Impeach Obama For the Right Reasons

TimeObamaFlickrReggestraat and again, US presidents have been impeached or forced to resign for all the wrong reasons.

Nixon resigned not because of the secret wars illegally conducted in Laos and Cambodia, but because he was caught bugging the phones of his political adversaries. Nixon wasn’t cuffed, read his Miranda rights and thrown into the back of a squad car for violating Article 1 Section 8 of the Constitution, which states that only Congress has the ability to enact war; instead he was given a catwalk and a fucking helicopter to leave the White House.

Nixon wasn’t relegated to an 8×10 cell to reflect on the hundreds of thousands of innocents that were vaporized by an ordinance dropped by B-52 bombardiers, rather he was given the comfy post-office title of former president, making media appearances in order to rationalize his brazen lawlessness, such as when he said, “When the president does it, that means that it’s not illegal.” Only a madman could say something like that with a straight face.

The same goes for Clinton. Clinton wasn’t impeached for violating the War Powers Act when he conducted a languishing air campaign in Kosovo to squash Serbian ethnic cleansing without Congressional authority. Notably, his was the first combat operation conducted for more than sixty days without express congressional authorization, setting the precedent for later presidents like Bush and Obama. Clinton wasn’t impeached for the economic terrorism waged against Iraq by implementing economic sanctions, which resulted in over half a million innocent deaths due to malnutrition and lack of healthcare. No, he was impeached for putting a cigar where he wasn’t supposed to.

And then there’s Bush. I mean, take your pick – warrantless wiretaps; offshore penal colonies; torture; wars of aggression. Yet, amazingly enough, there was no impeachment nor resignation to be found. In fact, former Democratic Speaker Nancy Pelosi promised that “impeachment was off the table” in 2006.

Over the last half century, POTUS has progressively gotten bolder with its actions, and Congress has progressively gotten weaker in turn. Worse still, the only times when Congress has shown some spine in standing up to the administration, it has been for all the wrong reasons.

Not only is Obama overseeing a blatantly unconstitutional dragnet spying program across the planet, he’s waging an illegal drone war that has resulted in the deaths of thousands of innocent civilians and the violation of multiple nations’ sovereignty. Just like Nixon, this act of war has been shrouded in secrecy, as Glenn Greenwald recently elaborated upon in the Guardian:

“What has made these actions all the more radical is the absolute secrecy with which Obama has draped all of this. Not only is the entire process carried out solely within the Executive branch – with no checks or oversight of any kind – but there is zero transparency and zero accountability. The president’s underlings compile their proposed lists of who should be executed, and the president – at a charming weekly event dubbed by White House aides as “Terror Tuesday” – then chooses from “baseball cards” and decrees in total secrecy who should die. The power of accuser, prosecutor, judge, jury, and executioner are all consolidated in this one man, and those powers are exercised in the dark.”

According to Obama’s “Disposition Matrix” legalese, the good president retains legal grounds to assassinate individuals based not on any actual link to terrorism but rather on “patterns-of-behavior” analyses alone. For instance, Obama would have us believe that some poor Bedouin in Yemen has been radicalized because of intelligence reports alone, and if we don’t act now he’ll will probably conduct a terrorist attack in the near future, because a.) he posted a YouTube video proclaiming “Death to the Great Satan, America!” b.) visited Afghanistan for a “cousins’ wedding” c.) has a shirt that says “I Heart Osama.” How is this process even remotely legal, let alone accurate and effective?

Barring Obama having access to any sort of clairvoyance, this ought to be an open-shut case for his immediate removal from office, and for him to face charges of crimes against humanity in international courts. It’s time we impeach POTUS for the right reasons. It’s time we stand up and speak truth to fuckery.

If you are with me on this, then link this story to Twitter and include the hashtag #STTF.  Let’s get this trending.

Written by Mike Micklow for Media Roots

Photo by Flicker user Reggestraat

The Death of Irony: University of Penn’s Secret Meetings on Secret Surveillance Law

NSAbyEFFIt’s a crisp Saturday morning in late November, and the University of Pennsylvania’s campus is just barely stirring as I walk into the Silverman building and head towards Room 147, excited about the morning’s roundtable discussion: Spying and the Judiciary: FISA and Other Special Courts.

The event is one of seven moderated discussions at the Center for Ethics and the Rule of Law (CERL) Conference, On the Very Idea of Secret Laws: Transparency and Publicity in Deliberative Democracy.

I’m not the only geek fired-up either, a portly man in a suit walks up next to me as we briskly move towards the meeting room.

“We’re in for a treat this morning!” he says, his mouth cracked with a grin and his eyes alight. Only one of us would end up attending, however – and it had nothing to do with my lacking a tie.

After taking a seat (and catching out of the corner of my eye NSA’s deputy director John “Chris” Inglis drift into the room, among others), a wiry CERL staffer named Ilya Rudyak walks over and asks for my name. I introduce myself and offer my press badge.

“You’re going to have to leave,” he says with a nervous smile.

After escorting me out into the hallway, another CERL representative, Claire Finkelstein, says I can stop back in towards the end of the lunch break to ask her some questions.

In other words, this morning’s moderated discussion on secret courts, secret laws, and a rampaging surveillance apparatus is strangely, well, secret.

In fact, every event during this two day conference – with the exception of Chris Inglis’ keynote speech inside a packed auditorium the night before – is listed on the university’s law department website, yet completely shielded from press and public scrutiny. Furthermore, none of the event listings even have a full roster of attendees.

I find a 14-page list of participant bios outside of the room. The packet is chock full of representatives from the defense industry, intelligence community, academia, and think tanks such as the Cato Institute.

Courtesy for the Powerful, Not the Public

I return near the end of the attendees’ lunch break and quickly find CERL’s head staff member, Claire Finkelstein. She seems dismayed that I’m actually taking up her earlier invitation.

“Is there classified information being discussed here?” I ask Finkelstein.

“No, no classified information, but sensitive topics.”

“So if there’s no classified information being disclosed here, why is it closed to the public?”

“The main point of the discussions is for policy makers, academics, and others who are involved,” she begins, “to enter into dialogue with one another in a way that allows all of us to move up the learning curve, so that we become better-informed academics and policy makers become better-informed.”

She soon passes me off to another attendee: the ACLU’s Alex Abdo.

“There’s a non-attribution agreement that applies, a ‘Chatham House Rule’ that people here are talking about,” Alex Abdo tells me. Finally, we’re getting somewhere.

Abdo is an ACLU staff attorney and participant in that organization’s National Security Project. He arrived here this morning after doing battle with the National Security Agency in U.S. District Court in Lower Manhattan the day before. Abdo is also a conference participant. At moments during our conversation, he seems embarrassed when I press him on the absurdly-ironic secrecy cloaking a conference whose very theme ostensibly seeks to take a critical look at Intelligence Community obfuscation. Hell, even several participants (including Dr. Hans Blix) during a 2006 UK conference on freedom of information and the Iraq War scoffed at invoking the Chatham House rule.

“It’s a really fascinating discussion about how we should think about privacy in an era where so much private information can be collected so easily. That’s my understanding about what’s happened today so far.”

Thanks for the boilerplate, Mr. Abdo, but I’m still trying to wrap my head around why the public should be barred from participating in – or even observing – this “fascinating discussion” on how our “private information can be collected so easily.”

“I’ve been to a couple of these meetings before,” Abdo begins. “Usually, the thought is that if you get a bunch of people who are really thinking and working on these issues together in a room, and you promise not to use what they say against them later on, you’ll foster a thoughtful and uninhibited conversation.

He pauses, adding wryly:

If no one’s surveilling you, you can have an uninhibited conversation.

Julian Sanchez, a CATO Institute research fellow who attended the conference in its entirety, more-explicitly characterized this rule’s real purpose in a series of emails to me:

You’ve got a bunch of lawyers who used to work for the government, some who currently work for the government, and others who might very well hope to work for the government in the future, perhaps on these very issues” [such as Foreign Intelligence Surveillance Court opinions], he writes. I can promise you none of those people ever wants to be quoted in a newspaper making what comes off as a harsh personal criticism of a federal judge [who is assigned to the Foreign Intelligence Surveillance Court] — or even seeming like they partially agree with someone else’s criticism,” he continues.

“In certain circles, that’s at least going to be a huge PR headache, and very likely career kryptonite. Maybe I can just come right out and say ‘that opinion was a total disaster,’ but I’m never going to have to argue a case before that judge, or be applying for a job at DOJ, and I’m certainly not important enough to make headlines with an offhand remark. So the only way you really get a free-flowing, honest discussion is if everyone can just talk without thinking about whether they’re going to make a Huffington Post headline if they phrase something the wrong way.

Whether or not Sanchez was aware, there weren’t just “a bunch of [government] lawyers” in attendance, however. In addition to top-ranking officials within the Intelligence Community, individuals with long-standing corporate ties to the defense and intelligence industries participated too. To shed some light on a frustratingly non-transparent gathering, here’s a small sampling of attendees from the conference roster:

* John “Chris” Inglis, Deputy Director of the National Security Agency and the organization’s senior civilian leader, “responsible for guiding and directing strategies, operations, and policy.”

* Sean Kanuck, whose current position is National Intelligence Officer for Cyber Issues within the Office of the Director of National Intelligence. Kanuck came to this segment of the intelligence community after a decade-long position with the CIA’s Information Operations Center. Kanuck also has extensive experience in law focusing on corporate mergers and acquisitions;

* William R. Craven, the founder and CEO of Overwatch Systems, “a software company serving the Intelligence segment of the Defense industry.” Prior to forming Overwatch, Craven “had been the CEO of Paravant, a public company serving the defense community with rugged and high speed computing solutions for Battlefield and Intelligence applications;

* Lt. General Paul Menoher (Ret.), currently Director of Overwatch Systems LLC and an advising board member of Topia Ventures and Oberon Associates, Inc., and a consultant for ten other defense firms. Menoher also enjoyed a 35-year career in Army Intelligence;

* Amos Guiora, currently a Research Fellow at the International Institute on Counterterrorism in Israel, and Commander of the Israel Defense Force’s School of Military Law and a former legal advisor to Gaza Strip operations;

* George Casey, “head of Shearman and Sterling’s Global Mergers and Acquisitions Group”. Casey is an expert in U.S. domestic and cross-border mergers and acquisitions transactions, venture capital financing, and represents “many of the largest U.S. and non-U.S. corporate and investment banking clients.” Casey is also a current University of Pennsylvania School of Law lecturer.

* Harvey Rubin, M.D., Ph.D, Penn’s Institute for Strategic Threat Analyis and Response (ISTAR) director, and Associate Dean for Student Affairs in the School of Medicine.

So while influential members of government and private industry discuss issues (behind closed doors and shielded from any attribution to “career-damaging” statements) that clearly belong in the realm of public debate – and have been since the beginning of the Snowden-spurred surveillance scandal in April – you and I are shut out from these discussions because these officials are concerned that their statements might be recorded, publicized, and prove damaging to their reputations, careers, and profit margins.

And while this particular conference may not directly produce public policy, as Julian Sanchez also assured me, academic papers may be written about what was discussed. These papers may then become white papers that form the basis for later policy by unelected officials, and often outside the public eye.

Scrutinizing Penn’s Center for Ethics and the Rule of Law

What’s no secret, unlike the conversations throughout this two day CERL conference on surveillance and secret law, is how deeply entrenched this – and so many other non-state funded schools like Penn – are with the defense industry.

Including up to the third quarter of FY 2012 (the most recently available data), the University of Pennsylvania raked in over $17 million in government research work. FY 2011 saw a very lucrative $32 million in such contract work for Penn.

It’s worth taking a closer look at CERL too. Its advisory board contains not only law professors from a variety of universities, but defense contractors like William Craven, currently the CEO of Overwatch Systems and the former head of Paravant. Both companies have deep roots within the defense and intelligence communities. As stated earlier, Craven also participated in this Penn conference.

Ambassador Dell Dailey (Ret.) is another CERL board member whose consulting company “spans both Department of Defense and Department of State programs, numerous product focused companies, private equity, small arms company, think tank efforts and international operations.” Dailey also serves on the nonprofit Center for a New American Security’s Board of Advisors. CNAS boasts of developing “strong, pragmatic and principled national security and defense policies.”

CERL’s seeming affinity for defense industry players and its apparent sympathy for current national security policies doesn’t stop with its private contractor leadership, however.

In a Penn Law Journal article published this past summer titled The Perils of Push Button War, CERL’s head and perhaps its most publicly-visible member, Claire Finkelstein, is paraphrased regarding drone warfare:

Finkelstein points out, however, that as a weapons system, there’s a lot to like about drones. They are more precise than traditional aerial bombs, better able to pinpoint targets, and therefore have the potential to dramatically reduce civilian casualties.

Two law professors and current CERL board members, Jens Ohlin and Kevin Govern, are cited in the same article as supporting the targeted assassination of U.S. citizens abroad, as in the case of Anwar al-Awlaki:

Jens Ohlin, a law professor at Cornell, and a member of CERL’s advisory board, said that the presence of an al-Qaeda branch in Yemen with an avowed intent of engaging Americans more than justified the invocation of war powers there. He said it has never been the case that American citizens taking up arms against the U.S. get special treatment on the battlefield.

Another board member, Kevin Govern, law professor at Ave Maria Law School, and a former Army Judge Advocate, said that al-Awlaki might be compared to Nazi propaganda chief Joseph Goebbels.

What, then, do we make of Penn’s “secret” conference participants, their relationships to the U.S. defense and intelligence apparatuses, and the pervasive secrecy by which they are surrounded? Can we trust that whatever academic treatises, white papers, and possible policy decisions that may come from “On the Very Idea of Secret Laws” will represent not just the national security state’s perceived desires, but those of the public’s too?

Written by Dustin Slaughter. This article is cross-posted at Phawker.

Photo by EFF

JFK Cover-Up: Where There’s Smoke, There’s Fire

JFKWhiteHousePortraitIn November of 2003, Senator Max Cleland resigned from the 9/11 Commission investigation, directly disparaging it by way of the Warren Commission investigation. Senator Cleland said:

“The Warren Commission blew it. I’m not going to be part of that. I’m not going to be part of looking at information only partially. I’m not going to be part of just coming to quick conclusions. I’m not going to be part of political pressure to do this or not do that.”

The most obvious fact, to indicate that the true story of John F. Kennedy’s slaying is not as the government has presented, is the cover-up itself. Elaborate cover-ups spanning 50 years cannot orchestrate themselves, and there must be compelling reasons for hiding the truth from the American people, or else it would simply be declassified and revealed.

If the killing of the president was committed by a lone nut single shooter named Lee Harvey Oswald, because of his great love of Marxism, there would be no compelling reason to keep his files secret five decades after the fact. Quite the opposite, Mr. Oswald’s clear guilt and personal history would have been useful propaganda material in the ideological battle between the Western world and the Soviet bloc. The ongoing and arguably illegal suppression of assassination evidence by the US government should be taken as a clear indicator of some level of official complicity in the original assassination.

Despite the US government and major media pressing the official story for the last half decade, relatively few Americans still believe it. By 2004, 74 percent of Americans thought there was a “cover-up of the facts” about the assassination of JFK. Today, polls show a majority firmly behind the conspiratorial view, with the Associated Press finding that 59 percent of Americans think multiple people were involved in a conspiracy.

Of course, the 1979 House Select Committee on Assassinations (HSCA) determined the killing was “probably” a conspiracy, with a pathetic guess to their final determination. The committee was “unable to determine” the identities of other shooters or the “extent of the conspiracy.” This is more evidence of a cover-up, especially given the sheer number of documents to be released after 1979, and, even more damaging, those that remain secret to this day. We know of at least 1,100 multi-page records related to the JFK hit that remain classified.

Among those still classified records are details of the CIA’s surveillance of Lee Harvey Oswald prior to the assassination. Other characters kept shielded from public scrutiny include Bill Harvey, who headed an assassination team for CIA code named “ZR-RIFLE,” and CIA operative David A. Phillips, who was allegedly seen with Oswald in Dallas two months before the slaying of a president. At least 332 hidden pages of classified text concern E. Howard Hunt, a CIA thug and Nixon “plumber” (plugged leaks) involved in Watergate. Hunt would confess on his deathbed to being part of the JFK hit, as published in Rolling Stone, although specifics of his story may be inaccurate. In his confession, E. Howard Hunt named Cord Meyer, Bill Harvey, David Morales, David A. Phillips, Frank Sturgis and then Vice President Lyndon B. Johnson as other culpable players.

The 1979 HSCA investigation in no way got to the truth of the matter, and nowhere is this more clearly shown than in its failure to interview Jerrol Custer when it addressed whether the Kennedy X-rays were forgeries or not. Custer was the x-ray technician who took the pictures, and yet he was not brought in to clarify that the images were authentic. Custer testified in 1997 to the Assassinations Records Review Board: “[W]hen I looked into the skull – I remember seeing an apparatus in there… It was non-human. It had – I’m not sure if it was metallic or plastic…” His commanding officer, Dr. Ebersole returned late that night with additional skull fragments from Dallas. “High-ranking people had talked to [Ebersole]. And he suggested to me that everything I see from now on, I should forget” (ARRB, “Deposition…” p146).

Three days after Kennedy’s killing, and just one day after Lee Harvey Oswald was also gunned down – while in police custody and having never confessed to anything – the assistant Attorney General of the United States, Nicholas Katzenbach, wrote a memo to a White House aide that included this point: “The public must be satisfied that Oswald was the assassin; that he did not have confederates who are still at large; and that the evidence was such that he would have been convicted at trial.”

Clearly, at this early juncture there was no way for Nicholas Katzenbach to know these things as facts. In explaining his memo, Katzenbach told the House Select Committee on Assassinations that his emphasis was on full disclosure and not on pressing the lone assassin theory. Katzenbach’s premature memo also noted some conspiracy theories that the Soviets were behind the Kennedy killing or that the extreme right wing was behind it in order to blame it on leftists. “Unfortunately, the facts on Oswald seem about too pat, too obvious.” So even as he relayed the premature determination that Oswald was solely responsible, Katzenbach expressed a reservation that it seemed “too obvious” that Oswald was so blatantly linked to the Soviet bloc.

We see an official policy to stick to the lone assassin theory, and specifically not to blame the JFK hit on the Soviets or Cuba, even from President Johnson. During a phone call one week after the slaying to Senator Richard Russell, Johnson said, “[W]e’ve got to take this out of the arena where they’re testifying that Khrushchev and Castro did this and did that and kicking us into a war that can kill 40 million Americans in an hour…” The direct threat of nuclear war supposedly took precedent rather than full disclosure, at least from the mouth of President Johnson. This rationale for covering up the facts was already established and on the record, inside the White House, one week after President Kennedy’s murder.

Discrepancies with the Oswald legend would emerge later. Particularly curious is this bit of skullduggery: “In one taped conversation, Oswald — or someone saying he was Oswald — called the Soviet embassy. Then-FBI Director J. Edgar Hoover listened to the tape and told President Lyndon Johnson that it wasn’t Oswald’s voice.” That tape disappeared forever. Perhaps Katzenbach’s “too obvious” speculation was spot on.

Oliver Stone’s JFK film included another spot on point. As Associated Press states plainly, “Pamphlets Oswald had in his possession bore an address of a local anti-Castro operation connected to a former FBI agent with ties to organized crime.” So was Lee Harvey Oswald supposed to be pro-Castro, anti-Castro, or undercover?

Check out Breaking The Set‘s report on the assassination of JFK:

***

50 Years Later: Exposing the Truth on JFK’s Life & Death

***

A cognitive dissonance surrounds this issue, particularly in the corporate media. Investigators routinely report highly suspicious facts only to attempt to spin them away and diminish their importance. An example of this behavior is former Washington Post reporter Jefferson Morley, who has taken on the Kennedy case. Claims Morley: “This is not about conspiracy, this is about transparency… I think the CIA should obey the law.”

The definition of conspiracy is when multiple parties, or an organization such as CIA, break the law. Establishment journalists are so terrified of accusing the government of conspiracy, that they even seem prepared to attack the English language rather than to open themselves up to accusations of being a dreaded “conspiracy theorist.”

The CIA made its propaganda agenda clear in April of 1967 in a document entitled, “Countering Critics of the Warren Report.” Therein, the agency sought to, “employ propaganda assets to answer and refute the attacks of the critics” (Nurnad). That meant “book reviews” and “feature articles” as well as “friendly elite contacts (especially politicians and editors).” Countering critics of the Warren Report with propaganda was a clear breach of the CIA’s charter, and operating domestically was and remains illegal. That propaganda effort, similar to the more formal “Operation Mockingbird,” would constitute additional official conspiracies peripherally related to the killing of President John F. Kennedy. In other words, official cover-ups tend to veer into technically criminal activities.

Jefferson Morley, who already disparaged the idea of a JFK conspiracy earlier in the AP article, presented another curious revelation: “The idea that Lee Harvey Oswald was some unknown quantity to CIA officers was false… There was this incredible high-level attention to Oswald on the eve of the assassination.”

On the eve of the assassination, says Morley, as in prior to the killing in Dallas by the alleged lone nut assassin who just decided out of the blue to murder a president passing by below his place of employment. There was not only attention to Oswald, it was “high-level attention,” which was “incredible.” Morley’s evidence is hard to locate, as his sourcing was not included in his story.

What is known is that anti-Castro Cuban exiles, working with the CIA, were monitoring Lee Harvey Oswald three months prior to the JFK assassination. A lawsuit was filed to release records connected with George Joannides, who was the “chief of the CIA’s anti-Castro ‘psychological warfare’ operations in Miami.” What makes Joannides even more relevant to the cover-up is that he served as the Central Intelligence Agency’s “liason” to the HSCA in 1978-9, but he never revealed to the investigation his own involvement in 1963. George Joannides was, of course, an expert in psychological warfare, the art of disinformation – which is plentiful in this particular murder case. He was later accused of obstructing justice by deceiving the congressional committee.

The fact that there has been a cover-up of the JFK assassination is undeniable. The conflicting conclusions of the two main investigations, Warren vs. HSCA, establish that a one has taken place. Ongoing suppression of evidence by the CIA further establishes this cover-up. Defenders of the official story would attribute such illegal behavior to institutions avoiding embarrassment or hiding negligence. Establishment journalist Jefferson Morley is an example of this view, as his own conspiracy theory suggests that: “release would show the CIA trying to keep secret its own flawed performance before the assassination.”

The majority of the American people don’t see it that way, however. They believe a far more sinister explanation is likely, and for good reasons. The CIA has a history of criminal activity including overthrowing democracies, torture and politically-motivated murders. The Kennedy killing would not have been an aberration in tactics, only in the choice of target.

Written by Joe Giambrone for Media Roots

***

Works Cited

Assassination Records Review Board, Assassination of John F. Kennedy, “Deposition of Jerrol Francis Custer,” Miller Reporting Company Inc., Washington DC, 28 Oct.1997, hosted at www.aarclibrary.org, The Assassination Archives and Research Center, Web, 10 Nov. 2013.

Federation of American Scientists (FAS), “The Evolution of the U.S. Intelligence Community-An Historical Overview,” Page INT022, 23 Feb. 1996, Web, 10 Nov. 2013.

Katzenbach, Nicholas, “Memorandum For Mr. Moyers,” FBI 62-109060 JFK HQ File, Section 18, US Department of Justice, Federal Bureau of Investigation, 25 Nov. 1963, hosted at maryferrell.org, The Mary Ferrell Foundation, Web. 10 Nov. 2013.

Nurnad, Clayton P., “Countering Critics of the Warren Report,” CIA no. 1035-960, US Government, Central Intelligence Agency (CIA), reprinted in Stone, Oliver and Sklar, Zachary, “JFK: The Book of the Film (Applause Screenplay Series) First Edition,” Applause Theatre & Cinema Books, 1 Feb.2000, p.550.

Select Committee on Assassinations of the U.S. House of Representatives, “Volume VII, Section IV: Authenticity,” Report of the Select Committee on Assassinations of the U.S. House of Representatives, Washington, DC: United States Government Printing Office, 1979, hosted at John McAdams’ Web Site, Marquette University, Web, 10 Nov. 2013.

Inside the Zeitgeist Revolution with Peter Joseph

Some of you may already be familiar with Zeitgeist, a controversial documentary film trilogy that challenges everything you think you know about the world. If you aren’t, do yourself a favor and get acquainted.

The first movie release, Zeitgeist, analyzes the social constructs that keep humanity’s consciousness stunted; Zeitgeist: Addendum dissects the unsustainability of the current economic system; The epilogue, Zeitgeist: Moving Forward, outlines the notion of structural violence, mechanization and the blueprint for a new system – one that can exist harmoniously with nature.

The viral film series has since spawned a global collective called The Zeitgeist Movement or TZM, an international initiative of activism and awareness pushing the notion that the current social and economic structure is inherently flawed, and must be transformed in order to ensure a sustainable future for all.

The Zeitgeist trilogy, as well as its follow-up Culture in Decline series, have challenged many of my preconceived paradigms as well as greatly inspired my activism, so it was awesome to sit down with Peter Joseph, founder of The Zeitgeist Movement Global, for an in-depth interview. Whether or not you agree with his philosophy, it’s undeniably thought-provoking and deserves to be heard.

Abby 

***

Peter Joseph Breaks the Set on The Zeitgeist Movement

***

LIKE Breaking the Set @ http://fb.me/BreakingTheSet
FOLLOW Abby Martin @ http://twitter.com/AbbyMartin

 

Philly Fusion Center’s Reckless Disregard for Privacy Must Be Held to Account

The Declaration has uncovered troubling revelations regarding law enforcement operations at Philadelphia’s Delaware Valley Intelligence Center (DVIC), which include the fact that the DVIC, an “all crimes, all hazards” fusion center that assists law enforcement agencies in four states, appears to operate without any privacy policy in place, while its privacy officer position has been vacant since 2010.

In a related development, before the fusion center officially opened, the Philadelphia Police Department operated what one private contractor and a Senate subcommittee labeled a “DVIC Cell”. This unit’s existence indicates probable Constitutional violations dating as far back as 2009, as there doesn’t appear to be any indication of privacy or civil liberties protections attached to the “cell’s” operations.

If the Policy Exists, We Won’t Show it to You

Our research into the South Philly fusion center began in the summer of 2012. At that time the only readily discoverable item of any official nature was a brochure made by architect LR Kimball. Formal inquiries, which began in January of 2013, followed by multiple editorial admonitions published on our website and repeated communication with officials both on and off the record over a 10-month period, have not yielded any official policies. Local police officials have been unwilling – or unable – to produce any documents. They have on numerous occasions tried to assure us that a policy exists.

The Declaration also contacted the Department of Homeland Security’s Civil Liberties office, who upon first contact told the Declaration they would quickly locate the document. Our inquiry is now frozen after being passed to the Fusion Center Training Coordinator Ada Albright, whose final communication with us was a deferral to a telephone number which the Declaration has called countless times.

The officer or employee who answered the phone and confirmed that he was indeed at the DVIC told us that he knew Director Walt Smith already had our request, and that “he’d be best to deal with it.” The stonewall continues.

Additionally, a thorough online search for a DVIC policy will lead you to the National Fusion Center Association website and their list of member facility’s privacy policies. The “Delaware Valley Fusion Center” is on the page, with no link to a policy. A very important note sits at the bottom of that page:

FY 2010 DHS grant funds may not be used to support fusion center-related initiatives unless the fusion center is able to certify that privacy and civil rights/civil liberties (CR/CL) protections are in place that are determined to be at least as comprehensive as the ISE Privacy Guidelines by the ISE Privacy Guidelines Committee (PGC) within 6 months of the award date on this FY 2010 award. If these protections have not been submitted for review and on file with the ISE PGC, DHS grants funds may only be leveraged to support the development and/or completion of the fusion center’s privacy protections requirements.

A list of privacy policies on the NFCA website shows the DVIC among center missing a link to a document
A list of privacy policies on the NFCA website shows the DVIC, among a number of other fusion centers, missing a link to a document.

SEPTA police chief Thomas Nestel III, the DVIC’s privacy officer until July of 2010, told The Declaration that he resigned because he could not perform the on-site, full time duties he felt the position required. He believes he had “seen the final draft approved by the Department of Homeland Security.”

Furthermore, in an emailed statement given to us this morning, Nestel says that he “assisted in the creation of the privacy policy and it does exist. Since I no longer hold a position with the DVIC, I am reluctant to release the policy without [Philadelphia Police Inspector Walt Smith’s] permission.”*

Another law enforcement official, on condition of anonymity, also confirms that the DVIC has yet to hire a privacy officer, and describes the facility as not yet fully operational – despite a much-publicized opening on June 28th of this year – in part because the DVIC plans to hire “civilian intelligence analysts.”

These revelations cast strong doubt on the legality of the DVIC’s operations, as fusion centers across the country must adhere to basic standards – outlined in the Department of Homeland Security’s Fusion Center Guidelines as well as the agency’s Baseline Capabilities supplement – standards that include civil liberty and privacy protections. These standards must be implemented in order to receive federal funding.

Privacy guidelines, which the Department of Homeland Security provides a template for on its website and which other fusion centers across the country have in place, establish protocols for the types of intelligence DVIC analysts gather, as well as how that information can be used or disseminated to federal, state, and local law enforcement agencies throughout the four-state region.

Pre-Crime, Suspicious Activity Reporting, and No Privacy: A Troubling Mix

One facet of a fusion center’s day-to-day operations involves either civilian or privatized intelligence analysts examining “suspicious activity reports” filed by law enforcement. These analysts then create threat assessments based on these reports and will often upload them to a federal database, such as the FBI’s e-Guardian system. These assessments are accessible to other local, state, and federal agencies too, as part of a networked law enforcement ecosystem.

During last month’s International Association of Chiefs of Police conference in Philadelphia, The Declaration had the opportunity to attend a presentation on the controversial Nationwide Suspicious Activity Reporting Initiative, often known as “See Something, Say Something.”

David Sobzyk, the scheduled speaker, asserted almost immediately after beginning the presentation that the Nationwide SAR Initiative (NSI) contains built-in privacy and civil liberties protections, yet in the same breath notes that the NSI has 16 behaviors which authorities claim are “indicative of terrorist activity”. In other words, “pre-crime” behavior that could deem an individual or group of people eligible for increased scrutiny by authorities. Other revealing statistics cited by Sobzyk include the fact that 57% of fusion center directors have less than one year of experience; over 85,000 emergency personnel ranging from police officers to 9-1-1 operators and EMS workers have taken SAR training; and a standard SAR training for emergency personnel only consists of a one hour course.

It’s no surprise, then, that a recent ACLU document dump of a Los Angeles fusion center’s suspicious activity reporting made quite a stir among civil libertarians and the press – and this particular center has a published and publicly available privacy policy.

The Declaration submitted a Right-to-Know request in September with the police department for DVIC suspicious activity reporting, which was then rejected. We have since refiled, will appeal if denied again, and are prepared to litigate if necessary.

The potential for operational abuse at the DVIC, then, only increases the need for Constitutional protections that will only come with increased oversight by lawmakers and public scrutiny.

The DVIC’s Troubled Birth

As previously reported, the DVIC received intense criticism from a bi-partisan Senate subcommittee in October of 2012. Their findings indicated (Page 72) that federal grant money was likely being misappropriated by Southeastern Pennsylvania Regional Task Force (SEPA-RTF) officials. SEPA-RTF is multi-county task force that obtained grant funds for a regional intelligence center through the FEMA Homeland Security Grant Program in 2006, and with a consortium of private contractors named the System of Systems Security Consortium (SOSSEC, Inc), was tasked with developing and making the fusion center operational while adhering to federal grant regulations.

According to the subcommittee’s conclusions, the Pennsylvania Emergency Management Agency (PEMA) cut off federal grant money to SEPA-RTF and DVIC development in 2011, because PEMA became aware of plans to illegally use those funds for construction of a Philadelphia Police Department Real Time Crime center at the site of what would become the fusion center. The Senate subcommittee report notes that any planned use of Homeland Security grant money for building construction is prohibited by federal law.

Another curious thread contained in the Senate report, and one which may be another reason PEMA felt it necessary to pull funding in 2011: the existence of a fusion center, listed on the DHS website, that in reality “didn’t exist” according to FEMA testimony before the Senate subcommittee.

The contracting agent tasked with planning and developing the DVIC from 2009 until December of 2011, SOSSEC, Inc., also assisted in the creation of a “DVIC Cell”, a precursor to the current facility.

SOSSEC Vice President Eugene Del Coco, in a lengthy interview with The Declaration this week, revealed the existence of this offsite “microcosm” fusion center launched on July 15th, 2011. Because the DVIC project was experimental, in that it brought together resources and contacts from every jurisdictional tier within a large geographic area, Del Coco says DVIC planners thought it beneficial to establish a prototype operation where a minimal staff could familiarize themselves with the concept of an intelligence center, and gain practical experience and insight into technology and information sharing practices. This offsite center was relocated to the DVIC facility in December, according to a schedule we obtained, and is quite likely one of the mysterious “virtual fusion centers” referred to in testimony by DHS to the same Senate Subcommittee in response to questions about why the DHS listed centers on its site that it knew did not physically exist.

While the general notion of providing advance training to fusion center personnel is rational, given the sensitivity of the operation, the existence of the “Cell” is another example in a litany of cases where the fusion center has been conducting operations which pose serious dangers to Constitutional protections, without significant oversight, and with no record available to the public as to how authorities are ensuring those protections. Del Coco says SOSSEC was originally supposed to complete Phase III-b, “Implementation,” but in December 2011, at the request of the city and SEPA-RTF, relinquished all fusion center responsibilities.

SOSSEC's Del Coco said that the original three phase project was split by SEPA-RTF into two sub-phases for its third stage, for which the City of Philadelphia assumed control
SOSSEC’s Del Coco said that the original three phase project was split by SEPA-RTF into two sub-phases for its third stage, for which the city Philadelphia assumed control

It is Time for Answers

In October, the DVIC facility was host to a Mounted Unit ceremony, an Asian American Advisory Board meeting which apparently included a briefing on the police department’s intelligence gathering practices for members, and an untold number of formal and informal tours for out of town colleagues during the recent International Association of Chiefs of Police, including a former government intelligence officer who now works for IBM and who requested their name not be used for this article. It only seems fair, by matter not only of best transparency practices but simple intuition, that a privacy policy – the most conspicuous public offering regarding the facility – should indeed be available to the public.

Written by Dustin Slaughter and Kenneth Lipp, Image by Dustin Slaughter

Page 27 of 82<<...2526272829...>>