|
Open Thread 07-52
News & views & whatever …
I believe this is worth a new thread: The widow of Daniel Pearl is suing Pakustan for the injustice caused by her husband’s death. She has the full support of Almighty America and of the Jewish lobbies. I wonder if Muslims who suffer injustice have even a fraction of the opportunities for retribution available to Jewish-Americans. And people wonder about the causes of Islamic terrorism! This is a story, corroborated by the British Government itself, of American terrorism and British cowardice:
Revealed: MI5’s role in torture flight hell
· British source tells of betrayal to CIA
· ‘I was stripped and hauled to US base’
David Rose
Sunday July 29, 2007
The Observer
An Iraqi who was a key source of intelligence for MI5 has given the first ever full insider’s account of being seized by the CIA and bundled on to an illegal ‘torture flight’ under the programme known as extraordinary rendition. In a remarkable interview for The Observer, British resident Bisher al-Rawi has told how he was betrayed by the security service despite having helped keep track of Abu Qatada, the Muslim cleric accused of being Osama bin Laden’s ‘ambassador in Europe’. He was abducted and stripped naked by US agents, clad in nappies, a tracksuit and shackles, blindfolded and forced to wear ear mufflers, then strapped to a stretcher on board a plane bound for a CIA ‘black site’ jail near Kabul in Afghanistan.
He was taken on to the jail at Guantanamo Bay in Cuba before being released last March and returned to Britain after four years’ detention without charge.
‘All the way through that flight I was on the verge of screaming,’ al-Rawi said. ‘At last we landed, I thought, thank God it’s over. But it wasn’t – it was just a refuelling stop in Cairo. There were hours still to go … My back was so painful, the handcuffs were so tight. All the time they kept me on my back. Once, I managed to wriggle a tiny bit, just shifted my weight to one side. Then I felt someone hit my hand. Even this was forbidden.’
He was thrown into the CIA’s ‘Dark Prison,’ deprived of all light 24 hours a day in temperatures so low that ice formed on his food and water. He was taken to Guantanamo in March 2003 and released after being cleared of any involvement in terrorism by a tribunal.
A report by Parliament’s intelligence and security committee last week disclosed that, although the Americans warned MI5 it planned to render al-Rawi in advance, in breach of international law, the British did not intervene on the grounds he did not have a UK passport. The government claimed he was the responsibility of Iraq, which he fled as a teenager when his father was tortured by Saddam Hussein’s regime.
The report confirmed that al-Rawi, 39, was only held after MI5 sent the CIA a telegram, stating he was an ‘Islamic extremist’ who had a timer for an improvised bomb in his luggage. In reality, before al-Rawi left London, police confirmed the device was a battery charger from Argos.
The committee accepted MI5’s claim, given in secret testimony, that it had not wanted the Americans to arrest him, in November 2002, concluding the incident had damaged US-UK relations.
But al-Rawi alleged that the CIA told him they had been given the contents of his own MI5 file – information he had given his handlers freely when he was working as their source. He said an MI5 lawyer had given him ‘cast iron’ assurances that anything he told them would be treated in the strictest confidence and, if he ever got into trouble, MI5 would do everything in its power to help him. When al-Rawi was in Guantanamo, he asked the American authorities to find his former MI5 handlers so they would corroborate his story but, because he did not know their surnames, MI5 said it could not assist.
The committee report cited MI5 testimony claiming that when al-Rawi was transported in December 2002, it could not have known how harsh his treatment might be. Yet eight months earlier, Amnesty International had published a lengthy report on US detention in Afghanistan, quoting several ex-prisoners who described conditions very similar to those experienced by al-Rawi.
He had conveyed messages between the preacher Abu Qatada and MI5 when Qatada was supposedly in hiding in 2002. At MI5’s behest, he came close to arranging a meeting between the two sides.
Al-Rawi has now spoken out in an effort to help his friend Jamil el-Banna, who remains in Guantanamo. A Jordanian who also lived in London for years, where his wife and five children are British citizens, he too has been cleared by the Americans. However, he has been unable to leave Guantanamo because Jacqui Smith, the Home Secretary, says she is reviewing his right of residence on national security grounds.
Sarah Teather, the Liberal Democrat MP for Brent East in London, where el-Banna lives, said his case revealed ‘decrepitude at the heart of the government’. The government had ‘no regard for the welfare of his children’.
His lawyers have filed a statement from al-Rawi as part of a judicial review case. In the action, they accuse MI5 of having a ‘causative role’ in both men’s ordeals, stating it was ‘complicit’ in the illegal rendition and guilty of an ‘abuse of power’.
Posted by: Parviz | Jul 30 2007 7:01 utc | 17
I have now spent thirty goddamn minutes fighting with typepad to post this…
This reads like the notes of a whistleblower:
PART 1
Check out this Very Interesting anonymous postings at TPM
STUDY MUELLER’S HESITATION
I would encourage a “fresh look” at not just the transcript, but the _audio_:
[“Mueller: The discussion was on a National — uh, NSA program that has been much discussed, yes.”]
It appears he _almost_ mentioned “national security council” program. . . NSC is not the same as NSA. Another way to read between the lines . . .”National security program”: Something that is _outside_ FISA; and _outside_ what the FISA current covers. . .although it was intended to cover _all_ things.
Listen closely to the pauses, spacing, and hemming and hawing. Mueller is dancing around something that — it appears — President and AG have said falls “outside” the FISA-coverage: This might be a Canadian-Australian-NZ-UK data transfer program: Whereby non-US interception methods are used, but the data is forwarded to the NSA through non-direct US means.
. . . .
Also, if the Senate’s Leahy/Specter do not trust Gonzalez, why would they trust him on this AG-certifications under FISA? If he’s been lying to the Senate, then his AG-certifications on “OK to do this without a warrant” are also in doubt. He could define anything — rightly or wrongly — as being under that umbrella.
Question becomes: What certification has the AG made on things that not even the Gang of 8 was told about; and how was the NSC (not NSA) involved with the oversight of this, outside FISA-Gang of 8 review?
“National security” could mean: “Maintaining morale” or “maintaining confidence”: That could mean providing false information to the public; or, based on data mining, issuing public news releases to justify public support for illegal activity; or maintain confidence in something that was an illegal contract. This would involve capture through NSA of meta-language; then stripping out identifying information;; then transferring that data to a firm like Flieshman Hilliard which would examine it, and issue public news releases on various government “public oversight” and “media messaging issues”: Smith Act issues in re domestic propaganda: Possibly a “public service” announcement to maintain loyalty in non-sense. Something for AT&T to discuss.
Posted by:
Date: July 27, 2007 4:45 PM
snip:
Recall, it’s CIA that was sharing info with the EU on the rendition; and Plame was retaliated against by OVP: and the OVP blocking the archivist audit. Addington knew about the European Detention centers.Not getting info on the naval-based detention centers.
Recall, Iran-Contra was an NSC-run operation: Cheney was involved. Could be the same kid of thing — something run out of NSC, not the DoJ or NSA. Not clear that the “NSA” vs “NSC” is a typo: Suspect its different: NSC, not NSA, appears to be running these things.
Recall DoJ met with the intelligence personnel at various sports facilitates in DC. Keep thinking Plame and Cheney were about sending a message to Cheney’ private intelligence network — likely linked through Halliburton — to send a message: “Plame outing” is what will happen if you crosss the VP. Seems to simplistic to say this is only about oil, and retaliating against others who spill the beans. Libby’s name was mentioned in the context of “basketball,” another program — that came up during the Grand Jury reviews; his counsel was worried Fitzgerald had access to NSA-GCHQ-intercepted information of legal counsel.
. . .
Philbin was former OLC, meaning he probably clashed with Addington on the legal aspects of Rendition/prisoner abuse as well. Philbin documented his concerns, which the Congress can ask for since those memoranda and their existence on this subject have been disclosed. Mentioning Philbin may have been merely a suggestion of which people/memoranda to specifically ask for.
Philbin was aware of the “security” issues of GTMO; and likely would have been involved with discussions in detaining prisoners in Eastern Europe.
1. Support Aspect: NSA resources supporting, or outsourced
“NSA” or “NSC” program doesn’t necessarily have to mean just data interception, but _use_ and _support_ of other activities: Combat, intelligence analysis, interrogation, or direct support for the CIA. Problem NSA and DOJ have is when CIA — possibly connected with this “other program” — have talked to the EU. EU may have more information about this “other program” than the Congress has been directly told or understands.
2. Direct reporting to NSC, outside Congressional oversight
IF this is an NSA “program” it could be a support function for the NSC, or one of the combatant commanders; or made to _look_ that way to hide the real objective of the activity. They may have classified it as an “NSA Program” to bury its real objective as a domestic-CIA-cover action program, which is illegal, an “open secret” but explained away as a “training program” like Operation Falcon: Use of Federal resources at the local level for training, manning support, and domestic intelligence gathering in conjunction with CIFA.
3. Posse Comitatus
This could be a special access program within DoD that is a violation of the Posse Comitatus Act, hidden as an “NSA program” but a domestic security force backed by combat forces/special forces units which have the power to issue arrest warrants, detain people, and target those who oppose the illegal activities.
4. Individual Cells, untraceable, multi-agency
I haven’t seen anything to suggest that the President could not, through DoD and CIFA, establish a Gestapo-like “NSA program” within the DoD community, and then outsource this to local law enforcement — JTTF. They’ve got people that cross flow between the guard units, local law enforcement, FBI, and to civilian jobs all day. They could be creating individual cells within JTTF units that are comprised of NSC contractors, data analysis, and law enforcement whose sole goal is to act as a direct reporting entity to the NSC. They could very well be reporting directly to people working for Cheney, and Congress and JCS might never realize who or what was actually assigned, or relying on DoD assets.
5. DoD Entities With Personnel Assigned Stateside
DoD could ery well have created “foreign entities” in other countries, who then are in charge of these personnel stationed in the US. DoD was given this power to establish foreign intelligence and combat support entities overseas; however, if that’s mutated, the NSC may have subcontracted to these DoD entities US-based personnel who directly support NSC: In effect, creating an NSC-NSA support function under DoD foreign entities, but basing their contractors in the US..
SUMMARY
Mueller appears to be referring to a sub-contracted effort which indirectly supports the NSC with a special domestic security unit. These units engage in direct engagement with state-side personnel and civilians. Contractors, law enforcement, and intelligence personnel are assigned under non-direct-NSC-NSA units, but are hidden inside commercial entities. The groups appear capable of moving quickly, with no direct supervision, but act as internal security forces, completely outside FISA oversight. They appear to be entities unrelated to FISA, but are front line units which verify information, gather intelligence domestically, and help NSC pinpoint targets which NSC contractors are assigned.
RECOMMENDATIONS
A. Congress examine the Operation Falcon; determine which NSA/NSC personnel were assigned to oversee.
B. Examine the budget lines inside the DOD foreign entities support accounts; and determine which banks are used to challenge those funds. Determine how the DOD funds are funnelled overseas through the NSC entities, then back to the US to these individual groups.
C. Review the “investigative leads” and ground rules JTTF and local law enforcement use to dissuade detection of the domestic intelligence gathering efforts.
D. Review the destruction logs of the CIFA; and determine who was supposed to keep the logs related to these classified documents.
Determine which signalling systems, monitoring, and other intelligence gathering the JTTF are using; and where this information is sent. Ultimately, it winds up somewhere: Which contractors, NSC staffers have access to these reports.
E. Examine with Congressional Counsel whether it is the intent that these domestic security services operate this way; and whether, as FISA is written, this type of activity would fall outside what the FISA Court can engage.
F. Review the DHS domestic interrogation facilities. Look at the gas mileage for the DHS pick up teams. Review the files they’ve had access to; and the basis for detaining someone. Review the complaints of citizens being forcibly removed from their cars, engines running, or being taken from their homes while school children are present in the early morning. Evidence includes car impound fees.
G. Discuss with POST and local LE efforts used to dissuade public awareness of intelligence gathering: Excuses given to hide pre-textual stops; and examine whether local officials do or do not keep adequate records related to officer complaints and requests for civilian oversight to examine officer misconduct.
H. Examine problems during audits: To what extent officers in LE, FBI, and DHS are concerned when reports of officer misconduct arise; and what methods auditors are aware to segregate complaints about officer misconduct from auditors:
1. Have they been asked to leave the room; were concerns explained away; were officers complaining they were “short manned” an unable to supervise; and how do these explanations square with the officer conduct.
2. How often are these units employed to provoke innocent civilians to respond to abuse?
3. To what extent are these domestic units used to harass civilians based on a “hunch”?
4. Would these units put the children of minors at risk to entrap a suspected target?
5. Is there no report of any of these personnel ever exposing a minor to a potentially unsafe situation to engage a target?
6. Has the FISA court, Congress, and Judiciary been fully apprised of how these units operate; their procedures; and oversight requirement to ensure 42 USC 1983 claims are minimized?
7. What insurance do these units have if they are engaged in liable action?
Snip:
LEARN LESSON OF OLC IN RE SUBPOENA RESPONSES
Recall, OLC issued a “memo” saying that WH Counsel did not have to testify. This, according to the WH, was “gospel.” Untrue, but that’s another issue. OLC made a “rule” and then everyone said, “See, that’s what they said.”
Now, consider this, from TPMM quote, above: [“that program was not something that was legally controversial.”] That could mean anything, anybody, and without reference to any legal standard.
“not legally controversial” . . . _according to whom_. . . ?…:
– OLC?
– Consensus within NSC?
– Consensus within NSA?
– Rove’s determination?
– Gonzalez assessment after talking to Goodling about door mats for the Hoover Building?
. . .
What’s their idea of “non legal controversy”, as opposed to a “controversy that is real, but not based on a law, just the Constitution”?
What is someone like Darth Cheney said, “We need to justify this — find a reason. Ignore words in the law if you need to. Just give me a memo. You get an appointment to the bench if you can figure this out.” What if Roberts or Alito gave a really good opinion on this and made everyone — in that room — believe it was “not controversial”, even though it was?
. . .
Again, saying [“that program was not something that was legally controversial.”] could mean:
A. “other programs” were controversial;
B. “other groups” _are_ doing illegal things, but you haven’t asked us about them, so we haven’t made up a lie. . . yet;
C. OLC “determined” (using a feather, some fairy dust, and after gazing into GOodling’s eyes) that anything the NSC wanted to do under Cheney was OK, just as long as nobody traced the money.
. . .
There’s another way of looking at this [“that program was not something that was legally controversial.”]
D. “This program” is different from “that program” which has been hidden in another budget, unrelated to the NSA or NSC:
E. DoD _is_ allowed to do things overseas, and contractors have been assigned — working for those _overseas_ entities — in the US.
F. The data that is managed is channelled, but the contractors have no idea who it is they are monitoring: All they see is the raw data; someone else then recombines the data if there is a problem.
G. If we find a problem in the data, we then use the data we’ve collected to justify the warrant; if we can’t get one, we self-issue one, and get the AG to certify it as being OK> Never mind that Qwest objected.
[“that program was not something that was legally controversial.”] could also mean:
H. Legal counsel assigned to our units have been told to keep their comments to themselves
I. All contracts supporting this activity are — by definition — “legal contracts”; (just don’t talk about whether they support a lawful or unlawful objective. Far too scary to contemplate!)
J. “not controversial” could mean all the legal views that opposed it were ignored; and the remaining opinions were in “full support”.
K. The legal counsel who knew of the Constitutional violations were sent to Guantanamo, threatened with nasty things: “To the washroom, counsellor! No gloves for you.”
L. Legal counsel who remained quiet were promised a “good rating” by “the decider” in their upcoming DOJ ranking list — the names given to the Senate for Federal Benches.
“not legally controversial” could mean all case law showing it was illegal was ignored; or selectively rewritten, as Addington well did with the Iran-Contra minority report.
[“that program was not something that was legally controversial.”] could mean: other programs were contentious; but since AG Gonzalez is on the pig-spit this week, we need to pretend we are concerned, even though we are not.
The people who said this was “no problem” and were not saying tat it was lawful, just that it wouldn’t be a problem to find a judge who they could bribe to not take action.
“not legally controversial” does not mean that it was legal; only that the in “someone’s mind” (God knows where) their idea of “controversial” is a different definition which does not use controversy. Maybe legal counsel who opposed were _not_ using spears with _poison_ tips, so the spin misters said, “See not controversial, if they ere really upset they would have had nasty poison, the kind that makes Ebola look like a fuzzy kitten.” The infamy! How dare they!
Transcripts can tell you alot: The changes, pauses, and hesitations — especially when compared to the audio — can be very revealing: Find out if they are changing their pace of word; and is it liekly they’ve been fed lines through an ear piece like Bush is. Someone is pulling the strings; someone has a script.
The problem is when the questions asked do not match the scripted answers. How about some last minute changes to the questions to throw them off, Congress?
This is not necessarily true: [}Very obviously, the program Mueller referred to was the Terrorist Surveillance Program.”]
The “other programs” could be things _far too scary_ to contempate. Recall, this Preident is linked with war crimes: It means nothing for him to set up camps, and make people disappear. “all for the cause. . .”
Put the burden on the President: Prove those internment camps you’ve built aren’t being used; and that the prisoners aren’t out “exercising” when the Auditors arrive.
Posted by:
Date: July 27, 2007 6:17 PM
I don’t personally think the fact that they are or are not referring to “this” or “that” or “TSP” or “Not TSP” is the issue: The fact is that there isn’t a consistent story, raising the question: What other activity is occurring that may be an NSA-related function, but has been organized to fall _outside_ FISA oversight, but is still illegal under the Constitution:
– Roving bands of contractors harassing US citizens;
– Temporary detention centers to detain US citizens without warrant or trial;
– Use of tax information by JTTF to compel US citizens to explain things that the agents are not able to determine through NSA intercepts
– Groups whose sole function is to fill in the gaps in the NSA intercepts, and provide some meat to explain what is going on with something that is unusual, but they don’t want the court to know they’re looking at . . . again.
Recall, the RNC has deleted/destroyed e-mail. If this “other program” were “OK,” how does the RNC explain the failure to retain detain related to an ongoing “OK” activity? [I realizes this assumes the RNC e-mail was related to the activity; but isn’t that the point: The RNC believes that this activity is lawful, so why not discuss it by email?” What if the RNC, when it first created the backup email system, through nobody would find out about it; and they assumed the e-mail would never see the light of day because of “privilege” claims. But when, what if someone from one of the law firms associated with he CIA went to the EU, and the RNC realized, “Oh, no. . . they’ve figure it out; it’s not lawful; and we’re in trouble. Destroy everything.” IT doesn’t make sense to destroy evidence related to a “legal program” when that activity — if it were lawful and non-disclosed — should be protected by privilege. Rather, it appears they realized private would not work, and the documents would not be shielded.
The question goes back to DOJ, OLC, and outside counsel: [ “When you learned of the “other programs” involved with this intelligence activity, did you fear that the information in the RNC accounts would be disclosed; or was there something you learned from the EU — and CIA visits with the EU — which prompted the evidence destruction related to rendition, FISA< prisoner abuse, and other things OLC apparently "all agreed" -- in a perverse Yoo-like fashion -- was "lawful". . . (never mind Geneva, FISA< or The Constitutional requirements)." ]
Sounds like a law firm which was auditing a company related to various NSA programs and prisoner transfers should have detected this chance of fraud, and internal control problems. Or is a law firm saying, despite attestations to the SEC on those financial statements, that they had "no idea" what was going on, despite counsel's awareness of the activity -- as evidenced by their meeting with the DoD General Counsel's staff on these very issues?
Posted by:
Date: July 27, 2007 6:32 PM
Posted by: mo2
Date: July 27, 2007 7:08 PM
My question is:
mo2″ How do we know October 2001 was the beginning of the illegal spying program?”
Excellent point: We don’t; allegations are that the _illegal_ surveillance started _before_ Sept 2001.
————-
mo2: “Given that Bush/Rice were warned about al quaeda before Bush was sworn in in 2001, why is it thought that they did absolutely nothing before October 2001?”
Good point again.
mo2:” Because they say so is not good enough.”
Right. Getting warmer.
————-
mo2: Could it be that they did do something, but that something was illegal?
You are correct.
mo2: “And they feel it is better to be called do-nothings than criminals?”
Also, they like the idea people are focusing on the wrong surveillance, wrong time period: The confusion menas they can blame Congress for “not asking teh right questions.”
mo2: “Can somebody please provide the link to the testimony that says the TSP started on October 1, 2001?”
Someone said that, you’re correct; but TSP isn’t necessarily what’s being talked about.
– – – – –
THe point is: If the GOP will not convice Gonzalez for lying, then Gonzalez needs to explain why his comments are _true_:
– What programs could exist under both the inconsenst statementes of Gonzalez; and also the disparity between what Gonzalez and Mueller are saying.
The GOP Senators canot have it both ways: Sayhing, “AG is telling the truth; but not having any information to support _that_ conclusion.
The problem they have: Not only were they doign illegal things _before_ Sept 2001; those illegal things did _not_ work.
There’s no basis for the President to say, “We need to do more of this illegal stuff” as it didn’t work before Sept 2001; rather, what’s needed is the opposite: “Given we tried ilegal things, and _that_ didn’t work, who has some other ideas?”
They can’t ask _that_ question because they’ll admit:
1. They screwed up
2. They have no clue
3. They’re not able to hire someone to help them out
The only option they have is to pretend the problem is one thing; and then solve that “new problem” in a way that appears to solve it. Forget the fact that the problem they may be “sovling” is illusory. They may have defined the program in terms of what _appears_ to be a solveable problem.
IN other words, if they’ve realized that they can’t win, they[‘ll [a] redefine the enemy in terms of what Congress can be led to believe is a credilbe threat; and [b] redefine the solution in terms of not solvinga real problem, but in terms of what appers to solve what they’ve created the impression is the problem.
Problems, solutions, reality, and the illusion may or may not be matching: This may explain why things are not appearing all that straightforward: They’re still tring to figure out how they’re in power despite their stupidity.
KNOW THE NATURE OF US GOVERNMENT LEGAL COUNSEL AND WHAT THEY ARE CAPABLE OF DOING
I read this, and thought of the attorneys in DOJ who were saying gum this to death; and what Gonzalez has been saying/doing — Lying, obstruction: [“Army attorneys sent each other congratulatory e-mails for keeping criminal investigators at bay”]
The quote and subject are not as important as the point: US Government legal counsel will obstruct justice, and stupidly document that obstruction: How many of the RNC e-mails would WH-EOP-OVP-DoJ staff counsel have sent back and forth on their progress in blocking review of FISA, Geneva, and other illegal activity; then delete these e-mails when they learned it was on the Libby/Abramoff Grand Jury subpoena list?
Know who you’re up against: People who have no remorse over engaging in illegal conduct, and (apparently) hiding evidence related to executions of people who opposite reckless conduct. These are lawyers who are doing this: The very people who supposedly are the “best” and “brightest” in the legal profession: The same people who are put on the Federal Benches. Congress needs to take a wider view of the DOJ Staff misconduct in re FISA, Geneva, rendition, and prisoner abuse.
Doesn’t look as through Congress has really woken up to the recklessness in the legal community. Let’s get some state level disbarment investigations going; and forward the results to the public so we can throw it back at them during future confirmation hearings.
The lawyers were behind the Watergate break-ins, and the Holocaust. We can’t let this happen again, and the lawyers need to be put on a tight leash. They’ve defied their oath, putting their party and President before the Constitution. That which is not lawfully opposed, will continue; the legal profession, left unleashed, will do what is least expected: Turn the law inside out to justify genocide, war crimes, prisoner abuse, and defiance of their oath and Constitution.
A president does not do this on their own; nor does a Congress — with lawful options to end it — have much of a defense when they have powers to investigate, block funding, and compel oversight. The Ranking Members of the Committees have had this power to compel reviews since day one. Doesn’t matter that the GOP “controlled” Congress: The DNC has the power to filibuster bills; and could have issued letters to the DoJ-NSA-CIA-DoD IG requesting assistance. There’s no merit to any assertion that “nobody was going to do anything” — how do the Members of Congress explain the effort to _do_ something: Pass proclamations calling for Congress to impeach _despite_ the GOP “controlling” the US Government.
One answer: There is a way to lawfully oppose. There is no merit to any assertion that there is no opting; or that were are stuck with this abuse. There is a way: If Congress will not oppose this abuse; and Congress will not end funding, then there is _someone else_ who can be trusted to assert their oath, and defend the Constitution. Assent to DNC-GOP joint assent to this despotism is unacceptable. It doesn’t matter if its unwillingness to impeach, refusal to investigate, inaction on subpoenas, or stupid assent to DoJ-US Atty decisions to do nothing to enforce the law. _Someone else_ can be found who _will_ do their job. Stop listening to excuses of why this “cannot” be done;and _find_ a way to make those who have an oath to _do_ their job: Defend the Constitution, even it means prosecuting the President, VP, Speaker, and House Judiciary Chairman for [a] violating Geneva; and [b] refusing to enforce the Constitution using all lawful options. It is reckless — this many years after 9-11 and the disclosures of the prisoner abuse and illegal NSA — for Congress to be still rubber stamping legislation/funding: There are options to end the funding, which the DNC refuses; and there are options to lawfully target legal counsel complicit with this illegal activity.
This isn’t about DoJ, FISA, or RNC e-mails, but whether legal counsel — with that “special position of trust before the court” — can really be trusted; or whether they need to be overseen, audited, and intruded upon as if they were a branch of government. America’s legal counsel have expected too much deference for reckless service; and this many years after the illegal activity has surfaced it is absurd for the American legal community to flaunt “how great it is” or ask anyone to embrace the “American model” when the lawyers have their disastrous results on _their_ hand. Their only solution appears to be to laugh at what they’ve done to gum things up; never realizing We the People have the option to get them disbarred, and make _them_ the lawful target of war crimes prosecutions. America’s lawyers, indeed, did learn the lesson of the Holocaust: How to commit illegal warfare and not get caught. We the People have something to say about that. This is far from over. These are issues of international criminal law with one large defense pool: American legal counsel inside DoJ, OVP, DoD, and outside counsel
They wished this.
– – – –
[BTW: The quote is from the Tillman case in keeping criminal prosecutors from reviewing the close-range gun shot wounds to Tillman, leading some to believe that he was executed to silence him for his anti-war stances he was apparently going to advance outside the military. Tillman is reported to have been frustrated [a] there were too many shows going on in Afghanistan; [b] they were really not going after AlQueda; and [c] the staged engagements were just a dog and pony show, not really serious about defeating an enemy.]
In my view the question of “are there one, two, or more programs” isn’t relevant: The _known_ information shows there’s been _illegal_ activity.
Whether there is _alot_ of illegal activity; or whether there is _multiple_ or _many_ program’s merely confirms the foregone conclusion: There’s illegal activity.
Time to stop digging for “confirmation” of what we know; and compel Congress to explain why — despite the known illegalities — they continue to fund what they know, or should know is illegal.
Murtha’s cutting of the DoD COngressional liaision office budget shows that the budget tools are there: “Mr. President, cooeprate with our inquiry; or you get no money.” The arugment that the GOP is ‘blocking’ the DNC is fiction: The DNC can cut the money and _make_ the GOP “pass” an Amemdnet to add money back.
Again, I appreciate there are people who want to spend time getting clues and “figuring things out” — in my view, it would be more productive to take the information that we have, and give it to the DNC is a simple format: The FISA violations are known to be illegal; either cut the money, or we’re going after you wtih prosecutions.
TheraP” And ask why the illegal activity is being funded.” [TP1]
TheraP: “And that is a very good question. Why have things been reauthorized over and over?” [TP2]
– – – –
TheraP: “And what blackmail or bribery or whatever is being used to keep people in line?” [TP3]
TheraP: “And, where is the paper trail for that?” [TP4]
– – –
1. There is the option to cut funding: Murtha says Rumsfeld appointees frustrate oversight, cuts Pentagon agency budget 2. People who have been complicit with Geneva violations — malfeasance in failing to cut budgets — like to change the subject.
3. Google: [ descriptive summaries NSA 614113 R-2 ]
4. Google [ JROC NSA ]
5. Google [ ” Under any civilized judicial system he could have been impeached and removed from office or convicted of malfeasance in office on account of the scheming malevolence with which he administered injustice. “]
6. Google [5 USC 3331 malfeasance ]
7. Google [32 CFR 2800 Ad Hoc Committees ]
8. Google [ Statement Accounting standard 74 compliance ]
9. Before Sept 2001, NSA had program funding for a lawful NSA surveillance method which fully complied with FISA. JROC is the DoD group which oversees the funding/program authorization; they make decisions: “Is there a _cheaper_ way to do this?” They decided that they had to spend money. Then it was cancelled. Someone made the decision to _cancel_ what is _lawful_; but Congress is making a decision to _keep funding_ what is _illegal_.
10. Evidence is not only what exists; but the _absense_ what what should exist: The Ranking Members of the Committees 2001-2006 had the _option_ to document their concerns; and forward that concern to the DOD-NSA-CIA-DOJ IG. [See 6]
11. Compliance audits of OVP would have detected the documentation of whether OVP, Addington, and others aware of rendition, NSA survilance were or were not retaining records. The auditors have been blocked. [See 7, 8]
– – – –
_Q&A_
TP1: See 2, then 11.
TP2: See 1, then 10.
TP3: See 5, then 2.
TP4: See 3, then revisit 2, then 1; then reconsider 7, then link with 8; then reconsider 10.
“But now it makes me wonder if there are any events in the US related to the London bombings?”
Posted by: TheraP
Date: July 29, 2007 3:11 PM
– – – –
1. Google: [“attorneys sent each other congratulatory e-mails for keeping criminal investigators at bay”]
2. Google: [ Procurement Guidance Documents Software PGD ]
– – – –
3. Consider: RNC offices were attacked in the run up to the 2006 elections.
4. Compare the following
A. Location of attacks on RNC offices before the election;
B. Point spread of RNC going into the election in those districts.
5. Consider: RNC wrote a note/letter to the unions “complaining” about “unions” attacking the RNC offices.
6. If you could convince someone “your opponent’ was engaged in “dirty tricks” would that not convince some of the opposition to rejoin you and denounce “the opposition”?
7. Then consider: Supposedly the RNC ‘knew” enough to write a letter to “who was involved”? Why didn’t the US Atty’s bring prosecutions:
8. The information in the RNC/DoJ offices will show you:
A. What basis there was to conclude “the unions” were behind the attacks [none, fabricated, not followed up];
B. The subsequent discussion on prosecutions, or non-prosecutions;
C. Which DoJ staff liaison were involved with the campaigns;
D. The IP Numbers for the DOJ Staff not involved on processing FISA warrants, but engaged in discussions/non-official business using official government resources.
9. Evidence isn’t just what exists, but what is _absent_ but what _should exist_
– – – – – – –
_Q&A_
A. Funding, records: What physical evidence was retained of the RNC office destruction; who was assigned; and how was the investigation closed out: Either there is a report, and that report was given to the RNC as the basis for their “letter about the unions”; or there is no evidence, and no basis for the letter. [See 9]
B. These are issues of criminal law, not just e-mail or voting. That State AG would have to get information from the JTTF to understand what basis there was to conclude that terrorism was _not_ an issue; and who should have been involved with the preliminary review _before_ the RNC issued their letter to the DNC. [See 9]
C. Link to FISA warrants: The same DoJ Staff computers that were “supposed” to be working with the FISA warrants, are linked with non-official business. How did the RNC get the “fast answer” on what was ‘going on’ with these attacks; but the AG says that he’s “undermanned” and “can’t process FISA warrants”? [See 8, then 9]
D. Where is the US Atty review of the evidence related to these attacks on the RNC offices; and how did the US atty go through the process to decline prosecution: Which FBI agents were involved; which State officials were assigned to which fusion center; and how was CIFA involved; were there no NSLs issued to determine who was involved? [See 9]
E. What is the explanation of the FBI director, and those assigned to the FBI support staff: Do they have no OPR experience; or is there a supervising problem within the FBI; is there any record of any of the FBI agents “involved” with this “investigation” not fully reviewing anything, ever while they were a SAC, ASAC, or assigned to DOJ OPR; what review per SAS74/99 was done of the DOJ OPR/IG/FBI budgets in light of these fraud indicators? [See 8]
F. When the reports within the FBI of leadership not doing what they should, how was this addressed? [See 9-11, Sibel Edmonds. . .]
G. Issue: Voting fraud, absent/incomplete investigation files; property destruction. No JTTF concern or prosecutors?
H. JCS and CIFA are also involved with domestic surveillance. What was the DoD General Counsel’s involvement with the notifications related to these domestic issues: Was terrorism not on the notification list; was the DOD General counsel not consulted; was DoD General counsel never in receipt of, connected to any briefing given to anyone at the White House related to DoD domestic intelligence gathering efforts?
Someone was briefed: No other explanation for the RNC letter. The question is whether the _appropriate_ investigations, notifications were or were not made: These calls, reports are logged in the correspondence logs; and they are tracked with various messages, workflows, and other assignments. Within Microsoft Outlook, there is a scheduling function: That information is familiar to you via the US Atty e-mail disclosures. Rove’s link to Microsoft Outlook is clear; the question is whether the DOJ Staff IP numbers — commonly linked to outside sites in other states — were or were not reviewed by the Grand Jury when they examined the third-party-data transfer systems. Recall how quickly legal counsel coordinated on the Libby defense memoranda: They have a file sharing capability; however, Goodlings notifications of “delete this file” means that the auto-notification feature was turned off; or the file sharing system was not being used.
Questions:
A. Which DoJ Small Business Contract personnel were involved with the computer/IT/SW updates related to the DOJ-RNC file transfer systems; [See 2]
B. Where is a copy of the computer utilization meeting minutes where the pro/con of a file transfer system was discussed; who approved the budget profile within DoJ; and how was this decision coordinated with the RNC; [See 2]
C. If the file transfer system was in place — and not subject to any “recent” review (Since 2001), why did Goodling not rely on the auto-notify feature when forwarding the updates to the readers?
D. Where are the e-mail notifications to the DoJ staff related to authorization for them to use, access, and transfer data using this file transfer system; when were the authorizations sent; who ensured the continued use and access to this system was proper; how were non-official uses of this system monitored; were there any efforts by non-DoJ personnel to use this system to transfer non-official records?
Posted by: Uncle $cam | Aug 1 2007 0:49 utc | 46
Part 2
Cont…
S1: Procedure check sheets: “there must be paper trails of procedures.”
S2: Investigations: “Procedures for everything! And whether it is investigations that took place (or didn’t)”
S3: Evidence: “what kinds of paper trails may exist”
S4: Storage: “what form they might be stored”
S5: Indicators: “what the data suggest was happening”
– – – –
“Just a tiny example of how one strange event can lead to another – and more evidence of something really strange – and probably illegal going on.”
– – — –
Yes. It’s all connected: The open source will dance around the illegal information that has been illegally classified.
Google [ GAGAS ] These are some of the procedures to audit.
Google [ CFR ] These are things that are standards that are audited. Note, an
EO may or may not apply; and a CFR may or may not apply.
Google [38 CFR 2800 ] These are the Security classification _procedures_ that the VP must comply related to _classified information_.
Google [ Statement Accounting Standard 74 Compliance ] This is the standard used to review entities receiving Federal Funds: To review their internal controls.
Google [ SAS 99 ] These are the fraud indicators used to assess whether auditors should increase or decrease audit scope. More indicators of fraud, trigger more sampling. If there are audit risks, but the auditor does _not_ increase audit scope, that is a problem for the _auditor_ not juts the original _audit target_.
– – – –
Recent discussions about whether the President’s EO “do or do not apply to OVP” are irrelevant: 38 CFR 2800 _does_.
– – – –
Google [ Manual of Administrative Operations and Procedures ] and/or [ Manual of Investigative Operations and Guidelines ] — These are the FBI standards.
Google [ USAM ]
These guidelines show how the prosecutors and investigators find evidence, comply with internal procedures, and do things to enforce the law.
Google [ CONGRESSIONAL AND COMMITTEE PROCEDURE; INVESTIGATIONS ] These are the guidelines for _Congress_ to meet.
Google [ PART 160 DEFENSE ACQUISITION REGULATORY SYSTEM ] — These are some example guidelines of what people are supposed to follow. Auditors are supposed to review these requirements; then do audit/samples to test whether the procedures are or are not being followed.
Once the auditor completes their review, they provide an audit report. The report is sometimes called a report of an “audit engagement”. Either the audit report exists or it does not; either management met the requirements, or it did not; either the management developed a plan to correct their problems, or they did not. Once an audit is done, there is required _follow-up to test whether the implemented solutions solve the _original_ problem identified. Either the program/solution is _solving_ the problem or it is not.
– – – –
There’s also problem the President has: There are mandatory audits which _he_ has to oversee, but the audit target is _outside his control_ This means, that we can test whether the _president’s auditors_ were or were not doing their job.
Google [ PART 266 AUDITS OF STATE AND LOCAL GOVERNMENTS, INSTITUTIONS OF HIGHER EDUCATION, AND OTHER NONPROFIT INSTITUTIONS ]
That is the trap that Congress has laid. By funding these “non-US government entities”, what Congress has created are entities which can _observe_ whether the President is or is not overseeing his auditors; and how competent the audits are.
Don’t miss the point: Congress is allowed to set up dummy entities not to waste money, but to create _bait_ that the President is _required_ to engage, target, and put under surveillance. The Presidents’ problem is that he doesn’t know which of the companies are real; or which ones are bait that are direct reporting units to the Congressional staffers.
Anything that the bait detects is then back challenged to Congress: Has the team from the President’s office attempted to do something inappropriate; have the audit rules been followed; or have there been unusual interactions suggesting that the President and RNC have attempted to deploy “people not related to the President”.
The problem: Once Congress creates this dummy entity, from that point on, all interactions with that entity are from a specific _time_. Congress can then use the President’s efforts to interact — directly or indirectly — and test:
A. What are the President’s method to share information about the upcoming target;
B. Who is coordinating;
C. And are the President’s personnel able to professional respond to unusual situations.
These are part of the _designed_ problems the President is forced to confront. Then, going backwards from the audit, we can examine
1. Which data fields did the President’s auditors use, access, and adjust when _preparing_ for the audit;
2. Which records _only related to this dummy audit_ were created; and how were those records updated; and how was the information sent/transmitted/stored
3. Once we let this data sit for a while, and then create the impression that there ha has been illegal activity, what effort do legal counsel, the President, DOJ staff, and others make to destroy that audit data that was _only_ connected to that bogus entity.
This is what has happened with the President right now. He and his auditors have been set up; the records that they’ve destroyed were based on discrete communications on specific dates and times. Before that information was received, the records were fine; after the data was received, the records were destroyed.
SO we can pinpoint:
1. What the President, DoJ Staff, legal counsel, OVP, EOP, and others were told; how they were told; and the means that the records were stored;
2. The time that the triggering event occurred;
3. Then trace the record holes — knowing that a credible search would trigger responses related to the known target.
Once those known targets are missing, then we broaden the line of inquiry:
A. When did legal counsel review the information, procedures, and conduct an audit;
B. Who last had access;
C. Who had the responsibility to establish this baseline.
It can’t be changed. Either its there; or its not. The President’s problem is he doesn’t know which of the data sets have been planted; and that doesn’t matter: There are known holes that were once linked with information that outside personnel put there _knowing_ they would be removed.
There is a second set of data that can be compared to the existing data set. That second data set is a clean version of all the data. Had the auditors done their job, and the records not been destroyed, the clean/secure version would match the President’s version. Again, we don’t need t to see any details of how they do things: We only need to plant the data, and let the President put that information where it is supposed to go; then let him destroy it. Then the second/secure data set is presented to the Grand Jury, and the Grand Jury can see the holes; and the _time_ that the holes were created.
That is his problem with the FISA, Prisoner abuse, and the Geneva violations. Discrete information was transmitted; and on specific dates the NSA, NSC, and President were _known_ to believe something that was orchestrated. They’ve reacted to something they thought was real. Whether it was or was not real is irrelevant. The point is that the data existed; then its missing; and the missing holes are linked with specific lines of data and evidence that only specific people were told.
Those people are linked with specific offices, budgets, computers. It’s all been stored, secure, and even if they destroy the records, they have no idea what other things are happening. This has been done using methods the NSA cannot detect. There are Trojan horses inside the NSA systems, WH computers, and other things: They are not viruses, but they are discrete information packages that are organized in unique ways. They’re either there, as they’re supposed to be; or they’ve been destroyed.
Part of the answer to this is the Congressional Correspond log. These are the records that show when Members of Congress were notified by letter of certain things. JCS, NSA, WH, and all other departments have the same type of tracking systems. If you noticed on the DOJ e-mails, you may have come across something called a “work flow”: These are discrete tasks. Once a person is assigned a task, that is logged; either the log is OK, and has the information; or the log has been tampered with.
Again, once NSC and NSA have been triggered with a known event that will catch their attention, that package of information will get stored. Either it is still there as it should be, and the auditors can locate it; or its not there, because its been tampered with. Once the auditors know which information they’re looking for, but that information is gone, then they can tell something about the entities responsiveness; procedural compliance. If its there, fine; but if its missing, then they do a flow charge of the procedures from data collection to data storage. They can tell who accessed it; which personnel had which authorities; and when the information — known to have been stored — was removed.
That removal is linked with pre-destruction e-mails, guidance, and other memoranda linked with the legal counsel. The problem is when legal counsel also has missing gaps at the same time as the data is missing.
Here’s the problem for the President and Congress and outside legal counsel: Once the dummy entity is created, it can be determined who was aware of that information; and the means by which Congress, the President, outside counsel and others coordinated their efforts to retaliate, identify, and discredit those who are involved.
Once the President and/or Congress and/or legal counsel issue a subpoena for something that is _false_; and has been created with the intent to _identify_ the methods the President is using to support illegal activity, that court action is linked to that discrete task. The problem is the legal counsel, Congress, and President have rushed without thinking, and have generated evidence, memoranda, notes, and communications.
The issue isn’t what _is_ going one, but is the _line of evidence_ that should be in the Congressional computers, Presidents’ files, and the legal counsel records be there? Their problem is they cannot control the records _of their responses, messages, communications, and documentation_ which have been stored _outside their control_. Again, we have two sets of data: The data that should be there if things were going as required; and the remaining data that will have holes.
Once we align the two timelines, the holes will then be traceable to legal counsel communications, presidential notes, conversations, and Member of Congress communications. Don’t miss the point: Congress and the President, not just legal counsel, have a problem. There are required stops that all three have taken; and then not acted on. They’re stuck. This goes back to 2001. They can’t prevent the comparison between what should have happened; vs what their records say happened. The holes are things they can’t go back and fill. They’re not sure exactly what they were dealing with.
Review:
The first line of evidence is in the Congressional correspond logs. These are the notification dates to Congress on FISA violations, illegal activity, prisoner abuse, and other things.
The second lines of evidence is the IG memoranda they get from the ranking Members related to problems.
The third line of evidence is the audit engagement and workflow.
The fourth line of evidence is the audit report of compliance related to that audit engagement.
The fifth line of evidence is the safeguarded information which the President, Congress, and legal counsel have been exposed to and either: Ignored, reacted to, panicked, or did what they were supposed to do.
This information relates to the safeguarded information provided to outside personnel at the EU; and has been transmitted by the CIA to foreign entities.
Then we go down the oath of office, list of malfeasance standards, and start our prosecutions of Members of Congress, the President, VP, legal counsel, DoJ-EOP-OVP legal staff. They’re stuck. This isn’t just a data retention problem, this is related to allegations of war crimes, malfeasance.
Small tiny problem: It’s July 2007, sixteen [16] months before the 2008 election. Congress, the President, and legal counsel know they are stuck. Normally, they have the advantage on their side: They can find a scapegoat, and agree to pin the problem on them; this time — they are the problem, and they can’t bury this.
All the notifications to Congress are documented; legislative immunity falls apart; and their defenses fall away when we look at what they did; then compare it with what they should have done per 5 USC 3331, their oath of office. We need only look at the FISA violations — as reported publicly — then compare that with the open information — of that illegal activity — and contrast that with the votes: They, knowing there was a problem with illegal activity, continued to fund and spend money on things that violated the Constitution. Nobody made them. they freely chose to do this; despite knowing of that illegal activity, they did not — as they had the power to do — either document their concerns with the IGS or US Atty; nor did they remove themselves from the votes to pay for what they should have known was not lawful.
_Your Points_
S1: Procedure check sheets: “there must be paper trails of procedures.” — Yes, and these are not classified. They are open records. Auditors’ compliance testing is also public evidence.
S2: Investigations: [ “Procedures for everything! And whether it is investigations that took place (or didn’t)” ] Indeed.
S3: Evidence: [ “what kinds of paper trails may exist” ] Right again. Not complicated.
S4: Storage: [ “what form they might be stored” ] Right, and there are standards not only for the way the data is stored; but also the physical infrastructure used: Not just information, but security of that IT hardware that comes up with a 32 CFR 2800 audit.
S5: Indicators: [ “what the data suggest was happening” ] Right, all we have to do is ook at the holes. The bigger the hole, the bigger the problem _they_ have. The key is the timeline: What happened; what was their _known_ response; and then what is missing _despite_ their procedures to follow when notified of that event/information.
Evidence is not needed proving that they didn’t do their job; the fact that there are holes this big, and no correction, but continued funding is enough. Take your pick: This is all over the place. You have to decide your deadline to make this decision; and when you want to stop. _That’s_ the concern: It appears people are spending so much time digging through this evidence, that they’re missing the big picture: Each line of evidence isn’t telling us new information: It’s part of the same kettle of fish: Malfeasance in re FISA violations, prisoner abuse, rendition, war crimes, and oath of office.
Time to engage with the State AGs. All fifty [50] of them, and bring in the Certified Fraud Examiners, Auditors, and some people who have some inclination of the prosecution possible against the Members of Congress, president, VP, and legal counsel in OVP, DoJ, EOP, and outside legal counsel. We don’t need more evidence; we need some public trials, indictments, prosecutions, legal counsel disbarments, and jail time. The oath wasn’t enough to inspire them.
Posted by:
Date: July 29, 2007 10:19 PM
You are correct. They use a system of intermediaries who process the FISA warrants. They’re also located overseas.
Also, think broadly when you See the word “data mining” What could someone be induced to believe was “lawful”? If a “computer” does the “mining” does that mean a “person” isn’t violating the Constitution? Someone’s argued that.
The problem is fiduciary duty; and responsibility. Someone had to write the software; and that software was written with the intent it do something; then someone has to audit that software to ensure it meets the requirements. That auditor is supposed to review:
A. What are the legal requirements, restrictions;
B. What is this software doing;
C. Are there any problems
D. Has the certification of that legal compliance been tested independently?
Oversight means overseeing, not pointing to confusion, and hoping it remains hidden behind a secret briefing. Either it’s explained in plain English; or it is not. The problem is when FISA violations are rubber stamped on the basis of gobbly goop.
The Constitution is very simple and clear. All that is required is that you comply with it. When you ignore it, then you have a problem: The “excuses to ignore” these simple rules, then become the same excuse to ignore planning, leadership, oversight, backups, training, and audits. Then we have Katrina, botched operations in Afghanistan, and a President that has to be fed lines because he can’t think on his feet. We need real leadership, not what we have.
“So that’s why they had to classify everything!!!”
Posted by: TheraP
Date: July 29, 2007 10:52 PM
– – – –
Google [ ORCON Executive Order corruption ]
– – –
Yes, and there’s a rule about that as well: ORCON, it’s illegal go classify evidence of illegal activity.
Which takes us back to the dispute over Cheney’s assertion that “that” EO “didn’t apply.” The “EO that did or didn’t apply” contains the rules on ORCON.
It doesn’t matter whether the “_EO_” did or didn’t apply, the _32 CFR 2800_ does apply: It has OVP name on it. It can be enforced through prosecutions; and that CFR _does_ list EOs which _do_ apply.
Whether the _standards listed_ does or does not apply is meaningless; the issue is whether the _requirement_ regardless which standard is used, ignored, or explained away is _legally enforceable_. Arguing over which EO does or doesn’t apply is a distraction from [a] the ORCON requirements which prohibit classification of that data; and [b] the data which _must_ be protected per the applicable CFR: 38 CFR 2800.
– – – –
This takes us back to the RNC e-mails. Recall, the White Hose legal counsel did something very stupid:
1. Determined that the information would be protected by privilege
2. Created an illegal backup database
3. Destroyed that database
Here’s the problem, and why we know legal counsel was involved: Once someone assumes a database will “never” see the light of day; they have a choice: Do they talk candidly; or do they use that “to be forever hidden” database to hide illegal activity?
Here’s how we know something very important: Once the evidence of illegal activity was _known_ to be revealed; and that _claims_ of executive privilege would _fail_, then they had a problem: The backup e-mail could be detected; and the _existence_ and content of that backup e-mail could be breached.
In other words, one does not destroy evidence in the RNC e-mails unless they believe that privilege would fail; but then contradict themselves and say, “But we have executive privilege”. That defies reason. Again, if the _expectation_ of privilege — going forward from time of creation — were real, then there would have been [wait for it] [a] no reason to have a backup systems; no reason to have an e-mail system that violated the law; and no reason to _destroy_ the very thing that would “forever” enjoy a shield of privilege.
– – –
Rule: Privilege isn’t a power: It’s a _claim_ that the _court_ doe snot have to recognize. If a claim of privilege has been abused; or adverse inferences _about missing data_ suggest that the evidence was _illegally destroyed_, the claim of privilege is one that the court is _not required_ to recognize. A defendant can do things that will make the claim meaningless, without effect, or irrelevant: By disclosing that information in an e-mail, as Miers did with the DoJ e-mail.
Executive privilege isn’t something the _court_ is required to recognize. It can be claimed, asserted, and demanded as a “right” but that’s meaningless: It is a _court recognized_ claim that the court — for whatever reason it chooses — can refuse.
The key is for the Grand Jury to know: It can decide that the _claim_ of privilege was not real; and that it was _not_ reasonable for legal counsel to believe that the claim of privilege was bonafide. In other words, going forward from the time that the e-mail was created, and the fact that that “supposedly privileged e-mail was destroyed” wold _undermine_ confidence that counsel _really_ believed that the evidence was privileged or protected. Again, it makes no sense for counsel to argue “but it’s privilege” _while_ that supposed “stuff which would never see the light of day” is destroyed.
This then translates into whether legal counsel’s _assertions_ to the grand jury about what they _believed_ was privileged are true; or whether the legal counsel has _retroactively_ asserted something which is not supported by the subsequent actions. Namely, once legal counsel says — in hindsight — we “believed’ our actions were lawful, they key point is: That is a _dubious belief_ and a _dubious assertion of what was a belief_ because of the subsequent destruction of information that was supposedly going to be shielded.
In so many words, the problem legal counsel has is that their “assertion of a belief” about that evidence and legality of that data archiving method gets called into question: And forms _for the Grand Jury_ a reasonable basis to impeach that legal counsel as a witness. This means that the Grand Jury says, “We do not believe this witness”; whether they want to investigate that legal counsel further over that dubious claim is what the Libby Grand Jury did.
– – –
In other words, going back to our discrete events, RNC legal counsel and WH Counsel established that illegal database and e-mail system; but _then_ were alerted to [a] questions about that content; but then [b] worried that their _claim_ of executive privilege would fail.
This is linked to the Grand Jury subpoenas in re Libby and Ashcroft. Once the evidence destruction _time_ is known, we can pinpoint _what_ they were responding to. Again, if the privilege claims were bonafide — that the WH counsel “believed” the documents were privileged — they wold not have a reason to set up any backup system; or destroy the very thing that was supposed to be shielded.
The key is subtle: _When_ did WH counsel suddenly get religion and realize, “Our dubious belief that this claim of privilege would prevail isn’t going to work; someones told them what is here; we can’t hide this behind privilege; we have to destroy this.”
The only people who cold understand [a] what data there was; [b] where it was located; [c] how it was crated; and [d] the assumptions they had relative to executive privilege were the people who made the rules, did the vetting for the documents, and knew the rules of privilege.
At some point _after_ the Grand Jury subpoena landed, WH counsel had two paths they attempted to go down at the same time: First, their legal/public position of asserting privileged; but second, the private path of comparing which documents would most likely be admissible, and not survive the claim of privilege, and had to be destroyed.
Someone did a comparison _after_ the Subpoena landed, but moved quickly enough to sort through the data, and get rid of the things that had _previously_ been retained. In other words, someone convinced themselves — after a first look — that the documents would be protected; but then something changed.
– – – – – – – – – – – – – – – – – –
Timeline: (Time from left to right)
There are seven milestones: [ A-G ]
[ ] –[1] — X —[2] —- 0 —–[3] ——- D
A. [ ] Origination of data
B. [Phase 1]
C. X First visit/review
D. [Phase 2]
E. 0 Subpoenas land
F. [Phase 3]
G. D Destruction
– – – – – – – – – – – – – – – – —
The time line is simple: After first creation point [ ], A , there is a timeline of data; that was not tampered with _for some time_ [Phase 1], B; then, they had a problem, looked at the data [c] , but decided to do nothing [Phase 2], D; then they had a real problem [E]: Ooops, we aren’t going to be able to hide this [Phase 3], F; then the destruction orders went out [G].
Each of those points is discrete; and things were kept; and other things were not kept; things were reviewed; and there were discussions inside the RNC and WH Counsel’s office.
Again, we’re not talking about conversations that are privilege, but the WH Counsel’s office discussions about the _problematic data_: That discussion is different, and not protected. That’s what the outside legal counsel has a problem with right now: They were the ones who knew the standards; did the audit; and came back with certifications.
Either they found problems and documented them; or they didn’t find the problems and left them alone. Their problem: They don’t know which data was deliberately placed in the WH Datasets, and sent through the RNC e-mails with the intent that it be _destroyed_: It would create a hole for the auditors to ask: “Why isn’t this here?” RNC doesn’t know what was test data; and which was real data. They can’t tell the difference. Someone else does. Not them.
The problem they have is that they didn’t realize what was happening _while_ it happened. Again, this isn’t just in the WH, but all over the place. and not just in the President’s office, but OSC, DoJ, EOP, OVP, NSA, NSC, and Congress.
They have no control over the baseline data which has been captured, and remains secure outside their control. They’re being led to believe the data — including all backups — has been totally destroyed. Now they realize they have a problem.
But it’s worse than they imagined. CIA transferred data to the EU: This is connected with the NSA intercepts of the war crimes; confirming the timing of the notifications to the White House; and explaining the timelines of the destruction actions. Add in the Libby and Abramoff investigations and destruction, and the President has another problem: Too many discrete events that the RNC is _responding to_; and too many holes that are only linked with concerns about _discrete events_.
The destruction wasn’t random, but related to awareness by WH counsel that their original delusions weren’t going to prevail. That’s the key: It only takes one link between notification, and subsequent destruction for the WH Counsel to hang themselves. It’s already happened. Multiple Times. Take your pick:
A. Conversations over whether to transfer prisoners after disclosure of Eastern European prisoner abuses;
B. Whether to, after the Supreme Court ruled against them, to move the prisoners;
C. Coordination with members of Congress to start investigation of the _leaks_, despite the President knowing for one year that the NYT had been looking at things. Surely if the President was “concerned” about leaks, he wouldn’t ta
I know the above is long, but it seems important, and as if someone is trying to devulge something, you might want to check it out. Any comments, thoughts insights???
Posted by: Uncle $cam | Aug 1 2007 0:51 utc | 47
Yeah, anyone here besides me make it through Thomas Pynchon’s Gravity’s Rainbow*?
Re-meme-ber kids,
Proverbs for Paranoids**
1. You may never get to touch the Master, but you can tickle his creatures.
2. The innocence of the creatures is in inverse proportion to the immortality of the Master.
3. If they can get you asking the wrong questions, they don’t have to worry about the answers.
4. YOU hide, they seek.
5. Paranoids are not paranoids because they’re paranoid, but because they keep putting themselves, fucking idiots, deliberately into paranoid situations.
1)CHECK
2)CHECK
3)DOUBLE CHECK, mThanks Media…
4)CHECK
5)CHECK W/caveat***
Also recall many MOA’s including myself have spoke on the admin taking us to the very brink of collapse, well,
The I-35W bridge by the University of Minnesota campus has collapsed. The bridge, one of the most heavily traveled freeway bridges in the Twin Cities metro area, collapsed around 6:05 this evening. Sections of the freeway are said to be floating in the Mississippi as cars are stranded on standing portions of the bridge. Slideshow of Images Live (real-time) updates via mPR
Lear: Who is it that can tell me who I am? The Fool: Lear’s shadow
How many here have pointed out we give money to Israel and waste so much on military projects even while our whole public infrastructure (sewer,power,water,roads), transportation, safety, justice,…
I bet they don’t have these problems in the gated communities…yet. And when they do…?
Can you say, Blackwater?
The fourth turning prediction suggests a final abandon of futurist promises of social security, Medicare, and elder benefits. These New Deal projects will lie in the dust bins of history. Today’s advice is to prepare for both economic and political upheaval. The federal government will need to simplify and reduce, size and scope. All levels of government need to prune legal, regulatory, and professional thickets that stymie institutional change. Government needs to thin out procedural requirements that could delay or weaken emergence measures in a crisis.
We control through omission and chaos! The Hegelian Dialectic of Problem, reaction, solution. We create the problem, or let it happen, we present the enhanced reaction interactively along with you surfs, and then we have spent billions of your money on ‘think tanks/what if scenarios’ that only benefits us, the powerful.
Ahhh, the economy thereby infrastructure couldn’t be better, ya see, because we hide the numbers!
*b, the html of underlining text does not seem to work anymore, e.g., [u]blah blah[/u]
** 1),2)and 4) you can work out for yourselves, It wont be hard…
*** Remember folks it was Kissinger who said, “if your not paranoid in Washington”… it’s grown exponentially since then.
Posted by: Uncle $cam | Aug 2 2007 2:03 utc | 72
a couple of comments based quotes pulled from the prepared stmts of witnesses testifying at wednesday’s senate foreign relations committee hearing exploring the us africa command and a new strategic relationship with africa
theresa whelan, deputy asst secdef for african affairs:
We are looking for ways to increase capital and trade flows, the means by which mutual prosperity is built.
…
Stability and prosperity in Africa are important to the long-term interests of the United States.
…
AFRICOM represents an opportunity to strengthen and expand U.S. and African relationships in such a way that our combined efforts can help generate a more indigenous and, therefore, more sustainable peace and security on the continent.
major gen jonathan s. gration, usaf (ret.):
With US interests on this continent clearly defined and a united voice in Washington to advocate for requirement and resources, I believe we’ll be able to advance America’s interests in Africa better and build strong partnerships with African government to eliminate poverty and accelerate Africa’s integration into the global economy.
michael hess, usaid:
We believe that AFRICOM can significantly advance the “Three D” concept, and facilitate the coordination of defense, diplomacy and development to advance American foreign policy interests on the continent of Africa.
the parallels to some of justifying rhetoric advancing the first scramble for africa are striking. evidently the good general (ret), despite being a south african, is not familiar w/ that earlier period of “Africa’s integration into the global economy,” when the end of the int’l slave trade led to the even more vicious territorial conquest which cast aside the continent’s role as peripheral area for a key role, overseen by global colonizers of course, in the int’l economy. the mid-to-late nineteenth century was also a period of fervent “free trade” ideology which transitioned into monopoly capitalism, thus the scramble by the euro empires for global geostrategic domination, dividing the world into quasi-protectorates, of which africa was the most egregious example.
ms. whelan herself expresses how AFRICOM will bring order (accountability) and stability (reliability) to key regions of the continent to protect & further u.s. interests (“prosperity”) in trade flows and capital accumulation. think tanks, such as the heritage foundation paper i recently pointed out, are calling for the civilian component of AFRICOM to push economic models focusing on the privatization of resources and services throughout the continent. this will allow for even more foreign owners to amass & extract capital from this resource-rich continent while developing commodity-export economies, for instance biofuel plantations to supply the western powers. this is not much different than what happened in the first scramble. the economies of the african nations did experience growth, but little in terms of development, as can still be seen today.
and the usaid official remarkably stated that “We believe that AFRICOM can significantly advance the “Three D” concept.” defense, diplomacy and development. well, this is barely a step above the “three c’s” — coined by the perambulating scottish missionary david livingstone — which were used to justify euro conquest of africa back a little over a hundred years ago: commerce, christianity and civilisation. so now we’ve moved up a letter in the alphabet and hope to instill in the natives our concepts of defense, diplomacy and development. and of course all of the sales pitches aimed toward africans constantly harp on the humanitarian focus of empire’s latest unified combatant command, on how AFRICOM’s purpose is to “help africans help themselves.” the more honest assessment is that AFRICOM is being created to help u.s. americans to help themselves to africa’s resources, but that’s not as cute & catchy in these days of polished propaganda.
so the establishment is telling africans that they’re bringing in those shiny new “three d’s” this time. but what they don’t tell them is that they’ll also be taking three c’s out of africa — crude, capital and china.
Posted by: b real | Aug 2 2007 4:21 utc | 73
The latest news that South Korean officials plan on meeting with representatives of Afghanistan’s Taliban resistance movement doesn’t auger well for Kabul’s mayor and city council chair Hamid Karzai.
Following the confirmation that the body of a second Korean hostage had been found and that the Korean aid workers lives were in grave danger, Kabul had set about ‘rescuing’ the abductees with whatever force may be necessary. On Aug 1 reuters reported that a rescue operation had commenced with the dropping of pamphlets by USAF aircraft warning citizens in the area the hostages were believed to be held, to stay out of the way.
There is no longer any sign of that bulletin on the Reuters site, however the Canadian National Post blog has constructed a timeline of Reuters changing bulletins. Somehow it was determined that telegraphing one’s punches by letting the Taliban know you were coming was not such a good idea.
Of course none of that would have been of any concern to the Kabul City Council or the US and other Nato forces who were about to ‘go in’. Alive or dead the hostages must be rescued because as long as they were hostages the Korean govt was under pressure to get the fuck outta Dodge (ie pull it’s remaining troops out of Afghanistan immediately rather than the slow withdrawal agreed to). Worst of all however was the bad press around this issue. It means that the cardboard cut out Nato leaders look silly claiming they are winning in Afghanistan when as this incident clearly shows the Taliban are becoming stronger.
Maybe the Korean govt had already quietly agreed to a ‘save them by shooting them’ scenario. There were intimations that was the case, as long as it was a Nato operation not an Afghani one. There wasn’t much faith in the spine that a ‘good dose of freedom’ delivers.
But as news of the rescue attempt leaked to the Korean people, in particular relatives of the hostages, they made it plain better dead than Taliban was a lousy option.
Somehow Deputy Secretary of State John Negroponte was involved, which gives an indication of the likelihood of any survivors, since Negroponte never seemed to mind amerikan xtians being martyrs for the cause of corporate capitalism in central america, it is unlikely he would demur at the notion of Korean xtians croaking.
Negroponte was bailed up at a meeting by Korea’s Foreign Minister Song Min-soon on Aug 1 just as the operation was swinging into top gear.
That meeting must have been full and frank as they say in the classics:
“”The two sides ruled out the possibility of military operations and placed a top priority on safely resolving the issue by mobilising all means,” Song said after the meeting, the official said.
“The United States is not preparing military operations,” he quoted Song as saying.
In another development, eight senior members of South Korea’s National Assembly left for Washington on Thursday to urge US officials to take an “active and positive” approach to the crisis, amid widespread perceptions that Washington is key to ending the crisis by influencing Afghanistan’s government.
Song indicated there were difficulties in ending the crisis because of a US policy of refusing to negotiate with people it regards as terrorists, but vowed to resolve the issue while keeping intact the principle, the South Korean official said.”
Now that the South Koreans have managed to force the US into permitting direct contact with the Taliban Government, other nations faced with intractable Afghani issues will insist on the same access.
Say for example you are a European state whose population were being decimated by the availability of cheap and freely available Afghani smack. Would you plead with the DEA to stage one of their show operations in the few parts of the country controlled by Karzai and co – knowing that the flow of smack into your society would not be impeded by this? Or would you sit down with the Taliban and negotiate a deal whereby they got paid to stop the flow?
In the end people have to deal with the entity in control, while the coalition of the swilling had control of most of Afghanistan’s territory for that fleeting period after the invasion, it was the US led Nato forces one did business with, but now control of the countryside out of Kabul has gone back to the indiginous forces of whatever ilk, frequently incorrectly referred to as the Taliban, that is who others must deal with.
There will be other issues like this with the eventual result the complete sidelining of Karzai and the City Council.
Leave the last word to the Nazis:
The conservative xtain blogs condemned the liberal media for blowing the rescue, but were divided on whether death by rescue was a workable option. Comments ranged from:
“So what’s the deal? Are we never gonna use the neutron bomb, or what?”
and
“Lord, take me under friendly fire in a rescue operation any day, as long as my captors experience the pain of life before they spend eternity swimming in a lake of fire.”
(where do you make these people amerika?)
To:
“I cannot find it in myself to give CNN/Reuters any shred of a benefit of the doubt. I hope the hostages and the raiders survive the attack by the legacy media. I should think the hostages would be safer with the Taliban than with these guys “helping”.
With allies like that is it any wonder the South Koreans have opted out of the Afghani farce?
Posted by: Debs is dead | Aug 3 2007 1:15 utc | 98
|