

Any requested expansion of FBI surveillance authority has to consider the overall ability of law enforcement to investigate crimes. What the FBI doesn’t mention when pushing new backdoors into our communications is that now, due to the shift to digital communications, law enforcement has an unprecedented level of access to, and knowledge of, the public’s communications, relationships, transactions, whereabouts, and movements. Law enforcement now can gain 24/7 monitoring of most people’s movements using cell phone location data. But that’s just the beginning. A glance at the Wall Street Journal‘s multi-year What They Know project shows some of the treasure troves of data that are being maintained about all of us. By accessing these databases and by using new electronic surveillance technologies law enforcement already has visibility into almost every aspect of our online and offline lives—capabilities beyond the wildest dreams of police officers just a few decades ago.

Indeed, former White House Chief Counselor for Privacy Peter Swire and Kenesa Ahmad argued persuasively in 2011 that, overall, “today [is] a golden age for surveillance“—regardless of whether law enforcement is assured of automatic access to each and every kind of communication, and regardless of whether individuals sometimes succeed in using privacy technologies to protect themselves against some kinds of surveillance.

First, there’s information obtained from cell phones. In July 2012, the New York Times reported that federal, state, and local law enforcement officials had requested all kinds of cell phone data—including mappings of suspects’ locations—a staggering 1.3 million times in the previous year. Cell phone companies can create what amounts to detailed maps of our locations and turn them over to law enforcement. Even without asking for cell phone providers’ direct assistance, law enforcement has considerable ability to use mobile devices to track us. Federal and state law enforcement have made extensive use of IMSI catchers (also popularly called “stingrays,” after the brand name of one such device). These devices can act as a fake cell phone tower, observing all devices in a certain area to find a cell phone’s location in real-time, and perhaps even intercept phone calls and texts.

Laws compelling companies to divulge user information accompany these techniques. For instance, National Security Letters, served on communications service providers like phone companies and ISPs, allow the FBI to secretly demand stored data about ordinary Americans’ private communications and Internet activity without any meaningful oversight or prior judicial review. And Section 215 of the PATRIOT Act allows for secret court orders to collect “tangible things” that could be relevant to a government investigation. The list of possible “tangible things” the government can obtain is seemingly limitless, and could include everything from driver’s license records to Internet browsing patterns. The FBI has even broken into individuals’ computers to collect data from inside the computers themselves. More backdoors aren’t needed.

Backdoors Make Us Weaker and More Vulnerable

CALEA II will force companies with messaging services—from Google to Twitter to video game developers—to insert backdoors into their platforms. But backdoors only make us weaker and more vulnerable. It’s ironic that CALEA II may be proposed only months after Congress pushed “cybersecurity” legislation to protect our networks. The notion of mandating backdoors in software is the antithesis of online security, which is why some academics have called it a “ticking time bomb.”

A proposal to expand backdoors into communications software ensures that online hackers, communications company insiders, and nation-states have a direct entrance to attack—and steal from—companies and government agencies. In one notorious example, someone exploited backdoors in a Greek phone company’s systems and recorded sensitive conversations involving the Prime Minister. Wiretapping backdoors even affect national security. In 2012, Wired revealed the NSA’s discovery and concern that every telephone switch for sale to the Department of Defense had security vulnerabilities due to the legally-mandated wiretap implementation. If politicians are serious about online security, they will not make these security blunders even worse by bringing more sensitive communication technologies under CALEA’s scope.

Just last week, an ad hoc group of twenty renowned computer security experts issued a report explaining their consensus that CALEA II proposals could seriously harm computer security. These experts said that a requirement to weaken security with deliberate backdoors “amounts to developing for our adversaries capabilities that they may not have the competence, access or resources to develop on their own.”

And now the Washington Post has reported that intruders, allegedly working on behalf of the Chinese government, broke into Google’s existing surveillance systems. (In this case, the report says that the intruders learned who was targeted by these systems, rather than accessing the contents of the targets’ accounts or communications—but it’s easy to see that wiretap contents would ultimately represent an even bigger target, and a bigger prize. Even more exciting would be the prospect of remotely activating new wiretaps against victims of an intruder’s choice.)

Internet Users Have the Right to Secure Communications

Expanding CALEA is not only a tremendous risk for our online security; it’s a slap in the face of Internet users who want to protect themselves online by choosing privacy-protecting software to shield their communications. Ordinary individuals, businesses, and journalists want and often need state-of-the art software to protect their communications in an era of pervasive spying by commercial rivals, criminals, and governments around the world. The government’s rhetoric takes us back to the early 1990s when US law enforcement spoke openly of banning secure encryption software to keep it out of the public’s hands. EFF and others had to fight—including in the Federal courts—to establish the principle that publishing and using encryption tools is an essential matter of individual freedom and protected by the First Amendment.

Once those “crypto wars” were over, the US government seemed to accept the right of Americans to secure communications and abandon the idea of forcing innovators to dumb down these technologies. We turned our concerns to foreign governments, several of whom were trying to ban communications tools for being “too private.” (For instance, the Associated Press reported five countries threatened to ban BlackBerry services in 2010 because the services protected user privacy too well.) Americans, including the US State Department, began supporting the development and distribution of secure communications tools to foreign rights activists who need them. Now this battle may be coming home.

Even with these tools, most Americans can protect only a tiny fraction of the trail of data we leave behind electronically as we live our lives. But we still have the right to choose them and try our best to keep our private communications private.

CALEA Must Not Come Back

The government should place any proposal to expand CALEA on hold. There is little evidence the FBI is actually “going dark,” especially when balanced with all the new information they have access to about our communications. And backdoors make everyone weaker. In a time when “cybersecurity” is supposed to be a top priority in Washington, the FBI is pushing a scheme that directly undermines everyone’s online security and interferes with both innovation and the freedom of users to choose the technologies that best protect them. Tell the White House now to stop the proposal in its tracks.

May 23, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , | Leave a comment

‘Never in his life’: Father of Tsarnaev’s friend questions FBI slaying of son

RT | May 22, 2013

An FBI agent shot Tamerlan Tsarnaev-linked triple murder suspect Ibragim Todashev in Florida, allegedly after the suspect attacked him with a knife. But Todashev’s father Abdulbaki told RT he strongly doubted his son could attack the agent first.

Following reports that a Chechen man Ibragim Todashev, suspected in a 2011 triple murder in Massachusetts alongside the elder Tsarnaev and questioned about the Boston bombings previously, was shot by an FBI agent during interrogation in Orlando, Florida, RT had a phone conversation with the suspect’s father.

The elder Todashev described his son as “a very calm” man, who wouldn’t become aggressive for no reason.

“Never in his life would he attack anyone unprovoked,” Abdulbaki Todashev stressed.

Abdulbaki, who lives in Grozny, Chechnya, said he was not contacted by anyone from the US, and his only sources about Ibragim’s fate were neighbors citing media agencies.

Having heard the reports that Ibragim was questioned by a group of people, including several policemen, Abdulbaki also said he does not believe he would rush to engage in a one-sided fight.

He explained that his 27-year-old son studied in the Russian city of Saratov, and later in Grozny, but decided to give up his education and move to the US after going on a student internship there.

Ibragim decided to leave for Florida because he “liked America,” Abdulbaki explained, adding he never got to know what occupation, if any, his son had in the US, other than practicing sports.

Abdulbaki said they were not acquainted with the Tsarnaev family at home in Chechnya. Ibragim knew Tamerlan Tsarnaev only because they went to the same gym when he stayed in Boston, he added.

Ibragim “couldn’t take part” in the Boston Marathon bombings as he was undergoing a surgical operation on his tendons in Florida days before the bombings and “had to learn how to walk again,” the father said.

Todashev’s friend Kushen Taramov said he and Ibragim had been interrogated about the bombings earlier this week.

But reports said that on Wednesday the investigators were questioning Todashev over his alleged role in an unsolved 2011 triple homicide in Waltham, Massachusetts, which the bombing suspects Tamerlan and Dzhokhar Tsarnaev have been implicated in, and that he was ready to sign a confession.

Todashev allegedly took out a knife and attacked the FBI agent questioning him, but was shot to death.

Taramov said Ibragim was going to fly back home to Chechnya, but the FBI insisted that he postpone his trip for “one last” interview. Abdulbaki also knew that his son was flying to Grozny on May 24.

May 23, 2013 Posted by | Deception, False Flag Terrorism | , , | Leave a comment

Obama to support Internet wiretapping program

RT | May 08, 2013

United States President Barack Obama is likely to endorse a Federal Bureau of Investigation effort that would ensure all Internet companies in the US provide a way for the government to conduct undetected, backdoor surveillance.

The FBI has been considering solutions to their so-called “Going Dark” problem as intricate methods of encryption and advances in technology have made it increasingly difficult for the federal government and law enforcement to gain access to online communications conducted in the shadows of the Web. Should the latest efforts of the FBI move forward, though, Internet companies that act as any conduit for correspondence of any kind would be heavily fined if they don’t include in their infrastructure a way for the government to eavesdrop on that dialogue in real time.

At a press conference in Washington, DC in March, FBI general counsel Andrew Weissmann said the Department of Justice was determined to have the means to wiretap any online communication by 2014 and called it “a huge priority for the FBI.” Further developments last month revealed that the FBI was considering a fine-based model under which Internet companies would be forced to comply or risk being penalized beyond repair.

On Tuesday, New York Times reporter Charlie Savage cited Obama administration officials as saying the president “is on the verge of backing” that very plan.

Savage explained that while companies would be allowed to operate without giving the government backdoor access, the fees would likely limit the number of entities willing to challenge the order. As RT reported last month, a company that doesn’t comply with the FBI’s orders would be fined $25,000 after 90 days. Additional penalties would then be tacked on every day an Internet service provider, website or other company fails to comply — with the price of the penalty doubling each day they don’t assist investigators.

While the FBI’s original proposal would have required Internet communications services to each build in a wiretapping capacity, the revised one, which must now be reviewed by the White House, focuses on fining companies that do not comply with wiretap orders,” wrote Savage. “The difference, officials say, means that start-ups with a small number of users would have fewer worries about wiretapping issues unless the companies became popular enough to come to the Justice Department’s attention.”

Savage quoted a statement in his article from Weissmann in which the FBI attorney said, “This doesn’t create any new legal surveillance authority.” Instead, said Weissman, “None of the ‘going dark’ solutions would do anything except update the law given means of modern communications.”

This always requires a court order,” he said.

Coincidently, that same issue has had major developments in its own right this week. On Wednesday morning, CNET reporter Declan McCullagh wrote that the Justice Department circulated memos in which they insisted that obtaining a search warrant isn’t necessary to eavesdrop on Internet communication of any sort.

The US Department of Justice and the FBI believe they don’t need a search warrant to review Americans’ e-mails, Facebook chats, Twitter direct messages and other private files, internal documents reveal,” wrote McCullagh, citing a government documents obtained by the American Civil Liberties Union and provided to CNET.

According to McCullagh, those documents include very specific instructions from high-importance officials that demonstrate the Justice Department’s disinterest in applying established law when it comes to eavesdropping on Americans. While Weissmann made the argument that the FBI plan reportedly backed by the president won’t change what rules the DoJ operates by, the memos obtained by McCullagh paints the Obama White House as an administration unwilling to work with the already broad surveillance powers provided to it.

In one memo unearthed by the ACLU, McCullagh said the US attorney for Manhattan instructed his office that an easy-to-obtain legal paper that requires no judicial oversight is all that’s needed to obtain personal correspondence.

“[A] subpoena — a piece of paper signed by a prosecutor, not a judge — is sufficient to obtain nearly ‘all records from an ISP,’” McCullagh wrote.

In another instance, McCullagh said the US attorney in Houston, Texas obtained the “contents of stored communications” from another ISP without getting a judge to sign a warrant.

One current law that limits how and when authorities can obtain a suspect’s email pursuant to a criminal investigation, the Electronic Communication Privacy Act, provides that while a warrant is needed for relatively recent correspondence, a comparably easier to get administrative subpoena is all that’s required to get communication older than 180 days. Provisions of the ECPA have been largely unchanged since it was passed in the mid-1980s, but last month a Senate Judiciary Committee approved an amendment that would require a warrant in all instances.

In advocating for fewer restrictions when obtaining store communication, the FBI’s Wessmann said in April that another law, 1994’s Communications Assistance for Law Enforcement Act, needs to be expanded so investigators can leap over current hurdles that keep them from conducting real time wiretaps of online discussions.

You do have laws that say you need to keep things for a certain amount of time, but in the cyber realm you can have companies that keep things for five minutes,” he said. “You can imagine totally legitimate reasons for that, but you can also imagine how enticing that ability is for people who are up to no good because the evidence comes and it goes.”

In the wake of the Boston Marathon bombing on April 15, renewed calls across the country have been made to make it easier for investigators to quickly conduct surveillance — in and off the Web. A recent poll found that roughly two-thirds of Americans favored more surveillance cameras in public places, and now the nation’s top law officials are asking for increased spy power not just on the streets but on the Web.

Earlier this month, Google Chairman Eric Schmidt said at a discussion in Washington, “When you come across an advocate for one thing — an advocate for security, and advocate for privacy — they’re often arguing from a position without understanding that it’s a two-edged sword.”

For example, very strong encryption would allow you and I to have a very, very secure communication: If we were criminals, if we were dissidents, if we were martyrs or if we were just doing a little business,” he said. “If you could figure out a way to ban very strong encryption from evil people and only allow good people…then this would be easy,” he said.

May 9, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Progressive Hypocrite | , , , , , | Leave a comment

This story is true; the facts have been fabricated to keep the false flag flying

By Greg Felton | Aletho News | May 9, 2013

For decades, pretentious wonks have declared that we live in “The Information Age,” as if information were a commodity unique to our time. Inanity aside, the claim is patently false, notwithstanding the advent of computers and virtually instant communication.

We do not live in an “Information Age” because “information” connotes data that is beneficial and objectively valid. Information can help solve problems, educate, and generally improve life. This was true of written language, movable type, the radio and the telephone, but look around today—do you see problems being solved, people becoming smarter, or life getting better? I thought not.

A more accurate expression for our time is “The Disinformation Age.” Though it is also not unique to our time, it at least captures the pervasive abuse of information that has made our society the opposite of an “informed” rational society: dissent is a subversive act; citizens are enemies of the state; the media conceal evidence; and the police enforce police-state edicts.

If these dystopian qualities were the basis for a movie or TV show, we could take comfort in the knowledge that justice would eventually prevail.

We’d be able to cheer for a rebellious anti-hero like John Connor (Terminator series), Det. Del Spooner (I, Robot), or Insp. Harry Callaghan (Dirty Harry series) to bring down the system. We would see detectives or scientists analyzing evidence (Columbo, CSI: Crime Scene Investigation, Bones) instead of destroying or ignoring it. We might be treated to the sight of the police treating a suspect humanely and reading him his rights (Kojak, Hill Street Blues, Dragnet). We might even see a dogged investigator exposing a cover up or government corruption (All The President’s Men, Erin Brockovich), instead of scheming to keep it hidden from the public.

This world of scripted entertainment, unreal though it may be, is able to depict healthy relationships between authorities and the truth, and between authorities and citizens. Such shows do not depict an idealized future; they give us fading afterimages of our society before the Military-Israel Complex and neo-conservative sociopaths gave us the “War on Terrorism” and declared justice obsolete. Here’s how the Boston Marathon bombing was scripted to serve the expanding surveillance state and stoke the “War on Terrorism.”

• Stage a lethal attack against a civilian U.S. target;
• Blame Arabs or some other Middle Eastern-looking types for the crime;
• Have FBI agents in place to ensure containment and control of the investigation;
• Justify their existence by having a “bomb drill” going on at the same time;
• Keep the public ignorant of the drill;
• Make sure the scapegoats are killed or otherwise kept away from the media;
• Stage conspicuous displays of gratitude for police agencies to reinforce the illusion that they are needed to fight “terrorism”; and
• Ensure that evidence is ignored or destroyed, and dissenting voices are harassed into submission so that the pre-established cover story can be marketed to a gullible public.

Like the 2001World Trade Centre Attack, which followed the same basic script although on a much larger scale, the Boston Marathon bombing story has come completely unraveled. Every couple of days it seems that some other detail comes out that demands to be investigated:

• No credible motive was ever given for the Tamerlan and Dzhokhar Tsarnaerv to have made the bombs.
• The FBI failed to disclose knowing the brothers; the agency had had a relationship with them going back at least two years.
• The FBI had to know them because the boys’ uncle Ruslan Tsarni (formerly Tsarnaev) is an ex-contractor for Halliburton, and was married to the daughter of Graham Fuller, a former vice chairman of the National Intelligence Council at the CIA and senior political scientist at RAND.
• Boston Police claim Dzhokhar Tsarnaev was shot in a gunfight, but video footage shows that he was unarmed.
• Dzhokhar was accused of leaving his bomb-laden backpack at the race, but a surveillance pic clearly shows him leaving with it.
• No explanation was given for the sudden appearance of Israeli police who just happened to be there to lend assistance.
• The public was not told that several members of a private security kill squad were on site.

This last omission, combined with the FBI’s immediate refusal to consider other suspects, clearly suggests a false-flag scenario. The following table identifies this kill squad.

Are these the Marathon bombers?

2013_05_09 Craft1

Click here for downloadable pdf enlargement.

To date, no news agency will touch this angle, even though these and other pics have been available on the Internet for weeks. Nevertheless, New Hampshire State Senator Sheila Tremblay correctly said that a black ops team was behind the bombing and even cast doubt on the claims of injury since one amputee did not look as if he were in pain. This was undoubtedly true because many of the amputees were paid actors who had already lost their limbs. Tremblay was pressured into issuing a political apology.

If this were part of a movie script, I guarantee there would be a crusading detective or journalist examining the evidence, interviewing people like Tremblay honestly, and asking intelligent questions like:

What was Craft International doing at the Marathon?
Why were they even needed?
How many Craft mercenaries were on site?
Who hired them—FBI, DHS, Boston police?
Why were amputee actors in the crowd, and who hired them?
What are the names of the two agents in pic #1?
Have these agents been interviewed regarding the missing backpack?
Has anyone proved that the exploded backpack even belonged to the Tsarnaev brothers?

2013_05_09 L.A. ConfidentialFor an excellent example of how justice triumphs over police corruption in the world of entertainment, the 1997 movie L.A. Confidential has thematic elements in common with the Boston bombing. [CAUTION SPOILER ALERT]

The film, centres around the culture of violence and corruption that pervades the L.A. Police Department in the 1950s. The catalyzing event is a multiple murder that takes place late one night in a seedy diner. A car belonging to “three negroes” was seen in the area at the time, and so the precinct captain makes them the sole focus of police inquiries.

Under interrogation, a career-minded but idealistic lieutenant realizes the story doesn’t wash, and starts looking for answers. He finds unlikely support from a thuggish officer and a sergeant who works on a TV show.

If you’re wondering what an honest investigation into the Boston Marathon bombing might have looked like, here are a few scenes for your entertainment. Shows like this accurately reflect our police-state but they can inure us to disinformation. This kind of entertainment has to be seen not as a comforting, nostalgic escape, but the basis for a new reality script since the one we have is transparently indefensible.

May 9, 2013 Posted by | Deception, False Flag Terrorism, Mainstream Media, Warmongering | , , , , | Leave a comment

Not Your Daddy’s COINTELPRO: Obama Brands Assata Shakur “Most Wanted Terrorist”

By Bruce A. Dixon | Black Agenda Report | May 8, 2013

Whoever imagines our first black president and his first black attorney general had little or nothing to do with naming Assata Shakur its “most wanted terrorist” list is deep in denial and delusion. “Terrorist,” as my colleague Glen Ford points out, has never been anything but a political label, applied by the authorities for their own political purposes. The international legal angle as well, with Assata Shakur receiving political asylum from the Cuban government the last 30 years, also makes her placement on that list something that Attorney General Eric Holder and President Barack Obama absolutely had to carefully consider and approve.

A lot has changed in the forty years since Assata Shakur was wounded and captured in New Jersey. The press conference announcing her capture was doubtless headed up by white police and district attorneys. Back then, black faces were pretty scarce in the top ranks of cops and prosecutors anywhere, and J. Edgar Hoover had only recently left the FBI. Last week’s announcement of the $2 million bounty on Assata’s head was anchored by a high ranking black cop, and of course, there are black faces in the offices of president and US Attorney General. People who call themselves progressives, do call that “progress,” don’t they?

The premiere federal initiative for political policing was something called COINTELPRO. COINTELPRO was a secret “counterintelligence,” as in “counter-intelligent” and/or evil multiplied by stupid federal program which for 25 years labeled thousands of civic organizations, churches, labor unions, and grassroots movements as threats to “national security.” Federal agents secretly coordinated local police and media assets in hundreds of campaigns to discredit and destroy those organizations, utilizing illegal surveillance, agents provocateur and media slander. Individual leaders and participants were harassed, falsely prosecuted and imprisoned, and sometimes murdered. COINTELPRO’s existence only came to light as a result of US Senate select committee chaired by Senator Frank Church hearings in 1975.

The good news about COINTELPRO was first, that the government of those days wasn’t bold enough, that it felt too hemmed in and prevented by the American people from openly targeting political dissidents for assassination and murder, and second, that it eventually did come to light. Government officials even had to pay token damages in a handful of cases, such as the murder of Illinois Black Panther chairman Fred Hampton, and publicly claim their official misconduct had ended.

Forty years later though, we live in the era of secret kidnappings, regular torture, ghost prisons and executive branch murder by drones or special ops teams. Today the federal Department of Homeland Security funds counter-terrorism fusion centers which openly disseminate the kind of inflammatory and fanciful disinformation to local police and security contractors about those the government wants targeted that J. Edgar Hoover’s FBI agents had to come around and whisper in their ears. Now that is progress.

Forty years and change ago, the whole constellation of African American leadership wrapped its arms around the segments of the black movement that came under vicious police assault. I was a member of the Black Panther Party in Chicago in 1969 and 70, and we never had as many friends as we did when our offices were riddled with gunfire or our members murdered by police. Back then, when everyone from the Urban League and the NAACP to Operation Breadbasket and the Afro-American Patrolman’s League stood up for us. Those who’ve viewed the recently released documentary Free Angela Davis & All Political Prisoners can see the same phenomenon of four decades ago, with Rev. Ralph David Abernathy wrapping his arms around “our sister Angela Davis” when she was accused of murder in the deaths of a judge and others in California.

It’s been a week now since the $2 million dollar bounty and “most wanted terrorist” announcement. In that time, not a single nationally noted African American “leader” has raised his or her voice. Not Ben Jealous. Not a single black mayor or member of the Congressional Black Caucus. Not Rev. Jesse L. Jackson, and certainly not the presidential lap dog Al Sharpton. Sharpton has worn wires for the FBI more than once, and is credibly accused of trying to get close to people who were rumored to be close to Assata Shakur in the 1980s. Those people wisely avoided Rev. Al.

Such is the pressure of subservient conformity among the black political class that not a single African American politician, religious leader, or personage of national note has opened his or her mouth in Assata Shakur’s defense, with the solitary exception of Angela Davis, once a political prisoner and fugitive in the days before the word “terrorist” had been coined. Lockstep conformity like this is hard to shake. In their 45 minutes in an otherwise excellent Democracy Now show mostly devoted to Assata Shakur’s case, neither Shakur’s attorney Lennox Hinds nor Angela Davis could bring themselves even to hint that the president and attorney general were responsible for branding her as the nation’s “most wanted terrorist.”

Four decades have seen the flowering of elite affirmative action in the military, corporate America and in American political life. Our black political class never tires of holding their own illustrious careers up as “the fulfillment of Dr. King’s dream.” But the fact is that US corporations couldn’t do business in Africa without black faces. The US couldn’t give military aid and training for a quarter century to 52 out of 54 African governments, arming all sides of every civil and international conflict in the most war torn regions of the planet, without black diplomats, black admirals and black generals. It couldn’t deploy the world’s most massive prison and police state without hundreds of thousands of black prison guards and police, some in the most senior positions and many more in line behind them.

All these are the fruits of what passes for social and racial “progress” in these United States.

This then, is the real function of corporate and elite affirmative action, and of the black political class itself. Whether it’s moving the corporate agenda of gentrification through the destruction of public housing, carrying out social security and Medicare cuts, or waging open war upon the unapproved segments of the African American movement for justice and liberation, black faces in high places have repeatedly proven themselves the more effective evil, able to blunt leftish opposition and carry out policies that white elites can only dream of without their help.

Assata Shakur is not a terrorist. She was shot with her hands in the air, and no residue from gunfire was detected on her hands or clothes or that would have been introduced as evidence at her trial. Her all white jury was instructed to convict her for simply being there, and they did just that. She was a political prisoner, and the only “crime” she can reasonably be accused of is escaping and living out her life the last three decades in Cuba. Government officials do admit that her “terrorist” activity consists of occasional writings and speeches which advocate radical change, and the example of her peaceful life and political asylum 90 miles from Florida.

If that’s all it takes to be a “terrorist,” many thousands of today’s yesterday’s and tomorrow’s black and non-black political activists inside the U.S. are “terrorists” as well. There’s a global war on terror, and now it openly includes the black liberation movement, basically everybody to the left of the established black political class. In the wake of this announcement, can there be any doubt that many more names are or will soon come up at the president’s “terror Tuesday” meetings, at which the White House boasts it considers who next to kidnap or murder? We’re all fair game now.

President Obama obviously hopes the label “terrorist” will scare present and future activists from learning what there is to know from the proud traditions of African American and other resistance to empire. He hopes to intimidate and frighten ordinary people, especially young people, into the same kind of conformity as their supposed “leaders.”

Back in 2007 and 2008, candidate Barack Obama confided to editorial boards and others a number of times that Ronald Reagan was his favorite president. We should have listened to him a lot more closely. It’s a safe guess now, that J. Edgar Hoover is his favorite cop.

Bruce A. Dixon can be reached at bruce.dixon(at)blackagendareport.com.

May 8, 2013 Posted by | Civil Liberties, Progressive Hypocrite, Timeless or most popular | , , , , , , , , , | Leave a comment

Defend Assata, Defend Ourselves: The Black Is Black Coalition Rallies in Harlem

A Black Agenda Radio commentary by Glen Ford | May 8, 2013

In doubling the bounty on former Black Liberation Army member Assata Shakur’s head, the Obama administration is announcing that Black radicals are candidates for his Kill List. The message is as unmistakable and dramatic as the billboards that have been erected in Newark, New Jersey, and elsewhere screaming for the exiled freedom fighter’s blood.

One does not wind up on the FBI’s Most Wanted list based on the number of murders committed or millions of dollars stolen. The Most Wanted list is among the nation’s most political documents, in which individuals are meant to personify the scope and type of offenses that the U.S. government considers most in need of stamping out. The list is a kind of propaganda, a symbolic display of what the state considers dangerous behavior.

President Obama and Attorney General Eric Holder, the two Black men who are most responsible for making Assata Shakur the face of domestic terror in the United States, are fully conversant in the language of symbolism. They are publicly defining the Black liberation movement – or what’s left of it, or those who might attempt to revive it – as a priority domestic target for repression. Shakur, a 65-year old grandmother who has not left Cuba for the past 29 years, poses no physical danger to the American state. She represents a political threat, through her “ideology,” as brazenly stated by the FBI. The Bureau has marked Shakur for priority assassination on the basis of, in the FBI’s words, her “anti-U.S. government speeches espousing the Black Liberation Army message.” “Terrorism” is somehow inherent in the message of Black liberation. Advocacy of Black liberation, is the threat. The reward of $2 million is meant to silence Assata Shakur’s political speech, and remove her as a symbol of resistance to the U.S government.

For the National Security State, “terror” is a powerful word, with vast legal ramifications. The Obama administration is informing Americans and Cubans that Assata is as much fair game for assassination by drone as the late Anwar al-Awlaki. Barack Obama and Eric Holder are serving notice that those who share Assata’s ideology – as understood by the FBI – are subject to eradication as well, because it is an ideology of terror. And they are telling those who give “substantial support” to Assata that they are subject to detention by the U.S. military without trial or charge, for the duration of the war against “terror.”

The Black Is Back Coalition for Social Justice, Peace and Reparations will hold a demonstration on Thursday, May 9, from 5 to 7pm, in front of the Harlem State Office Building in New York City, to give substantial and unwavering support to the safety and freedom of Assata Shakur; Freedom for Sundiata Acoli and Sekou Odinga, Black Liberation Army members held in U.S. prisons; and Freedom for All Political Prisoners.

They tried to kill Assata in 1973, and their still trying. They tried to kill the Black liberation movement, but its not dead yet. Join the Black is Back Coalition and a host of other concerned organizations at the Harlem State Office Building, on 125th Street, at 5pm, on Thursday. Tell the real terrorists what you think about them, their austerity, their mass incarceration, and their wars.

Glen Ford can be contacted at GlenFord@BlackAgendaReport.com.

For more information, go to Black Is Back Coalition event Facebook page:

https://www.facebook.com/events/425416530887768/

May 8, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Progressive Hypocrite, Subjugation - Torture | , , , , , , , | Leave a comment

Expanding Security State

By affinis – Corrente – 05/06/2013

A few days ago, I noticed this piece at FDL: “’Homeland Security’ Spending Overtakes New Deal
TomDispatch: this country has spent a jaw-dropping $791 billion on ‘homeland security’ since 9/11. To give you a sense of just how big that is, Washington spent an inflation-adjusted $500 billion on the entire New Deal.

Two indicators of the expanding security state that caught my attention in the last few days:

1. Glenn Greenwald: “Are all telephone calls recorded and accessible to the US government?

2. A massive lockdown in the Madison WI area (where I live).

A fugitive, Paris Poe, whom the FBI wanted for parole violation and questioning in a murder investigation, was spotted at a hotel in a Madison, WI suburb. Poe had previously been imprisoned for armed robbery. A large area encompassing much of Vernona, Fitchburg, and part of Madison, WI was then essentially locked down and swarmed with SWAT teams in a day-long manhunt.

Reverse 911 calls were made to all landlines (about 30,000 homes) asking residents to lock their doors and remain inside. Police asked all the businesses in their area to close and lock their doors. All six schools in the area were placed on lockdown and surrounded by police. In Verona, no-one could enter or exit the schools. In some classrooms, children were told to crouch under their desks for hours. In some schools, children were herded into the gym. Children were prohibited from using the bathroom, since that would involve leaving their rooms, and were told to urinate in buckets. Parents could not pick up their children since entry or exit was prohibited. Once the lockdown was ended, parents were required to present ID to take their children home. During the escalating panic, it was stated that Poe was on the FBI’s most wanted list, but he was not.

Late in the day, Poe was arrested far outside the locked down area. He was apparently unarmed, faces no charges in WI, and will be transported back to IL. News stories here, here, here, here, here, here, here, and here.

Does anyone else see something wrong with this picture?

May 8, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Subjugation - Torture | , , , | Leave a comment