Secrecy News: From Gingrich to Obama–“We Don’t Need No Stinking Constitution…”

Uncategorized

EXTRAJUDICIAL TARGETING OF AMERICANS CHALLENGED

Two civil liberties organizations said they will file a legal challenge against the government's suspected targeting for assassination of an American supporter of Al Qaeda, arguing that under the U.S. Constitution no citizen can be “deprived of life… without due process of law.”

The American Civil Liberties Union and the Center for Constitutional Rights first filed suit against the Treasury Department, which said they needed a “license” in order to act on behalf of Anwar al-Awlaki, who has been designated as a terrorist.  After the lawsuit was filed yesterday, the Treasury Department said the license to proceed would be granted.

Meanwhile, Rep. Dennis Kucinich and several House colleagues introduced legislation last week “to prohibit the extrajudicial killing of United States citizens.”

“No United States citizen, regardless of location, can be ‘deprived of life, liberty, property, without due process of law', as stated in Article XIV of the Constitution,” their bill said. [The cited statement is actually from the Fifth Amendment to the Constitution.]

White House spokesman Robert Gibbs said yesterday that the targeting of al-Awlaki was not done entirely without process.  “There's a process in place that I'm not at liberty to discuss,” he said.

Secrecy News Complete Online Story

Phi Beta Iota: Newt Gingrich and Dick Cheney are among those who have flushed the US Constitution down the toilet, and there is a direct genealogy from them to Barack Obama and the Pelosi-Reid-Axelrod-Emanuel quartet of mendacity lite that relegates the Constitution to its outrageous current status as a quaint relic.  The flag officers and Senior Executive Service (SES) have been bribed by the military -industrial complex or intimidated by political appointees whose knowledge of substance is pathetic.  There is nothing wrong with America the Beautiful that cannot be fixed by the restoration of the Constitution including the Balance of Powers; we do that with the Electoral Reform Act followed by the Smart Nation Act.

AFIO Extracts: CIA, DoD, War Crimes Can Do Easy

Uncategorized

Chile General Convicted in 1974 Murders Blames CIA. The former chief of Chile's feared secret police who was convicted in the 1974 assassination of Gen. Augusto Pinochet's biggest enemy in exile says the CIA committed the crime.

How Does the CIA Know If Its Intel Is Any Good? On Sunday, the website Wikileaks published more than 91,000 military documents from the war in Afghanistan, among them reports alleging that Pakistan's top military intelligence service is aiding Taliban fighters. The Pakistani government has claimed that the documents are based on inaccurate field reports that neither it nor U.S. intelligence agencies are taking seriously. So how do intelligence analysts determine whether reports are credible or not?

Arab Intelligence Agencies Too Busy Protecting Regimes to be Effective. Even the wave of arrests in Lebanon over the last year of those accused of being “Mossad agents” does not change Wilhelm Dietl's opinion that “the Arab intelligence agencies, including that of Lebanon, are ineffective.” . . . The Arab agencies see their primary task as preserving the regime or the leader and therefore, they are cruel and without limits. They are above the law; they are the law itself. They see themselves as a divine entity.

Hit List Draws Fire in Wake of Leaked US Documents, by Lolita C. Baldor. When it comes to war, killing the enemy is an accepted fact. Even amid the sensation of the WikiLeaks.org revelations, that stark reality lies at the core of new charges that some American military commando operations may have amounted to war crimes.

Association of Former Intelligence Officers (AFIO)

The 19 most influential cybersecurity organizations in the world (GAO)

02 China, 06 Russia, Computer/online security, General Accountability Office
see the report

The Government Accountability Office identified 19 global organizations “whose international activities significantly influence the security and governance of cyberspace.”

The organizations range from information-sharing forums that are non-decision-making gatherings of experts to private organizations to treaty-based, decision-making bodies founded by countries. The groups address a variety of topics from incident response,  the development of technical standards, the facilitation of criminal investigations to the creation of international policies related to information technology and critical infrastructure, the GAO stated.

From the GAO report:

  • Asia-Pacific Economic Cooperation (APEC) is a cooperative economic and trade forum designed to promote economic growth and cooperation among 21 countries from the Asia-Pacific region. APEC's Telecommunication and Information Working Group supports security efforts associated with the information infrastructure of member countries through activities designed to strengthen effective incident response capabilities, develop information security guidelines, combat cybercrime, monitor security implications of emerging technologies, and foster international cybersecurity cooperation.
  • Association of Southeast Asian Nations (ASEAN) is an economic and security cooperative comprised of 10 member nations from Southeast Asia. According to the 2009-2015 Roadmap for an ASEAN Community, it looks to combat transnational cybercrime by fostering cooperation among member-nations' law enforcement agencies and promoting the adoption of cybercrime legislation. In addition, the road map calls for activities to develop information infrastructure and expand computer emergency response teams (CERT) and associated drills to all ASEAN partners.

Continue reading “The 19 most influential cybersecurity organizations in the world (GAO)”

NIGHTWATCH Extracts: NL out of AF, Syria into LE, UN Tribunals Triumphant as Deviners of Fact in Support of Peace

Uncategorized

Afghanistan – The Netherlands: BBC and other international media reported that the Netherlands military mission has ended its operations and is withdrawing. They transferred command of Oruzgan to the US and Australians on Sunday.

Their departure will serve as a validation of the Taliban long term strategy of outlasting the foreigners and a recruitment appeal: the Taliban will be around after the foreigners have left. A Taliban spokesman congratulated the Netherlands today.

The Dutch soldiers, maligned in European NATO circles for lax military discipline, performed extremely well under combat conditions in Afghanistan … far better than many other NATO contingents.

Lebanon-Syria-Saudi Arabia: Saudi King Abdullah and Syrian President al Asad visited Lebanon over the weekend and spoke with President Suleiman and Prime Minister Hariri with the purpose of preventing factional and sectarian rivalry from leading to more internal violence.

The operating assumption of the UN tribunal investigating the murder of Lebanese Prime Minister Rafiq Hariri in 2005 has been that Syrian intelligence agents were responsible. This hypothesis resulted in the withdrawal of Syrian forces, increased US and French influence in Lebanon for a time, increased strain with Saudi Arabia, and an enormous increase in Iranian influence with Lebanese Hezbollah.

The most recent investigations indicate the Hezbollah agents were the assassins. That hypothesis is the basis for the new Syrian and Saudi overture to the Beirut government. The Hezbollah leader Nasrallah denies that Hezbollah had anything to do with the Hariri murder, has denounced the new tentative findings and threatened violence in the event they become final.

Prime Minister Saad Hariri's embrace of the Syrian President and the Saudi King indicates the evidence has persuaded him. Saad is the son of the assassinated prime minister. The Saudis are strong supporters of the Hariris.

The only actor that would benefit from discord in Lebanon among Arabs, whether Sunni or Shiites, is Iran.

Phi Beta Iota: UN Tribunals, with their world-class investigative capabilities, are supposed to help build capacity and verify fact–not make arrests or otherwise play Rambo.  In Guatemala a UN Tribunal cleared the President who was “framed” for a political murder; now in Lebanon the UN has cleared a government.  The value of the UN as a deviner of truth cannot be over-stated; the greatest threat to the UN's success in this arena is unethical UN officers who choose to aggrandize their security sections by manipulating and fabricating threat information, thus reducing the number of positions available for investigators.  After UN Tribunals should come regional UN decision-support centres that can address all ten high level threats to humanity while enabling “Deliver As One” harmonization not only across all twelve polices for UN programmes, but across all incoming funding sources UN and non-UN. The UN is evolving in a most constructive direction as a finder of fact that helps create a prosperous world at peace.

See Also:

Search: UN intelligence peace intelligence

Worth a Look: Micro-Consignment

Commercial Intelligence, Gift Intelligence, Worth A Look
Gregory Van Kirk

Greg Van Kirk has developed the MicroConsignment model—a sustainable, replicable means of delivering health-related goods and services to remote Guatemalan and Ecuadoran villages using entrepreneurship; empowering the villagers to help themselves.

Phi Beta Iota: see also our Global Range of Nano-Needs Graphic as explained in our UNICEF Open Everything briefing, in our Hacking Humanity briefing, and in our latest book, INTELLIGENCE for EARTH: Clarity, Diversity, Integrity, & Sustainability (EIN, 2010).  The later is on sale in the UN Bookstore at 1 UN Plaza, New York City.

Learn More About Micro-Consignment

Video: “Twinkie Deconstructed” Author Shows Strange Origins & Nexus of Ingredients

07 Health, Advanced Cyber/IO, Commerce, Graphics, True Cost, True Cost, Videos/Movies/Documentaries
From TwinkieDeconstructed.com

In this fascinating exploration into the curious world of packaged foods, Twinkie, Deconstructed takes us from phosphate mines in Idaho to corn fields in Iowa, from gypsum mines in Oklahoma to oil fields in China, to demystify some of America’s most common processed food ingredients—where they come from, how they are made, how they are used—and why. Beginning at the source (hint: they’re often more closely linked to rocks and petroleum than any of the four food groups), Steve Ettlinger reveals how each Twinkie ingredient goes through the process of being crushed, baked, fermented, refined, and/or reacted into a totally unrecognizable goo or powder with a strange name—all for the sake of creating a simple snack cake.

Continue reading “Video: “Twinkie Deconstructed” Author Shows Strange Origins & Nexus of Ingredients”

noble gold