SIXTH ANNUAL FREEDOM MARCH FOR THE WRONGFULLY CONVICTED
March 14th at Noon on the steps of the Washington County Courthouse in Washington, PA
Pennsylvania—2013
had a record number of exonerations with a total of 87! According to
the National Registry of Exonerations, the total of exonerations to date
is 1313. Jeffery Deskovic of New York spent 17 years in prison for a
crime he did not commit. Michael DeLoe is in his 6th year of wrongful
conviction currently waiting for a hearing on March 17th in the
Washington County Courts. Da’Ron Cox is in his 16th year of a wrongful
conviction awaiting a post-conviction hearing to prove his innocence.
In
order to raise public awareness of this problem, the 1st National
Freedom March for the Wrongfully Convicted was held simultaneously in
many states on June 3, 2009. MaryAnn Lubas is the Pennsylvania Director
for the Freedom March and continues this effort holding the 6th Annual
Freedom March on March 14th at Noon on the steps of the Washington
County Courthouse in Washington, PA. Speakers at the March will include
Jeffrey Deskovic from New York, Erica Johnson from Nemacolin, MaryAnn
Lubas, director and others who this has affected.
Jeffrey
Deskovic: Jeffrey spent 16 years in prison for a rape and murder he did
not commit and was exonerated in November of 2006. Jeff walked into
prison at age seventeen and walked out at age thirty-three. Jeff sued
New York State and with 1.5 million dollars of his settlement, he opened
the Jeffrey Deskovic Foundation for Justice. He continues to fight
wrongful convictions through his 4 prongs: raising awareness; seeking
legislative changes; working to exonerate the wrongfully convicted-both
in DNA and Non-DNA cases; and helping the wrongfully convicted
reintegrate back into society. “I am proud to participate in the Freedom
March for the Wrongfully Convicted, and I stand solidly behind Michael
DeLoe.” Read more about his Foundation's work by visiting his website:
www.Deskovic.org
Erica Johnson: Erica’s husband Dylan Ryan
Johnson has been imprisoned in Mexico just having been sentenced to 15
years for a crime that he did not commit. The media has embraced Amanda
Knox and shown support for Amanda. Dylan is a Pennsylvania resident
and his case needs as much attention as Amanda Knox. Erica will speak
on his case and the injustices they have endured.
MaryAnn Lubas
is an advocate for the wrongfully convicted and the director of the
Pennsylvania Freedom March for the wrongfully convicted. Lubas son
Michael DeLoe was wrongfully convicted on Jan. 15th, 2009. After
getting over the initial shock of the injustices she saw in the trial,
she came on board to bring awareness to the citizens of Pennsylvania.
She has traveled to Washington D.C. giving testimony on Capitol Hill as
to the reform needed to stop this from continuing. She has learned that
many are also fighting wrongful convictions in our state, including
Lorenzo Johnson, Da’Ron Cox, Joseph Hall, Carmen Woods, Joy O’Shea,
Dylan Johnson, Jimmy Dennis, Clayton Mibroda, Terrell Scott and many
more.
Other Speakers: Will be addressing the effects of wrongful conviction and their causes.
Please
join us at this worthwhile event. Information on the National Freedom
March for the Wrongfully Convicted can be found at
www.freedommarchusa.org. Learn more about the case of Michael DeLoe at:
www.justiceformike.net.
*---------*---------*---------*---------*---------*---------*PROTEST:
NO TO U.S. INTERVENTION IN UKRAINE!
U.S. HANDS OFF UKRAINE AND VENEZUELA!
MONDAY, MARCH 17, 4:30 PM, 14th and Broadway, Oakland
Co-sponsors:
United National Antiwar Coalition; International Action Center; Mobilization
to Free Mumia Abu-Jamal; Haiti Action Committee, BALACS and many others....
The United National Antiwar Coalition (UNAC) Demands "US Hands off Ukraine and
Venezuela"
The United States government is the main instigator of the present crises in
both countries.
The hypocrisy of Secretary of State John Kerry’s statement on Face the Nation,
“You just don't in the 21st century behave in 19th century fashion by invading
another country on completely trumped up pretext," is beyond belief. What
about the US invasions of Iraq and Afghanistan, or regime change in Libya, or
the threats to bomb Syria and attack Iran?
The US has waged a massive propaganda campaign of misinformation, distortion,
and outright lies and the national media has taken the State Department’s
“facts” and disseminated them without question or challenge. News about the
US/EU role in creating the current crisis is buried.
The US is the only country that has its troops throughout the world in over
120 countries. It sends drones and special operations forces to kill anyone
and anywhere it chooses and uses its vast economic power to undercut any
government that will not submit to its policies. Although there is lip
service to concerns about democracy and sovereignty, the reality is that the
US acts in the interests of preserving its imperialist power and wealth.
Ukraine and Venezuela are not exceptions to this rule of imperialist
intervention. For 20 years, $5 billion was invested in Ukraine to support the
opposition and to create tens of thousands of non-governmental organizations
(NGOs) to move the country more towards the US and EU and their policies. In
an intercepted phone call between Assistant Secretary of State Victoria Nuland
and the US ambassador to Ukraine, she discusses who the US wants to be the
head of the new illigitimate government, and lo and behold, the US pick,
Arseniy Yatseniuk, is named as the interim Ukrainian leader. This is clearly
outside intervention in the affairs of a sovereign country that would not be
tolerated if directed at the US or its allies.
What are the real objectives and why is Russia so alarmed? Could it be the
US-NATO campaign to militarily surround Russia and bring neighboring countries
into the western military and financial orbit? Might it be that the largest
supply of natural gas in the world is in Russia and the pipelines go through
Ukraine, or that global warming is opening the Arctic to oil drilling and
Russia borders the Arctic? It is clear that Russia will not passively sit by
while the Western-backed coup, led by violent fascist forces and local
billionaires, overthrows a democratically elected government and installs a
puppet regime on its border.
Confederate flags and fascist symbols go up in Kiev City Hall
By treaty, Russia can have 25,000 troops in Crimea. To protect its military
base there and to protect the people in the Eastern and Southern parts of the
country, where the coup is not supported, Russia has moved some troops to the
Ukrainian border and into the Crimean peninsula. Many in the east and south
are fearful of the new coup government and the neo-Nazi and nationalist forces
that led the street demonstrations.
The escalating threats of military and economic aggression towards Russia
should not be taken lightly. Washington’s recklessness and disregard for
humanity have resurrected the worst vestiges of cold war politics. They have
created a dangerous situation that can generate a real war with an adversary
with a powerful military of its own.
The US is similarly intervening in Venezuela. There, the US government wants
a return to policies which brought the benefits of that nation’s oil wealth to
a privileged few. The Bolivarian Revolution has been supported by a majority
of Venezuelans in election after election. Yet the United States persists in
violating the sovereignty and self-determination of the Venezuelan people. In
2002, the US supported a coup against the late Venezuelan president Hugo
Chavez. During this coup, Chavez was forced onto a US military plane to be
taken out of the country. The Venezuelan people and military were able to
rescue Chavez and defeat the coup. However, the US has continued to intervene
in Venezuela causing the government of Nicolas Maduro to expel three US
officials for trying to organize students for anti-government protests.
As long as the United States is committed to aggression, the whole world is
endangered, just as Ukraine and Venezuela are. Libya fell, Syria is under
attack, there is a “pivot to Asia”, and Africom controls the military in
almost every African nation. We must demand that our government stop its
policy of imperialist domination which generates conflict throughout the
world.
NO TO US WARS, THREATS, ATTACKS, SANCTIONS, AND COVERT OPERATIONS IN UKRAINE,
RUSSIA, VENEZUELA, AND ALL OTHER SOVEREIGN COUNTRIES!
MONEY FOR JOBS, EDUCATION, HEALTHCARE AND MEETING SOCIAL NEEDS, NOT WAR AND
AGGRESSION TO BENEFIT THE RICH!
*---------*---------*---------*---------*---------*---------*
Remembering Iraq 11 Years Later: Then and Now!
On Wednesday, March 19, 2014 CODEPINK, Witness Iraq, and the Peace and Justice Committee of the Unitarian Universalist Church in SF will hold a panel discussion to commemorate the 11th year anniversary of the war on Iraq titled “Remembering Iraq 11 Years Later: Then and Now.”
The panel is meant to be an evening of remembering Iraq before, during and after the war and how the current day struggles of Iraqis, inside and outside of the country, continue whether in the form of surviving the violent attacks in the country or surviving life in foreign lands.
A CODEPINK organizer and Iraqi refugee, Farah Muhsin Al Mousawi, will moderate the discussion.
Panelists include:
• Inder Comar of Comar Law, a San Francisco attorney representing Sundus Shaker Saleh, an Iraqi refugee and the lead plaintiff in the class action lawsuit against key members of the George W. Bush Administration (Saleh v. Bush)
• Aaron Hughes, an Iraq War veteran, artist and activists who is actively involved Warrior Writers Project, The Dirty Canteen, The National Veterans Art Museum, Iraq Veterans Against the War, and The Center for Artistic Activism
• Zaid Faransso, an Iraqi refugee and former medical resident at Baghdad’s Medical City
Location:
First Unitarian Universalist Church & Center - MLK Room
1187 Franklin St
San Francisco, CA 94109
RSVP for the event!
http://calendar-codepink.nationbuilder.com/60200/remembering_iraq_11_years_later_then_and_now
In Justice & Accountability,
CODEPINK SF
*---------*---------*---------*---------*---------*---------*
Bay
Area United Against War Newsletter
Table
of Contents:
A.
ARTICLES IN FULL
B.
EVENTS AND ACTIONS
C.
SPECIAL APPEALS AND ONGOING CAMPAIGNS
D.
VIDEO, FILM, AUDIO. ART, POETRY, ETC.
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
A.
ARTICLES IN FULL
(Unless
otherwise noted)
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
1) Medical Groups Question Price of New Hep C Drug
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
2) Deciding if Inmates Get to Know How They’ll Be Executed
By
2) Deciding if Inmates Get to Know How They’ll Be Executed
By
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
3) California: Migrants Stage Another Border Protest
3) California: Migrants Stage Another Border Protest
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
4) The C.I.A. Torture Cover-Up
4) The C.I.A. Torture Cover-Up
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
5) How a Court Secretly Evolved, Extending U.S. Spies’ Reach
5) How a Court Secretly Evolved, Extending U.S. Spies’ Reach
http://www.nytimes.com/2014/03/12/us/how-a-courts-secret-evolution-extended-spies-reach.html?ref=us
WASHINGTON — Ten months after the Sept. 11 attacks, the nation’s surveillance court delivered a ruling that intelligence officials consider a milestone in the secret history of American spying and privacy law. Called the “Raw Take” order — classified docket No. 02-431 — it weakened restrictions on sharing private information about Americans, according to documents and interviews.
The administration of President George W. Bush, intent on not overlooking clues about Al Qaeda, had sought the July 22, 2002, order. It is one of several still-classified rulings by the Foreign Intelligence Surveillance Court described in documents provided by Edward J. Snowden, the former National Security Agency contractor.
Previously, with narrow exceptions, an intelligence agency was permitted to disseminate information gathered from court-approved wiretaps only after deleting irrelevant private details and masking the names of innocent Americans who came into contact with a terrorism suspect. The Raw Take order significantly changed that system, documents show, allowing counterterrorism analysts at the N.S.A., the F.B.I. and the C.I.A. to share unfiltered personal information.The leaked documents that refer to the rulings, including one called the “Large Content FISA” order and several more recent expansions of powers on sharing information, add new details to the emerging public understanding of a secret body of law that the court has developed since 2001. The files help explain how the court evolved from its original task — approving wiretap requests — to engaging in complex analysis of the law to justify activities like the bulk collection of data about Americans’ emails and phone calls.
“These latest disclosures are important,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. “They indicate how the contours of the law secretly changed, and they represent the transformation of the Foreign Intelligence Surveillance Court into an interpreter of law and not simply an adjudicator of surveillance applications.”
The Raw Take order appears to have been the first substantial demonstration of the court’s willingness after Sept. 11 to reinterpret the law to expand government powers. N.S.A. officials included it as one of three court rulings on an internal timeline of key developments in surveillance law from 1972 to 2010, deeming it a historic event alongside once-secret 2004 and 2006 rulings on bulk email and call data.
A half-dozen current and former officials defended the order as lawful and reasonable, saying it allowed the government to best use its experts on Al Qaeda — wherever they worked — to find nuggets of intelligence hidden in hours of phone calls or volumes of emails. They also noted that the agencies receiving the data must still apply privacy protections after evaluating Americans’ information. An N.S.A. spokeswoman declined to comment about the ruling.
Still, Marc Rotenberg, the executive director of the Electronic Privacy Information Center, argued that the easing of privacy protections mandated by the Foreign Intelligence Surveillance Act of 1978 increased the risk of abuse and should not be a secret.
“The framers of FISA intended to narrowly restrict the ability of the government to disseminate this information because it has a very low standard enabling access to communications,” he said. “If the FISA court removed those safeguards, it obviously raises questions about compliance with the intent of the act.”
Continue reading the main story
The number of Americans whose unfiltered personal information has been shared among agencies is not clear. Since the Sept. 11 attacks, the court has approved about 1,800 FISA orders each year authorizing wiretaps or physical searches — which can involve planting bugs in homes or offices, or copying hard drives — inside the United States. But the government does not disclose how many people had their private conversations monitored as a result.Other Americans whose international phone calls and emails were swept up in the N.S.A.’s warrantless wiretapping program after it was legalized in 2007 might have increased those numbers. After Congress amended the surveillance act to authorize the program, the court allowed raw sharing of personal information from it, too, according to leaked and declassified documents.
The new disclosures come amid a debate over whether the surveillance court, which hears arguments only from the Justice Department, should be restructured for its evolving role. Proposals include overhauling how judges are selected to serve on it and creating a public advocate to provide adversarial arguments when the government offers complex legal analysis for expanding its powers.
Easing Barriers
The Bush administration sought the Raw Take order as it was trying to lower various bureaucratic barriers that impeded counterterrorism specialists across the government from working together.
Timothy Edgar, a Brown University visiting professor who worked at the Office of the Director of National Intelligence and at the White House from 2006 to 2013, said that after the Sept. 11 attacks “there was a big movement to make sure sharing took place early on and at a tactical level.”
“Without the ability to have a small group of people that would be able to share intelligence at an earlier stage, at a raw stage,” he added, “it was hard to cooperate at a more technical level.”
Some efforts took place in public. In May 2002, the surveillance court rejected a request to dismantle a “wall” that inhibited criminal prosecutors from working closely with intelligence investigators using FISA surveillance; that fall, a review court overturned the ruling. Meanwhile, the administration was also pushing in private to get around obstacles to sharing information among intelligence agencies. Congress had enacted FISA after revelations about decades of abuses of surveillance undertaken in the name of national security — like the F.B.I.’s taping of the Rev. Dr. Martin Luther King Jr.’s extramarital affairs and its sharing of the information with the Kennedy White House. The law required agencies to “minimize” private information about Americans — deleting data that is irrelevant for intelligence purposes before providing it to others.
Exceptions had been narrow, like when an agency needed decoding or translating help from a counterpart. The Justice Department’s 2002 motion — formally called “In Re Electronic Surveillance and Physical Search of International Terrorist Groups, Their Agents, and Related Targets” — argued that the court could interpret that exception more permissively.
People familiar with the request said it cited passages from a 1978 report by the House Intelligence Committee that explained what lawmakers intended the original FISA bill to mean.
One section says that when information has not yet been examined and another agency is going to perform that task, minimization requirements are not yet in effect. Another explains that lawmakers intended that “a significant degree of latitude be given in counterintelligence and counterterrorism cases” regarding the retention or sharing of information “between and among counterintelligence components of the government.”
Justice Department officials argued that those passages showed that it would be consistent with congressional intent to allow wider sharing of unevaluated, unminimized information among analysts at the N.S.A., the F.B.I. and the C.I.A. The court agreed, granting the order.
Current and former officials said only trained analysts with a need to see the raw information may access it. Still, Jameel Jaffer, a lawyer for the American Civil Liberties Union, noted that the government had cited stringent minimization rules to justify FISA surveillance as complying with the Constitution.
“It seems that at the same time the government has been touting the minimization requirements to the public, it’s been trying behind closed doors to weaken those requirements,” he said.The newly disclosed documents also refer to a decision by the court called Large Content FISA, a term that has not been publicly revealed before. Several current and former officials, speaking on the condition of anonymity, said Large Content FISA referred to sweeping but short-lived orders issued on Jan. 10, 2007, that authorized the Bush administration to continue its warrantless wiretapping program.
The Bush administration had sought a ruling to put the program, which had been exposed by The New York Times, on a firmer legal footing. Attorney General Alberto R. Gonzales disclosed a week after the decision that a judge had issued “innovative” and “complex” orders bringing the program under the surveillance court’s authority. But when they came up for renewal that April, another surveillance court judge balked and began requiring cumbersome paperwork, prompting the administration to seek a legislative solution, an intelligence official later explained.The documents do not explicitly say the Large Content FISA orders were the January 2007 decisions but are consistent with that explanation.
Two classification guides say that the N.S.A. used the orders during a transition to the enactment of the Protect America Act, an August 2007 law in which Congress legalized the program. It was replaced with the FISA Amendments Act in 2008.
The government has never provided details about the court’s reasoning in pronouncing the program lawful. But the orders are also mentioned in a classified draft of an N.S.A. inspector general report that Mr. Snowden disclosed, which calls them “Foreign Content” and “Domestic Content” orders. The report cites a legal theory that reinterpreted a key word in the original FISA — the “facility” against which the court may authorize spying because a terrorism suspect is using it.
Facilities had meant phone numbers or email addresses, but a judge accepted an argument that they could instead be the gateways connecting the American communications network to the world, because Qaeda militants were probably among the countless people using those switches. Privacy protections would be applied afterward, the report said.
Asked about Large Content FISA orders, Vaneé Vines, an N.S.A. spokeswoman, said: “Since the enactment of the Protect America Act and the FISA Amendments Act, all collection activities that come within the scope of those statutes have been conducted pursuant to those statutes.”
The Raw Take order, back in 2002, also relaxed limits on sharing private information about Americans with foreign governments. The bar was higher for sharing with outsiders: Raw information was not provided, and even information deemed relevant about a terrorism issue required special approval.
Under procedures described in a 1984 report, only the attorney general could authorize such dissemination. But on Aug. 20, 2002, Attorney General John Ashcroft, citing the recent order, secretly issued new procedures allowing the N.S.A. to provide information to foreign governments without his clearance.
“If the proposed recipient(s) of the dissemination have a history of human rights abuses, that history should be considered in assessing the potential for economic injury, physical harm, or other restriction of movement, and whether the dissemination should be made,” he wrote.
Access within the N.S.A. to raw FISA information was initially limited to its headquarters at Fort Meade, Md. But in 2006, the N.S.A. expanded sharing to specialists at its code-breaking centers in Hawaii, Texas and Georgia. Only those trained would obtain access, but a review demonstrated that wider sharing had already increased risks. A document noted that the agency was mixing two types of FISA information, each subject to different court-imposed rules, along with other records, and “it is possible that there are already FISA violations resulting from the way data has been stored in these databases.”
The sharing of raw information continued to expand after the enactment of the FISA Amendments Act. On Sept. 4, 2008, the court issued an opinion, which remains secret but was cited in another opinion that has been declassified, approving minimization rules for the new law. A video explaining the new rules to N.S.A. employees noted that “C.I.A. and F.B.I. can have access to unminimized data in many circumstances.”
A footnote in a now-declassified October 2011 opinion shows that the N.S.A. did not share one category of raw data: emails intercepted at network switches, as opposed to those gathered from providers like Yahoo. For technical reasons, the switch tactic intercepts tens of thousands of purely domestic and unrelated emails annually.
Around early 2012, the court approved the expansion of sharing to a fourth agency, the National Counterterrorism Center, a clearinghouse for terrorism threat information. A May 2012 document says the “fact that NCTC is in receipt of raw or unminimized FISA information” is classified at a level reserved for data whose disclosure would “cause serious damage” to national security.
Intelligence officials, when pressed, offered no rationale for why public knowledge of the court’s interpretation of legal limits on sharing information met that standard.
Charlie Savage reported from Washington, and Laura Poitras from Berlin.
WASHINGTON — Ten months after the Sept. 11 attacks, the nation’s surveillance court delivered a ruling that intelligence officials consider a milestone in the secret history of American spying and privacy law. Called the “Raw Take” order — classified docket No. 02-431 — it weakened restrictions on sharing private information about Americans, according to documents and interviews.
The administration of President George W. Bush, intent on not overlooking clues about Al Qaeda, had sought the July 22, 2002, order. It is one of several still-classified rulings by the Foreign Intelligence Surveillance Court described in documents provided by Edward J. Snowden, the former National Security Agency contractor.
Previously, with narrow exceptions, an intelligence agency was permitted to disseminate information gathered from court-approved wiretaps only after deleting irrelevant private details and masking the names of innocent Americans who came into contact with a terrorism suspect. The Raw Take order significantly changed that system, documents show, allowing counterterrorism analysts at the N.S.A., the F.B.I. and the C.I.A. to share unfiltered personal information.The leaked documents that refer to the rulings, including one called the “Large Content FISA” order and several more recent expansions of powers on sharing information, add new details to the emerging public understanding of a secret body of law that the court has developed since 2001. The files help explain how the court evolved from its original task — approving wiretap requests — to engaging in complex analysis of the law to justify activities like the bulk collection of data about Americans’ emails and phone calls.
“These latest disclosures are important,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. “They indicate how the contours of the law secretly changed, and they represent the transformation of the Foreign Intelligence Surveillance Court into an interpreter of law and not simply an adjudicator of surveillance applications.”
The Raw Take order appears to have been the first substantial demonstration of the court’s willingness after Sept. 11 to reinterpret the law to expand government powers. N.S.A. officials included it as one of three court rulings on an internal timeline of key developments in surveillance law from 1972 to 2010, deeming it a historic event alongside once-secret 2004 and 2006 rulings on bulk email and call data.
A half-dozen current and former officials defended the order as lawful and reasonable, saying it allowed the government to best use its experts on Al Qaeda — wherever they worked — to find nuggets of intelligence hidden in hours of phone calls or volumes of emails. They also noted that the agencies receiving the data must still apply privacy protections after evaluating Americans’ information. An N.S.A. spokeswoman declined to comment about the ruling.
Still, Marc Rotenberg, the executive director of the Electronic Privacy Information Center, argued that the easing of privacy protections mandated by the Foreign Intelligence Surveillance Act of 1978 increased the risk of abuse and should not be a secret.
“The framers of FISA intended to narrowly restrict the ability of the government to disseminate this information because it has a very low standard enabling access to communications,” he said. “If the FISA court removed those safeguards, it obviously raises questions about compliance with the intent of the act.”
Continue reading the main story
The number of Americans whose unfiltered personal information has been shared among agencies is not clear. Since the Sept. 11 attacks, the court has approved about 1,800 FISA orders each year authorizing wiretaps or physical searches — which can involve planting bugs in homes or offices, or copying hard drives — inside the United States. But the government does not disclose how many people had their private conversations monitored as a result.Other Americans whose international phone calls and emails were swept up in the N.S.A.’s warrantless wiretapping program after it was legalized in 2007 might have increased those numbers. After Congress amended the surveillance act to authorize the program, the court allowed raw sharing of personal information from it, too, according to leaked and declassified documents.
The new disclosures come amid a debate over whether the surveillance court, which hears arguments only from the Justice Department, should be restructured for its evolving role. Proposals include overhauling how judges are selected to serve on it and creating a public advocate to provide adversarial arguments when the government offers complex legal analysis for expanding its powers.
Easing Barriers
The Bush administration sought the Raw Take order as it was trying to lower various bureaucratic barriers that impeded counterterrorism specialists across the government from working together.
Timothy Edgar, a Brown University visiting professor who worked at the Office of the Director of National Intelligence and at the White House from 2006 to 2013, said that after the Sept. 11 attacks “there was a big movement to make sure sharing took place early on and at a tactical level.”
“Without the ability to have a small group of people that would be able to share intelligence at an earlier stage, at a raw stage,” he added, “it was hard to cooperate at a more technical level.”
Some efforts took place in public. In May 2002, the surveillance court rejected a request to dismantle a “wall” that inhibited criminal prosecutors from working closely with intelligence investigators using FISA surveillance; that fall, a review court overturned the ruling. Meanwhile, the administration was also pushing in private to get around obstacles to sharing information among intelligence agencies. Congress had enacted FISA after revelations about decades of abuses of surveillance undertaken in the name of national security — like the F.B.I.’s taping of the Rev. Dr. Martin Luther King Jr.’s extramarital affairs and its sharing of the information with the Kennedy White House. The law required agencies to “minimize” private information about Americans — deleting data that is irrelevant for intelligence purposes before providing it to others.
Exceptions had been narrow, like when an agency needed decoding or translating help from a counterpart. The Justice Department’s 2002 motion — formally called “In Re Electronic Surveillance and Physical Search of International Terrorist Groups, Their Agents, and Related Targets” — argued that the court could interpret that exception more permissively.
People familiar with the request said it cited passages from a 1978 report by the House Intelligence Committee that explained what lawmakers intended the original FISA bill to mean.
One section says that when information has not yet been examined and another agency is going to perform that task, minimization requirements are not yet in effect. Another explains that lawmakers intended that “a significant degree of latitude be given in counterintelligence and counterterrorism cases” regarding the retention or sharing of information “between and among counterintelligence components of the government.”
Justice Department officials argued that those passages showed that it would be consistent with congressional intent to allow wider sharing of unevaluated, unminimized information among analysts at the N.S.A., the F.B.I. and the C.I.A. The court agreed, granting the order.
Current and former officials said only trained analysts with a need to see the raw information may access it. Still, Jameel Jaffer, a lawyer for the American Civil Liberties Union, noted that the government had cited stringent minimization rules to justify FISA surveillance as complying with the Constitution.
“It seems that at the same time the government has been touting the minimization requirements to the public, it’s been trying behind closed doors to weaken those requirements,” he said.The newly disclosed documents also refer to a decision by the court called Large Content FISA, a term that has not been publicly revealed before. Several current and former officials, speaking on the condition of anonymity, said Large Content FISA referred to sweeping but short-lived orders issued on Jan. 10, 2007, that authorized the Bush administration to continue its warrantless wiretapping program.
The Bush administration had sought a ruling to put the program, which had been exposed by The New York Times, on a firmer legal footing. Attorney General Alberto R. Gonzales disclosed a week after the decision that a judge had issued “innovative” and “complex” orders bringing the program under the surveillance court’s authority. But when they came up for renewal that April, another surveillance court judge balked and began requiring cumbersome paperwork, prompting the administration to seek a legislative solution, an intelligence official later explained.The documents do not explicitly say the Large Content FISA orders were the January 2007 decisions but are consistent with that explanation.
Two classification guides say that the N.S.A. used the orders during a transition to the enactment of the Protect America Act, an August 2007 law in which Congress legalized the program. It was replaced with the FISA Amendments Act in 2008.
The government has never provided details about the court’s reasoning in pronouncing the program lawful. But the orders are also mentioned in a classified draft of an N.S.A. inspector general report that Mr. Snowden disclosed, which calls them “Foreign Content” and “Domestic Content” orders. The report cites a legal theory that reinterpreted a key word in the original FISA — the “facility” against which the court may authorize spying because a terrorism suspect is using it.
Facilities had meant phone numbers or email addresses, but a judge accepted an argument that they could instead be the gateways connecting the American communications network to the world, because Qaeda militants were probably among the countless people using those switches. Privacy protections would be applied afterward, the report said.
Asked about Large Content FISA orders, Vaneé Vines, an N.S.A. spokeswoman, said: “Since the enactment of the Protect America Act and the FISA Amendments Act, all collection activities that come within the scope of those statutes have been conducted pursuant to those statutes.”
The Raw Take order, back in 2002, also relaxed limits on sharing private information about Americans with foreign governments. The bar was higher for sharing with outsiders: Raw information was not provided, and even information deemed relevant about a terrorism issue required special approval.
Under procedures described in a 1984 report, only the attorney general could authorize such dissemination. But on Aug. 20, 2002, Attorney General John Ashcroft, citing the recent order, secretly issued new procedures allowing the N.S.A. to provide information to foreign governments without his clearance.
“If the proposed recipient(s) of the dissemination have a history of human rights abuses, that history should be considered in assessing the potential for economic injury, physical harm, or other restriction of movement, and whether the dissemination should be made,” he wrote.
Access within the N.S.A. to raw FISA information was initially limited to its headquarters at Fort Meade, Md. But in 2006, the N.S.A. expanded sharing to specialists at its code-breaking centers in Hawaii, Texas and Georgia. Only those trained would obtain access, but a review demonstrated that wider sharing had already increased risks. A document noted that the agency was mixing two types of FISA information, each subject to different court-imposed rules, along with other records, and “it is possible that there are already FISA violations resulting from the way data has been stored in these databases.”
The sharing of raw information continued to expand after the enactment of the FISA Amendments Act. On Sept. 4, 2008, the court issued an opinion, which remains secret but was cited in another opinion that has been declassified, approving minimization rules for the new law. A video explaining the new rules to N.S.A. employees noted that “C.I.A. and F.B.I. can have access to unminimized data in many circumstances.”
A footnote in a now-declassified October 2011 opinion shows that the N.S.A. did not share one category of raw data: emails intercepted at network switches, as opposed to those gathered from providers like Yahoo. For technical reasons, the switch tactic intercepts tens of thousands of purely domestic and unrelated emails annually.
Around early 2012, the court approved the expansion of sharing to a fourth agency, the National Counterterrorism Center, a clearinghouse for terrorism threat information. A May 2012 document says the “fact that NCTC is in receipt of raw or unminimized FISA information” is classified at a level reserved for data whose disclosure would “cause serious damage” to national security.
Intelligence officials, when pressed, offered no rationale for why public knowledge of the court’s interpretation of legal limits on sharing information met that standard.
Charlie Savage reported from Washington, and Laura Poitras from Berlin.
*---------*---------*---------*---------*---------*---------*
6) Report Says Medication Use Is Rising for Adults With Attention Disorder
*---------*---------*---------*---------*---------*---------*
7) Ohio Looks at Whether Fracking Led to 2 Quakes
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
8) A Relentless Widening of Disparity in Wealth
By Eduardo Porter
8) A Relentless Widening of Disparity in Wealth
By Eduardo Porter
*---------*---------*---------*---------*---------*---------*
9) Set Free in 1995 Killings, 3 Bronx Men File Suits Alleging Police Misconduct
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
10) Status Quo at Elite New York Schools: Few Blacks and Hispanics
10) Status Quo at Elite New York Schools: Few Blacks and Hispanics
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
11) Wall Street Bonuses Go Up as the Number of Jobs Goes Down
By WILLIAM ALDEN
Updated, 11:04 a.m. | On Wall Street, profits are down and the number of workers is shrinking.
But bonuses continue to grow larger.
Cash bonuses paid to Wall Street employees in New York City rose 15 percent on average last year, to $164,530, according to estimates released on Wednesday by Thomas P. DiNapoli, the state comptroller. That was the biggest average bonus since 2007, the year before the financial crisis struck.
Over all, workers in the financial industry in the city made an estimated $26.7 billion in bonuses last year, a number that, again, was the highest level since the crisis. The bonus figures encompass everyone from the low-ranking employee to the chief executive, so high payouts to top managers can bring up the average.
That bonuses went up amid a challenging environment for the banks reflects a cardinal rule of Wall Street: Firms are willing to pay big for the top talent. This held true even as profits overall fell 30 percent to $16.7 billion, according to the comptroller’s report.
The cash haul included payments that had been granted in previous years. This was because Wall Street firms, since the crisis, have sought to keep a temporary lid on costs by deferring a portion of cash compensation. Some of this cash that had been withheld is being paid out for 2013, making bonuses larger than they otherwise might be.
The comptroller’s estimate of bonuses is based on income tax withholding data, and it does not include stock options or deferred compensation for which taxes have not yet been withheld.
While Wall Street bonuses have raised eyebrows in Washington in recent years, they are an important ingredient in the industry’s pay, often making up the bulk of these workers’ compensation.
From the perspective of the city, which had expected bonuses to go down, the increase is welcome news, bolstering a major source of tax revenue. Mr. DiNapoli estimated that the higher bonuses could translate into $100 million in tax revenue for the city in the current fiscal year above what had been anticipated.
A range of businesses in New York — from restaurants to luxury real estate — pin their fortunes to Wall Street pay. While the financial industry makes up just 5 percent of jobs in the city, those jobs account for 22 percent of the city’s wages, Mr. DiNapoli said.
“Wall Street is one of the key economic indicators and engines for our city and our state,” he said at a conference in Manhattan on Wednesday. “We certainly know that the impact of the Great Recession was felt profoundly in the securities industry here in the city.”
The aftershocks of that difficult period continue to be felt. Banks grappled with challenging markets last year, in part because of uncertainty over the Federal Reserve’s extraordinary economic stimulus program. On top of that, bank profits were dented by a barrage of legal issues stemming from the crisis.
The number of jobs in finance declined slightly last year, as firms sought to keep costs in check. The industry employed 165,200 people as of last December, a decline of 1.2 percent from the prior year and the second straight year of declines.
Wall Street compensation continues to dwarf the pay in other industries. The Institute for Policy Studies, a liberal-leaning research group, said on Wednesday that the $26.7 billion in bonuses would be enough to more than double the pay of the 1.1 million full-time minimum wage workers in the United States.
The average pay of Wall Street employees, including salary and bonuses, was $360,700 in 2012, the last year for which data are available — more than five times higher than in the rest of the private sector, according to the comptroller’s report.
For New York, the recovery in Wall Street pay translated into higher tax revenue. The city collected an estimated $3.8 billion in taxes last year from the securities industry, nearly 27 percent higher than in 2012, Mr. DiNapoli said. The industry accounted for 8.5 percent of the city’s tax revenue.
And yet, Wall Street continues to face challenges, even with the increase in bonuses. After past economic downturns, the securities industry “is what led us out of a tough economic time,” Mr. DiNapoli said.
“That has not been the case with our current recovery,” he said.
11) Wall Street Bonuses Go Up as the Number of Jobs Goes Down
Updated, 11:04 a.m. | On Wall Street, profits are down and the number of workers is shrinking.
But bonuses continue to grow larger.
Cash bonuses paid to Wall Street employees in New York City rose 15 percent on average last year, to $164,530, according to estimates released on Wednesday by Thomas P. DiNapoli, the state comptroller. That was the biggest average bonus since 2007, the year before the financial crisis struck.
Over all, workers in the financial industry in the city made an estimated $26.7 billion in bonuses last year, a number that, again, was the highest level since the crisis. The bonus figures encompass everyone from the low-ranking employee to the chief executive, so high payouts to top managers can bring up the average.
That bonuses went up amid a challenging environment for the banks reflects a cardinal rule of Wall Street: Firms are willing to pay big for the top talent. This held true even as profits overall fell 30 percent to $16.7 billion, according to the comptroller’s report.
The cash haul included payments that had been granted in previous years. This was because Wall Street firms, since the crisis, have sought to keep a temporary lid on costs by deferring a portion of cash compensation. Some of this cash that had been withheld is being paid out for 2013, making bonuses larger than they otherwise might be.
The comptroller’s estimate of bonuses is based on income tax withholding data, and it does not include stock options or deferred compensation for which taxes have not yet been withheld.
While Wall Street bonuses have raised eyebrows in Washington in recent years, they are an important ingredient in the industry’s pay, often making up the bulk of these workers’ compensation.
From the perspective of the city, which had expected bonuses to go down, the increase is welcome news, bolstering a major source of tax revenue. Mr. DiNapoli estimated that the higher bonuses could translate into $100 million in tax revenue for the city in the current fiscal year above what had been anticipated.
A range of businesses in New York — from restaurants to luxury real estate — pin their fortunes to Wall Street pay. While the financial industry makes up just 5 percent of jobs in the city, those jobs account for 22 percent of the city’s wages, Mr. DiNapoli said.
“Wall Street is one of the key economic indicators and engines for our city and our state,” he said at a conference in Manhattan on Wednesday. “We certainly know that the impact of the Great Recession was felt profoundly in the securities industry here in the city.”
The aftershocks of that difficult period continue to be felt. Banks grappled with challenging markets last year, in part because of uncertainty over the Federal Reserve’s extraordinary economic stimulus program. On top of that, bank profits were dented by a barrage of legal issues stemming from the crisis.
The number of jobs in finance declined slightly last year, as firms sought to keep costs in check. The industry employed 165,200 people as of last December, a decline of 1.2 percent from the prior year and the second straight year of declines.
Wall Street compensation continues to dwarf the pay in other industries. The Institute for Policy Studies, a liberal-leaning research group, said on Wednesday that the $26.7 billion in bonuses would be enough to more than double the pay of the 1.1 million full-time minimum wage workers in the United States.
The average pay of Wall Street employees, including salary and bonuses, was $360,700 in 2012, the last year for which data are available — more than five times higher than in the rest of the private sector, according to the comptroller’s report.
For New York, the recovery in Wall Street pay translated into higher tax revenue. The city collected an estimated $3.8 billion in taxes last year from the securities industry, nearly 27 percent higher than in 2012, Mr. DiNapoli said. The industry accounted for 8.5 percent of the city’s tax revenue.
And yet, Wall Street continues to face challenges, even with the increase in bonuses. After past economic downturns, the securities industry “is what led us out of a tough economic time,” Mr. DiNapoli said.
“That has not been the case with our current recovery,” he said.
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
12) How the NSA Plans to Infect 'Millions' of Computers With Malware
op-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.
The classified files - provided previously by NSA whistleblower Edward Snowden - contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware "implants." The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.
The covert infrastructure that supports the hacking efforts operates from the agency's headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target's computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer's microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system - codenamed TURBINE - is designed to "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."
In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the "Expert System," which is designed to operate "like the brain." The system manages the applications and functions of the implants and "decides" what tools they need to best extract data from infected machines.
Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations "disturbing." The NSA's surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.
"When they deploy malware on systems," Hypponen says, "they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties."
Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be "out of control."
"That would definitely not be proportionate," Hypponen says. "It couldn't possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance."
The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. "As the president made clear on 17 January," the agency said in a statement, "signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes."
"Owning the Net"
The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.
To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency's term for the interception of electronic communications. Instead, it sought to broaden "active" surveillance methods - tactics designed to directly infiltrate a target's computers or network devices.
In the documents, the agency describes such techniques as "a more aggressive approach to SIGINT" and says that the TAO unit's mission is to "aggressively scale" these operations.
But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
"One of the greatest challenges for active SIGINT/attack is scale," explains the top-secret presentation from 2009. "Human 'drivers' limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture)."
The agency's solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an "intelligent command and control capability" that enables "industrial-scale exploitation."
TURBINE was designed to make deploying malware much easier for the NSA's hackers by reducing their role in overseeing its functions. The system would "relieve the user from needing to know/care about the details," the NSA's Technology Directorate notes in one secret document from 2009. "For example, a user should be able to ask for 'all details about application X' and not need to know how and where the application keeps files, registry entries, user application data, etc."
In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually - including the configuration of the implants as well as surveillance collection, or "tasking," of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact - allowing the agency to push forward into a new frontier of surveillance operations.
The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to "increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants." (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
Eventually, the secret files indicate, the NSA's plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.
Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.
The intelligence community's top-secret "Black Budget" for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named "Owning the Net."
The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass "a wider variety" of networks and "enabling greater automation of computer network exploitation."
Circumventing Encryption
The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.
One implant, codenamed UNITEDRAKE, can be used with a variety of "plug-ins" that enable the agency to gain total control of an infected computer.
An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer's microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer's webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.
The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That's because the NSA's malware gives the agency unfettered access to a target's computer before the user protects their communications with encryption.
It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
Previous reports have alleged that the NSA worked with Israel to develop the Stuxnet malware, which was used to sabotage Iranian nuclear facilities. The agency also reportedly worked with Israel to deploy malware called Flame to infiltrate computers and spy on communications in countries across the Middle East.
According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as "extremist." But the mandate of the NSA's hackers is not limited to invading the systems of those who pose a threat to national security.
In one secret post on an internal message board, an operative from the NSA's Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator's computer, the agency can gain covert access to communications that are processed by his company. "Sys admins are a means to an end," the NSA operative writes.
The internal post - titled "I hunt sys admins" - makes clear that terrorists aren't the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any "government official that happens to be using the network some admin takes care of."
Similar tactics have been adopted by Government Communications Headquarters, the NSA's British counterpart. As the German newspaper Der Spiegel reported in September, GCHQ hacked computers belonging to network engineers at Belgacom, the Belgian telecommunications provider.
The mission, codenamed "Operation Socialist," was designed to enable GCHQ to monitor mobile phones connected to Belgacom's network. The secret files deem the mission a "success," and indicate that the agency had the ability to covertly access Belgacom's systems since at least 2010.
Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers - the devices that connect computer networks and transport data packets across the Internet - the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform "exploitation attacks" against data that is sent through a Virtual Private Network, a tool that uses encrypted "tunnels" to enhance the security and privacy of an Internet session.
The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted "Real-time Transport Protocol" packets, the implants can covertly record the audio data and then return it to the NSA for analysis.
But not all of the NSA's implants are used to gather intelligence, the secret files show. Sometimes, the agency's aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target's file downloads. These two "attack" techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for "defensive" purposes - to protect U.S. government networks against intrusions.
"Mass exploitation potential"
Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.
According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a "back-door implant" infects their computers within eight seconds.
There's only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious.
Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called "man-in-the-middle" and "man-on-the-side" attacks, which covertly force a user's internet browser to route to NSA computer servers that try to infect them with an implant.
To perform a man-on-the-side attack, the NSA observes a target's Internet traffic using its global network of covert "accesses" to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency's surveillance sensors alert the TURBINE system, which then "shoots" data packets at the targeted computer's IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target's computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
The documents show that QUANTUMHAND became operational in October 2010, after being successfully tested by the NSA against about a dozen targets.
According to Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, it appears that the QUANTUMHAND technique is aimed at targeting specific individuals. But he expresses concerns about how it has been covertly integrated within Internet networks as part of the NSA's automated TURBINE system.
"As soon as you put this capability in the backbone infrastructure, the software and security engineer in me says that's terrifying," Blaze says.
"Forget about how the NSA is intending to use it. How do we know it is working correctly and only targeting who the NSA wants? And even if it does work correctly, which is itself a really dubious assumption, how is it controlled?"
In an email statement to The Intercept, Facebook spokesman Jay Nancarrow said the company had "no evidence of this alleged activity." He added that Facebook implemented HTTPS encryption for users last year, making browsing sessions less vulnerable to malware attacks.
Nancarrow also pointed out that other services besides Facebook could have been compromised by the NSA. "If government agencies indeed have privileged access to network service providers," he said, "any site running only [unencrypted] HTTP could conceivably have its traffic misdirected."
A man-in-the-middle attack is a similar but slightly more aggressive method that can be used by the NSA to deploy its malware. It refers to a hacking technique in which the agency covertly places itself between computers as they are communicating with each other.
This allows the NSA not only to observe and redirect browsing sessions, but to modify the content of data packets that are passing between computers.
The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is sometimes used by criminal hackers to defraud people.
A top-secret NSA presentation from 2012 reveals that the agency developed a man-in-the-middle capability called SECONDDATE to "influence real-time communications between client and server" and to "quietly redirect web-browsers" to NSA malware servers called FOXACID. In October, details about the FOXACID system were reported by the Guardian, which revealed its links to attacks against users of the Internet anonymity service Tor.
But SECONDDATE is tailored not only for "surgical" surveillance attacks on individual suspects. It can also be used to launch bulk malware attacks against computers.
According to the 2012 presentation, the tactic has "mass exploitation potential for clients passing through network choke points."
Blaze, the University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale "seems very disturbing." Such an approach would involve indiscriminately monitoring entire networks as opposed to targeting individual suspects.
"The thing that raises a red flag for me is the reference to 'network choke points,'" he says. "That's the last place that we should be allowing intelligence agencies to compromise the infrastructure - because that is by definition a mass surveillance technique."
To deploy some of its malware implants, the NSA exploits security vulnerabilities in commonly used Internet browsers such as Mozilla Firefox and Internet Explorer.
The agency's hackers also exploit security weaknesses in network routers and in popular software plugins such as Flash and Java to deliver malicious code onto targeted machines.
The implants can circumvent anti-virus programs, and the NSA has gone to extreme lengths to ensure that its clandestine technology is extremely difficult to detect. An implant named VALIDATOR, used by the NSA to upload and download data to and from an infected machine, can be set to self-destruct - deleting itself from an infected computer after a set time expires.
In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency's hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. "If we can get the target to visit us in some sort of web browser, we can probably own them," an agency hacker boasts in one secret document. "The only limitation is the 'how.'"
Covert Infrastructure
The TURBINE implants system does not operate in isolation.
It is linked to, and relies upon, a large network of clandestine surveillance "sensors" that the agency has installed at locations across the world.
The NSA's headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.
The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.
When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or "tips" to TURBINE, enabling the initiation of a malware attack.
The NSA identifies surveillance targets based on a series of data "selectors" as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique "cookies" containing a username or other identifying information that are sent to a user's computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter.
Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
What's more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.
Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance - the United Kingdom, Canada, New Zealand, and Australia.
GCHQ, the British agency, has taken on a particularly important role in helping to develop the malware tactics. The Menwith Hill satellite eavesdropping base that is part of the TURMOIL network, located in a rural part of Northern England, is operated by the NSA in close cooperation with GCHQ.
Top-secret documents show that the British base - referred to by the NSA as "MHS" for Menwith Hill Station - is an integral component of the TURBINE malware infrastructure and has been used to experiment with implant "exploitation" attacks against users of Yahoo and Hotmail.
In one document dated 2010, at least five variants of the QUANTUM hacking method were listed as being "operational" at Menwith Hill. The same document also reveals that GCHQ helped integrate three of the QUANTUM malware capabilities - and test two others - as part of a surveillance system it operates codenamed INSENSER.
GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, previously disclosed by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to "legal/policy restrictions." A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately voiced concerns that performing "active" hacking attacks for surveillance "may be illegal" under British law.
In response to questions from The Intercept, GCHQ refused to comment on its involvement in the covert hacking operations. Citing its boilerplate response to inquiries, the agency said in a statement that "all of GCHQ's work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight."
Whatever the legalities of the United Kingdom and United States infiltrating computer networks, the Snowden files bring into sharp focus the broader implications. Under cover of secrecy and without public debate, there has been an unprecedented proliferation of aggressive surveillance techniques. One of the NSA's primary concerns, in fact, appears to be that its clandestine tactics are now being adopted by foreign rivals, too.
"Hacking routers has been good business for us and our 5-eyes partners for some time," notes one NSA analyst in a top-secret document dated December 2012. "But it is becoming more apparent that other nation states are honing their skillz [sic] and joining the scene."
12) How the NSA Plans to Infect 'Millions' of Computers With Malware
12 March 14
http://readersupportednews.org/opinion2/277-75/22535-focus-how-the-nsa-plans-to-infect-millions-of-computers-with-malware
op-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.
The classified files - provided previously by NSA whistleblower Edward Snowden - contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware "implants." The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.
The covert infrastructure that supports the hacking efforts operates from the agency's headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target's computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer's microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system - codenamed TURBINE - is designed to "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."
In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the "Expert System," which is designed to operate "like the brain." The system manages the applications and functions of the implants and "decides" what tools they need to best extract data from infected machines.
Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations "disturbing." The NSA's surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.
"When they deploy malware on systems," Hypponen says, "they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties."
Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be "out of control."
"That would definitely not be proportionate," Hypponen says. "It couldn't possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance."
The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. "As the president made clear on 17 January," the agency said in a statement, "signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes."
"Owning the Net"
The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.
To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency's term for the interception of electronic communications. Instead, it sought to broaden "active" surveillance methods - tactics designed to directly infiltrate a target's computers or network devices.
In the documents, the agency describes such techniques as "a more aggressive approach to SIGINT" and says that the TAO unit's mission is to "aggressively scale" these operations.
But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
"One of the greatest challenges for active SIGINT/attack is scale," explains the top-secret presentation from 2009. "Human 'drivers' limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture)."
The agency's solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an "intelligent command and control capability" that enables "industrial-scale exploitation."
TURBINE was designed to make deploying malware much easier for the NSA's hackers by reducing their role in overseeing its functions. The system would "relieve the user from needing to know/care about the details," the NSA's Technology Directorate notes in one secret document from 2009. "For example, a user should be able to ask for 'all details about application X' and not need to know how and where the application keeps files, registry entries, user application data, etc."
In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually - including the configuration of the implants as well as surveillance collection, or "tasking," of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact - allowing the agency to push forward into a new frontier of surveillance operations.
The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to "increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants." (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
Eventually, the secret files indicate, the NSA's plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.
Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.
The intelligence community's top-secret "Black Budget" for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named "Owning the Net."
The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass "a wider variety" of networks and "enabling greater automation of computer network exploitation."
Circumventing Encryption
The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.
One implant, codenamed UNITEDRAKE, can be used with a variety of "plug-ins" that enable the agency to gain total control of an infected computer.
An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer's microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer's webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.
The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That's because the NSA's malware gives the agency unfettered access to a target's computer before the user protects their communications with encryption.
It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
Previous reports have alleged that the NSA worked with Israel to develop the Stuxnet malware, which was used to sabotage Iranian nuclear facilities. The agency also reportedly worked with Israel to deploy malware called Flame to infiltrate computers and spy on communications in countries across the Middle East.
According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as "extremist." But the mandate of the NSA's hackers is not limited to invading the systems of those who pose a threat to national security.
In one secret post on an internal message board, an operative from the NSA's Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator's computer, the agency can gain covert access to communications that are processed by his company. "Sys admins are a means to an end," the NSA operative writes.
The internal post - titled "I hunt sys admins" - makes clear that terrorists aren't the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any "government official that happens to be using the network some admin takes care of."
Similar tactics have been adopted by Government Communications Headquarters, the NSA's British counterpart. As the German newspaper Der Spiegel reported in September, GCHQ hacked computers belonging to network engineers at Belgacom, the Belgian telecommunications provider.
The mission, codenamed "Operation Socialist," was designed to enable GCHQ to monitor mobile phones connected to Belgacom's network. The secret files deem the mission a "success," and indicate that the agency had the ability to covertly access Belgacom's systems since at least 2010.
Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers - the devices that connect computer networks and transport data packets across the Internet - the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform "exploitation attacks" against data that is sent through a Virtual Private Network, a tool that uses encrypted "tunnels" to enhance the security and privacy of an Internet session.
The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted "Real-time Transport Protocol" packets, the implants can covertly record the audio data and then return it to the NSA for analysis.
But not all of the NSA's implants are used to gather intelligence, the secret files show. Sometimes, the agency's aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target's file downloads. These two "attack" techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for "defensive" purposes - to protect U.S. government networks against intrusions.
"Mass exploitation potential"
Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.
According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a "back-door implant" infects their computers within eight seconds.
There's only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious.
Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called "man-in-the-middle" and "man-on-the-side" attacks, which covertly force a user's internet browser to route to NSA computer servers that try to infect them with an implant.
To perform a man-on-the-side attack, the NSA observes a target's Internet traffic using its global network of covert "accesses" to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency's surveillance sensors alert the TURBINE system, which then "shoots" data packets at the targeted computer's IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target's computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
The documents show that QUANTUMHAND became operational in October 2010, after being successfully tested by the NSA against about a dozen targets.
According to Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, it appears that the QUANTUMHAND technique is aimed at targeting specific individuals. But he expresses concerns about how it has been covertly integrated within Internet networks as part of the NSA's automated TURBINE system.
"As soon as you put this capability in the backbone infrastructure, the software and security engineer in me says that's terrifying," Blaze says.
"Forget about how the NSA is intending to use it. How do we know it is working correctly and only targeting who the NSA wants? And even if it does work correctly, which is itself a really dubious assumption, how is it controlled?"
In an email statement to The Intercept, Facebook spokesman Jay Nancarrow said the company had "no evidence of this alleged activity." He added that Facebook implemented HTTPS encryption for users last year, making browsing sessions less vulnerable to malware attacks.
Nancarrow also pointed out that other services besides Facebook could have been compromised by the NSA. "If government agencies indeed have privileged access to network service providers," he said, "any site running only [unencrypted] HTTP could conceivably have its traffic misdirected."
A man-in-the-middle attack is a similar but slightly more aggressive method that can be used by the NSA to deploy its malware. It refers to a hacking technique in which the agency covertly places itself between computers as they are communicating with each other.
This allows the NSA not only to observe and redirect browsing sessions, but to modify the content of data packets that are passing between computers.
The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is sometimes used by criminal hackers to defraud people.
A top-secret NSA presentation from 2012 reveals that the agency developed a man-in-the-middle capability called SECONDDATE to "influence real-time communications between client and server" and to "quietly redirect web-browsers" to NSA malware servers called FOXACID. In October, details about the FOXACID system were reported by the Guardian, which revealed its links to attacks against users of the Internet anonymity service Tor.
But SECONDDATE is tailored not only for "surgical" surveillance attacks on individual suspects. It can also be used to launch bulk malware attacks against computers.
According to the 2012 presentation, the tactic has "mass exploitation potential for clients passing through network choke points."
Blaze, the University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale "seems very disturbing." Such an approach would involve indiscriminately monitoring entire networks as opposed to targeting individual suspects.
"The thing that raises a red flag for me is the reference to 'network choke points,'" he says. "That's the last place that we should be allowing intelligence agencies to compromise the infrastructure - because that is by definition a mass surveillance technique."
To deploy some of its malware implants, the NSA exploits security vulnerabilities in commonly used Internet browsers such as Mozilla Firefox and Internet Explorer.
The agency's hackers also exploit security weaknesses in network routers and in popular software plugins such as Flash and Java to deliver malicious code onto targeted machines.
The implants can circumvent anti-virus programs, and the NSA has gone to extreme lengths to ensure that its clandestine technology is extremely difficult to detect. An implant named VALIDATOR, used by the NSA to upload and download data to and from an infected machine, can be set to self-destruct - deleting itself from an infected computer after a set time expires.
In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency's hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. "If we can get the target to visit us in some sort of web browser, we can probably own them," an agency hacker boasts in one secret document. "The only limitation is the 'how.'"
Covert Infrastructure
The TURBINE implants system does not operate in isolation.
It is linked to, and relies upon, a large network of clandestine surveillance "sensors" that the agency has installed at locations across the world.
The NSA's headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.
The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.
When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or "tips" to TURBINE, enabling the initiation of a malware attack.
The NSA identifies surveillance targets based on a series of data "selectors" as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique "cookies" containing a username or other identifying information that are sent to a user's computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter.
Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
What's more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.
Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance - the United Kingdom, Canada, New Zealand, and Australia.
GCHQ, the British agency, has taken on a particularly important role in helping to develop the malware tactics. The Menwith Hill satellite eavesdropping base that is part of the TURMOIL network, located in a rural part of Northern England, is operated by the NSA in close cooperation with GCHQ.
Top-secret documents show that the British base - referred to by the NSA as "MHS" for Menwith Hill Station - is an integral component of the TURBINE malware infrastructure and has been used to experiment with implant "exploitation" attacks against users of Yahoo and Hotmail.
In one document dated 2010, at least five variants of the QUANTUM hacking method were listed as being "operational" at Menwith Hill. The same document also reveals that GCHQ helped integrate three of the QUANTUM malware capabilities - and test two others - as part of a surveillance system it operates codenamed INSENSER.
GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, previously disclosed by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to "legal/policy restrictions." A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately voiced concerns that performing "active" hacking attacks for surveillance "may be illegal" under British law.
In response to questions from The Intercept, GCHQ refused to comment on its involvement in the covert hacking operations. Citing its boilerplate response to inquiries, the agency said in a statement that "all of GCHQ's work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight."
Whatever the legalities of the United Kingdom and United States infiltrating computer networks, the Snowden files bring into sharp focus the broader implications. Under cover of secrecy and without public debate, there has been an unprecedented proliferation of aggressive surveillance techniques. One of the NSA's primary concerns, in fact, appears to be that its clandestine tactics are now being adopted by foreign rivals, too.
"Hacking routers has been good business for us and our 5-eyes partners for some time," notes one NSA analyst in a top-secret document dated December 2012. "But it is becoming more apparent that other nation states are honing their skillz [sic] and joining the scene."
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
13) Man Has Been On Deathrow For Decades, Now He’s Free
By: Stephanie Allen-Gobert
March 13, 2014
13) Man Has Been On Deathrow For Decades, Now He’s Free
By: Stephanie Allen-Gobert
March 13, 2014
http://www.kulturekritic.com/2014/03/men/man-has-been-on-deathrow-for-decades-now-hes-free/
Imagine being on death row for 26 years knowing your innocent, but still might be executed. Since August of 1988, Glenn Ford has sat on death row waiting to be set free or executed. On Tuesday afternoon, Ford, 64 walked out of prison at Angola in Louisiana a free man.
A judge approved the state’s motion to vacate his murder conviction in the 1983 killing of 56-year-old Isadore Rozeman, a Shreveport, Louisiana, jeweler and watchmaker for whom he had done occasional yard work, the Associated Press reports.
“It feels good; my mind is going in all kind of directions. It feels good,” Ford told WAFB-TV. Ford said that he does harbor some resentment for being wrongly convicted.
“…I’ve been locked up almost 30 years for something I didn’t do,” he said. “I can’t go back and do anything I should have been doing when I was 35, 38, 40, stuff like that.”
According to AP, based on new information that corroborated his claim that he was not present or involved in Rozeman’s death, State district Judge Ramona Emanuel on Monday took the step of voiding Ford’s conviction and sentence.
“We are very pleased to see Glenn Ford finally exonerated, and we are particularly grateful that the prosecution and the court moved ahead so decisively to set Mr. Ford free,” said a statement from the attorneys for Ford from the Capital Post Conviction Project of Louisiana.
According to AP, Ford’s trial had been “profoundly comprised by inexperienced counsel and by the unconstitutional suppression of evidence, including information from an informant, “the statement read. Ford’s attorney also cited what they said was a suppressed police report related to the time of the crime and evidence involving the murder weapon.
A Louisiana law entitles those who have served time but are later exonerated to receive compensation. It calls for payments of $25,000 per year of wrongful incarceration up to a maximum of $250,000, plus up to $80,000 for loss of “life” opportunities.
Source: www.theroot.com
Imagine being on death row for 26 years knowing your innocent, but still might be executed. Since August of 1988, Glenn Ford has sat on death row waiting to be set free or executed. On Tuesday afternoon, Ford, 64 walked out of prison at Angola in Louisiana a free man.
A judge approved the state’s motion to vacate his murder conviction in the 1983 killing of 56-year-old Isadore Rozeman, a Shreveport, Louisiana, jeweler and watchmaker for whom he had done occasional yard work, the Associated Press reports.
“It feels good; my mind is going in all kind of directions. It feels good,” Ford told WAFB-TV. Ford said that he does harbor some resentment for being wrongly convicted.
“…I’ve been locked up almost 30 years for something I didn’t do,” he said. “I can’t go back and do anything I should have been doing when I was 35, 38, 40, stuff like that.”
According to AP, based on new information that corroborated his claim that he was not present or involved in Rozeman’s death, State district Judge Ramona Emanuel on Monday took the step of voiding Ford’s conviction and sentence.
“We are very pleased to see Glenn Ford finally exonerated, and we are particularly grateful that the prosecution and the court moved ahead so decisively to set Mr. Ford free,” said a statement from the attorneys for Ford from the Capital Post Conviction Project of Louisiana.
According to AP, Ford’s trial had been “profoundly comprised by inexperienced counsel and by the unconstitutional suppression of evidence, including information from an informant, “the statement read. Ford’s attorney also cited what they said was a suppressed police report related to the time of the crime and evidence involving the murder weapon.
A Louisiana law entitles those who have served time but are later exonerated to receive compensation. It calls for payments of $25,000 per year of wrongful incarceration up to a maximum of $250,000, plus up to $80,000 for loss of “life” opportunities.
Source: www.theroot.com
*---------*---------*---------*---------*---------*---------*
14) Huge Recall by G.M. Sets Off Painful Questions on Crashes
*---------*---------*---------*---------*---------*---------*
15) Holder Endorses Proposal to Reduce Drug Sentences
Attorney General Eric H. Holder Jr. is endorsing a proposal that would reduce prison sentences for people convicted of dealing drugs, the latest sign of the Obama administration’s retrenchment in the war on drugs.
In January, the United States Sentencing Commission proposed changing federal guidelines to lessen the average sentence for drug dealers by about one year, to 51 months from 62 months. Mr. Holder testified before the commission on Thursday in support of the plan.
With the support of several Republicans in Congress, the attorney general is separately pushing for the elimination of mandatory minimum sentences for nonviolent drug crimes. In January, the Justice Department issued a call encouraging low-level criminals serving lengthy sentences on crack cocaine charges to apply for clemency.
Since the late 1970s, the prison population in the United States has ballooned into the world’s largest. About one in every 100 adults is locked up.
In the federal prison system, the one that would be affected by the proposed changes, half of the 215,000 inmates are serving time for drug crimes. Under the changes being considered, the federal prison population would decrease by about 6,550 inmates over the next five years, according to government estimates.
“This overreliance on incarceration is not just financially unsustainable,” Mr. Holder said. “It comes with human and moral costs that are impossible to calculate.”
The nation’s prison population peaked in 2009 at more than 1.6 million inmates. Since then, as state budgets have tightened and crime has hit record low levels, that number has declined each year.
Public attitudes have also changed. Twenty states and the District of Columbia have legalized medicinal marijuana, and Colorado and Washington have legalized it for recreational purposes.
President Obama has said that marijuana is not that different from tobacco and no more dangerous than alcohol, and his administration has declined to stand in the way of legalization. Last month, Mr. Holder announced rules to help bring legitimate marijuana businesses into the banking system, which had been off limits.
About a third of the Justice Department’s budget goes to the prison system, a fact that has helped Mr. Holder win conservative allies for sentencing changes. He met recently with libertarian-minded Republicans in the House and Senate, including members who oppose him on many other issues.
But Raymond F. Morrogh, the top prosecutor in Fairfax County, Va., said budget woes were no reason to make sentencing more lenient.
“Shouldn’t we consider other areas of the federal budget to trim the fat off of, rather than roll the dice with the safety of America’s communities?” Mr. Morrogh said, testifying on behalf of the National District Attorneys Association.
He said prosecutors use the threat of tough sentences to persuade defendants to cooperate and help the government unravel criminal organizations.
“Rewarding convicted felons with lighter sentences because America can’t balance its budget doesn’t seem fair to both victims of crime and the millions of families in America victimized every year by the scourge of drugs in America’s communities,” Mr. Morrogh said.
Mr. Holder has also described prison reform as a matter of civil rights. African-Americans are disproportionately represented in prison: They make up 13 percent of the nation’s population, but 37 percent of the federal prison population.
The crack epidemic is one of the main reasons the prison population has grown so much. In 2010, Congress voted unanimously to reduce the 100-to-one disparity between sentences for crack cocaine offenses and those for powdered cocaine. Blacks received harsher sentences under those guidelines because crack has been more popular in black neighborhoods, while whites have been more likely to use powdered cocaine.
The Sentencing Commission writes the guidelines that judges must consider. It is soliciting comments on the proposed sentencing reductions and will vote, probably in April, on whether to carry them out. Unless Congress voted to reject the proposals, the commission’s changes would go into effect in November.
Until then, the Justice Department said Mr. Holder would tell federal prosecutors not to oppose any sentence that would fall under the more lenient guidelines.
“This straightforward adjustment to sentencing ranges, while measured in scope, would nonetheless send a strong message about the fairness of our criminal justice system,” Mr. Holder said. “And it would help to rein in federal prison spending while focusing limited resources on the most serious threats to public safety.”
*---------*---------*---------*---------*---------*---------*
16) Across Turkey, New Unrest as Teenage Boy Is Buried
http://www.nytimes.com/2014/03/13/world/europe/funeral-of-turkish-boy-leads-to-more-violent-clashes.html?ref=world
ISTANBUL — An enormous outpouring of grief and antigovernment rage during the funeral procession for a teenage boy felled by a police tear-gas canister turned into another mass confrontation with the Turkish authorities on Wednesday as mourners clashed with antiriot squads in Istanbul, Ankara and Izmir. At least one person was killed.
The new unrest came a day after protesters battled with police officers in at least 15 cities over news that the boy, Berkin Elvan, 15, had died. He had been comatose with head trauma since June, when Turkey was first engulfed with antigovernment protests against the decade-old tenure of Prime Minister Recep Tayyip Erdogan, who is seen as increasingly authoritarian.The boy, who was struck by a tear-gas canister while buying bread, has become the newest symbol of simmering anger at Mr. Erdogan and his Justice and Development Party, known as AKP, and over the tough police repression of political dissent and a recent corruption scandal that has entangled the top echelons of the ruling party.
“Here’s a thief! Here’s a murderer!” and “Mothers’ anger will strangle murderers!” funeral marchers screamed as they walked, blowing whistles. “Berkin’s murderer is AKP’s police!”
More than 100,000 people converged in Istanbul to participate in the boy’s funeral procession to a cemetery. The burial itself was peaceful as hundreds of riot police were deployed nearby.
“He was our hope, he was our miracle, he was our son, brother, everything. We were waiting for him to wake up but we unfortunately lost him,” said Damla Atalay, 32, a lawyer, who marched in a convoy behind the coffin. “We are here because this little boy is part of us, it could happen to any of us, to our son, brother.”
Some mourners quietly held loaves of bread, while others carried a banner with pictures of eight people killed by the police during June protests with a message aimed at Mr. Erdogan and his associates: “Their children are murderers, thieves, ours are immortal,” the banner read.
The violence began after the funeral, as police officers armed with tear gas, water cannons and rubber bullets thwarted large crowds in Istanbul who tried to stop traffic or move toward Taksim Square, the center of the June protests, which was sealed off.
One protester was killed, an unspecified number were hurt, some with serious injuries including broken bones, and more than 70 people, including children, were detained in Istanbul alone, the city’s Bar Association said. The dead person was identified by the association as a 21-year-old killed in a clash between political youth groups in the neighborhood where the mourned teenager had lived.
A police officer died in Tunceli, an eastern, predominantly Alevi Muslim town, after suffering respiratory problems after being exposed to tear gas, the Ihlas News Agency reported.
In Ankara, web television footage showed garbage bins set on fire and used as street barricades late Wednesday. Police officers using tear gas and water cannons dispersed more than 1,000 people who gathered in the capital’s center, while clashes at the Ankara University campus continued, news outlets reported.
In Istanbul, dozens were injured by police rubber bullets and tear gas as ambulances crisscrossed the Taksim Square area. At least one person was hit in the head by a tear-gas canister on Istiklal Street, and was taken to the hospital with severe bleeding, according to a local television reporter. Mr. Erdogan has praised the police performance in June, although several international organizations, including the European Court, criticized what they called an excessive use of tear gas and water cannons. Mr. Erdogan has said nothing about Berkin Elvan’s death.
President Abdullah Gul, who sent condolences to the boy’s family, had requested that the local authorities handle protests with care. But he also had urged protesters to “do everything to prevent this from happening again.”
Correction: March 13, 2014
Because of an editing error, an earlier version of this article misstated the name of Prime Minister Recep Tayyip Erdogan’s party. It is the Justice and Development Party, not the Justice and Freedom Party.
Rick Gladstone contributed reporting from New York.
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
17) New Hampshire Nears Repeal of Death Penalty
17) New Hampshire Nears Repeal of Death Penalty
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
B.
EVENTS AND ACTIONS
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Pennsylvania—2013
had a record number of exonerations with a total of 87! According to
the National Registry of Exonerations, the total of exonerations to date
is 1313. Jeffery Deskovic of New York spent 17 years in prison for a
crime he did not commit. Michael DeLoe is in his 6th year of wrongful
conviction currently waiting for a hearing on March 17th in the
Washington County Courts. Da’Ron Cox is in his 16th year of a wrongful
conviction awaiting a post-conviction hearing to prove his innocence.
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
On Wednesday, March 19, 2014 CODEPINK, Witness Iraq, and the Peace and Justice Committee of the Unitarian Universalist Church in SF will hold a panel discussion to commemorate the 11th year anniversary of the war on Iraq titled “Remembering Iraq 11 Years Later: Then and Now.”
The panel is meant to be an evening of remembering Iraq before, during and after the war and how the current day struggles of Iraqis, inside and outside of the country, continue whether in the form of surviving the violent attacks in the country or surviving life in foreign lands.
A CODEPINK organizer and Iraqi refugee, Farah Muhsin Al Mousawi, will moderate the discussion.
Panelists include:
• Inder Comar of Comar Law, a San Francisco attorney representing Sundus Shaker Saleh, an Iraqi refugee and the lead plaintiff in the class action lawsuit against key members of the George W. Bush Administration (Saleh v. Bush)
• Aaron Hughes, an Iraq War veteran, artist and activists who is actively involved Warrior Writers Project, The Dirty Canteen, The National Veterans Art Museum, Iraq Veterans Against the War, and The Center for Artistic Activism
• Zaid Faransso, an Iraqi refugee and former medical resident at Baghdad’s Medical City
Location:
First Unitarian Universalist Church & Center - MLK Room
1187 Franklin St
San Francisco, CA 94109
RSVP for the event!
http://calendar-codepink.nationbuilder.com/60200/remembering_iraq_11_years_later_then_and_now
In Justice & Accountability,
CODEPINK SF
*---------*---------*---------*---------*---------*---------*
SIXTH ANNUAL FREEDOM MARCH FOR THE WRONGFULLY CONVICTED
March 14th at Noon on the steps of the Washington County Courthouse in Washington, PA
Pennsylvania—2013
had a record number of exonerations with a total of 87! According to
the National Registry of Exonerations, the total of exonerations to date
is 1313. Jeffery Deskovic of New York spent 17 years in prison for a
crime he did not commit. Michael DeLoe is in his 6th year of wrongful
conviction currently waiting for a hearing on March 17th in the
Washington County Courts. Da’Ron Cox is in his 16th year of a wrongful
conviction awaiting a post-conviction hearing to prove his innocence.
In
order to raise public awareness of this problem, the 1st National
Freedom March for the Wrongfully Convicted was held simultaneously in
many states on June 3, 2009. MaryAnn Lubas is the Pennsylvania Director
for the Freedom March and continues this effort holding the 6th Annual
Freedom March on March 14th at Noon on the steps of the Washington
County Courthouse in Washington, PA. Speakers at the March will include
Jeffrey Deskovic from New York, Erica Johnson from Nemacolin, MaryAnn
Lubas, director and others who this has affected.
Jeffrey
Deskovic: Jeffrey spent 16 years in prison for a rape and murder he did
not commit and was exonerated in November of 2006. Jeff walked into
prison at age seventeen and walked out at age thirty-three. Jeff sued
New York State and with 1.5 million dollars of his settlement, he opened
the Jeffrey Deskovic Foundation for Justice. He continues to fight
wrongful convictions through his 4 prongs: raising awareness; seeking
legislative changes; working to exonerate the wrongfully convicted-both
in DNA and Non-DNA cases; and helping the wrongfully convicted
reintegrate back into society. “I am proud to participate in the Freedom
March for the Wrongfully Convicted, and I stand solidly behind Michael
DeLoe.” Read more about his Foundation's work by visiting his website:
www.Deskovic.org
Erica Johnson: Erica’s husband Dylan Ryan
Johnson has been imprisoned in Mexico just having been sentenced to 15
years for a crime that he did not commit. The media has embraced Amanda
Knox and shown support for Amanda. Dylan is a Pennsylvania resident
and his case needs as much attention as Amanda Knox. Erica will speak
on his case and the injustices they have endured.
MaryAnn Lubas
is an advocate for the wrongfully convicted and the director of the
Pennsylvania Freedom March for the wrongfully convicted. Lubas son
Michael DeLoe was wrongfully convicted on Jan. 15th, 2009. After
getting over the initial shock of the injustices she saw in the trial,
she came on board to bring awareness to the citizens of Pennsylvania.
She has traveled to Washington D.C. giving testimony on Capitol Hill as
to the reform needed to stop this from continuing. She has learned that
many are also fighting wrongful convictions in our state, including
Lorenzo Johnson, Da’Ron Cox, Joseph Hall, Carmen Woods, Joy O’Shea,
Dylan Johnson, Jimmy Dennis, Clayton Mibroda, Terrell Scott and many
more.
Other Speakers: Will be addressing the effects of wrongful conviction and their causes.
Please
join us at this worthwhile event. Information on the National Freedom
March for the Wrongfully Convicted can be found at
www.freedommarchusa.org. Learn more about the case of Michael DeLoe at:
www.justiceformike.net.
*---------*---------*---------*---------*---------*---------*Remembering Iraq 11 Years Later: Then and Now!
On Wednesday, March 19, 2014 CODEPINK, Witness Iraq, and the Peace and Justice Committee of the Unitarian Universalist Church in SF will hold a panel discussion to commemorate the 11th year anniversary of the war on Iraq titled “Remembering Iraq 11 Years Later: Then and Now.”
The panel is meant to be an evening of remembering Iraq before, during and after the war and how the current day struggles of Iraqis, inside and outside of the country, continue whether in the form of surviving the violent attacks in the country or surviving life in foreign lands.
A CODEPINK organizer and Iraqi refugee, Farah Muhsin Al Mousawi, will moderate the discussion.
Panelists include:
• Inder Comar of Comar Law, a San Francisco attorney representing Sundus Shaker Saleh, an Iraqi refugee and the lead plaintiff in the class action lawsuit against key members of the George W. Bush Administration (Saleh v. Bush)
• Aaron Hughes, an Iraq War veteran, artist and activists who is actively involved Warrior Writers Project, The Dirty Canteen, The National Veterans Art Museum, Iraq Veterans Against the War, and The Center for Artistic Activism
• Zaid Faransso, an Iraqi refugee and former medical resident at Baghdad’s Medical City
Location:
First Unitarian Universalist Church & Center - MLK Room
1187 Franklin St
San Francisco, CA 94109
RSVP for the event!
http://calendar-codepink.nationbuilder.com/60200/remembering_iraq_11_years_later_then_and_now
In Justice & Accountability,
CODEPINK SF
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
C.
SPECIAL APPEALS AND
ONGOING
CAMPAIGNS
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Next Tuesday marks the end of the first year in office for South Korea's President Park, Geun-hye.
On that day, South Korea's trade union confederation (the KCTU) will be holding a nationwide "people's strike" together with broader social movements including organisations of peasants, the urban poor, small shop keepers, students, and youth.
They'll be marching under the slogan "After one year under Park's Government, we cannot stand it anymore!"
Human and trade union rights have been attacked and democracy in the country has been undermined since Park came to power.
Organising strikes in President Park's Korea is increasingly dangerous. Harsh repression is becoming the norm. Unions are under attack.
The Korean Teachers Union has been de-registered and the Korean Government Employees Union refused registration. Union buildings have been raided. There are eleven trade union leaders behind bars at the moment, some of them still awaiting trial, some already convicted. Four have just been bailed for trial later.
In solidarity with the 15 union leaders in prison or on bail, and with the KCTU, the global trade union movement is calling for the release of all imprisoned trade unionists.
That's why the International Trade Union Confederation has launched this new campaign on LabourStart:
http://www.labourstartcampaigns.net/show_campaign.cgi?c=2183&src=lsmm
It will take you less than one minute to show your support for our brothers and sisters on the front lines in the fight for democracy in Korea.
Once you've signed the campaign, please don't stop there -- spread the word in your union and workplace.
I know that we can count on your support.
Thank you!
Eric Lee
P.S. There's been a major show of support for Canadian workers on strike since September 2013 at Crown Holdings. The Toronto and York Region Labour Council has voted to boycott Carnival, whose CEO is board member of Crown. Have you supported this campaign yet? Please do so and spread the word.
Copyright © 2014 LabourStart, All rights reserved.
http://www.labourstart.org
Our mailing address is:
LabourStart
Unit 168, Lee Valley Technopark
Ashley Road, Tottenham
London, England N17 3LN
United Kingdom
http://lynnestewart.org/
LYNNE STEWART HAS JUST BEEN DENIED MEDICAL BENEFITS. SHE CAN'T RE-APPLY UNTIL JULY! SHE IS IN URGENT NEED OF OUR HELP NOW!
Because of a determined people’s movement, Lynne is finally home with her family. But she has urgent medical needs and costs. Lynne’s Stage 4 breast cancer spread a year ago to both lungs, back, bones and lymph nodes. Now 74, she has lost weight and has trouble breathing; doctors estimate her lifespan at 12 months. Lynne will soon begin treatment requiring her to pay deductibles and co-payments. To boost the odds, she’ll use a special diet, vitamins, and other healing methods – some costly and none covered by insurance.
Lynne’s spirit is indomitable – help her fight to survive!
“I fought lions, I fought tigers, and I’m not going to let cancer get me,” Stewart said.
Lynne has always come to the aid of those who needed her. Now it’s our turn to stand by Lynne.
SEND LYNNE A DONATION TO:
On line at:
http://www.indiegogo.com/projects/lynne-stewart-s-medical-fund
Or by USPS to:
Lynne Stewart Defense Committee
1070 Dean Street?
Brooklyn, New York 11216
Tell Maj. Gen. Buchanan why Chelsea
PVT Chelsea Manning has served nearly four years in prison, yet she’s
showing a remarkable spirit of persistence. She is unjustly imprisoned,
but not defeated. With plans to enroll in a prelaw/political science
university program, and a legal name change underway, she continues
planning for her future and working to fulfill her dreams. She is
determined to make the best of her situation. However, we know she could
contribute more to the world if she was free.
Please write a letter to Convening Authority Major General Buchanan today urging him to reduce Chelsea’s sentence!
We began collecting letters to include in PVT Manning’s clemency packet last fall. We expected that the military would finalize her record of trial last December, and that she could then submit her application to Maj. Gen. Buchanan by the end of 2013. Just like so many times before, however, the military’s process has slowed Chelsea’s ability to defend her rights. Defense attorney David Coombs now estimates that it will be at least another month before the clemency application can be submitted.
Want to make sure decision-makers know why you believe Chelsea deserves to go free? If you haven’t done so yet, please write a short letter to Maj. Gen. Buchanan. Hundreds of people have already submitted letters for us to use, including Pentagon Papers whistleblower Daniel Ellsberg and award-winning author Alice Walker.
As Alice Walker wrote:
Please share this information to friends and community leaders, urging them to add their voice to this important effort before it's too late.
Next Tuesday marks the end of the first year in office for South Korea's President Park, Geun-hye.
On that day, South Korea's trade union confederation (the KCTU) will be holding a nationwide "people's strike" together with broader social movements including organisations of peasants, the urban poor, small shop keepers, students, and youth.
They'll be marching under the slogan "After one year under Park's Government, we cannot stand it anymore!"
Human and trade union rights have been attacked and democracy in the country has been undermined since Park came to power.
Organising strikes in President Park's Korea is increasingly dangerous. Harsh repression is becoming the norm. Unions are under attack.
The Korean Teachers Union has been de-registered and the Korean Government Employees Union refused registration. Union buildings have been raided. There are eleven trade union leaders behind bars at the moment, some of them still awaiting trial, some already convicted. Four have just been bailed for trial later.
In solidarity with the 15 union leaders in prison or on bail, and with the KCTU, the global trade union movement is calling for the release of all imprisoned trade unionists.
That's why the International Trade Union Confederation has launched this new campaign on LabourStart:
http://www.labourstartcampaigns.net/show_campaign.cgi?c=2183&src=lsmm
It will take you less than one minute to show your support for our brothers and sisters on the front lines in the fight for democracy in Korea.
Once you've signed the campaign, please don't stop there -- spread the word in your union and workplace.
I know that we can count on your support.
Thank you!
Eric Lee
P.S. There's been a major show of support for Canadian workers on strike since September 2013 at Crown Holdings. The Toronto and York Region Labour Council has voted to boycott Carnival, whose CEO is board member of Crown. Have you supported this campaign yet? Please do so and spread the word.
Copyright © 2014 LabourStart, All rights reserved.
http://www.labourstart.org
Our mailing address is:
LabourStart
Unit 168, Lee Valley Technopark
Ashley Road, Tottenham
London, England N17 3LN
United Kingdom
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
AN URGENT FUNDRAISER FOR LYNNE STEWART'S MEDICAL NEEDS CONTINUEShttp://lynnestewart.org/
LYNNE STEWART HAS JUST BEEN DENIED MEDICAL BENEFITS. SHE CAN'T RE-APPLY UNTIL JULY! SHE IS IN URGENT NEED OF OUR HELP NOW!
Because of a determined people’s movement, Lynne is finally home with her family. But she has urgent medical needs and costs. Lynne’s Stage 4 breast cancer spread a year ago to both lungs, back, bones and lymph nodes. Now 74, she has lost weight and has trouble breathing; doctors estimate her lifespan at 12 months. Lynne will soon begin treatment requiring her to pay deductibles and co-payments. To boost the odds, she’ll use a special diet, vitamins, and other healing methods – some costly and none covered by insurance.
Lynne’s spirit is indomitable – help her fight to survive!
“I fought lions, I fought tigers, and I’m not going to let cancer get me,” Stewart said.
Lynne has always come to the aid of those who needed her. Now it’s our turn to stand by Lynne.
SEND LYNNE A DONATION TO:
On line at:
http://www.indiegogo.com/projects/lynne-stewart-s-medical-fund
Or by USPS to:
Lynne Stewart Defense Committee
1070 Dean Street?
Brooklyn, New York 11216
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Tell Maj. Gen. Buchanan why Chelsea
deserves to be free!
Please write a letter to Convening Authority Major General Buchanan today urging him to reduce Chelsea’s sentence!
We began collecting letters to include in PVT Manning’s clemency packet last fall. We expected that the military would finalize her record of trial last December, and that she could then submit her application to Maj. Gen. Buchanan by the end of 2013. Just like so many times before, however, the military’s process has slowed Chelsea’s ability to defend her rights. Defense attorney David Coombs now estimates that it will be at least another month before the clemency application can be submitted.
Want to make sure decision-makers know why you believe Chelsea deserves to go free? If you haven’t done so yet, please write a short letter to Maj. Gen. Buchanan. Hundreds of people have already submitted letters for us to use, including Pentagon Papers whistleblower Daniel Ellsberg and award-winning author Alice Walker.
As Alice Walker wrote:
Private Manning was the one soldier willing to speak out against what he thought was wrong. When others silently followed orders, Manning could not. Pvt. Manning is a humanist, meaning he sees humanity before nationality, and values human life above all else. When he released documents to WikiLeaks in 2010, he wanted the American people, and the world, to judge for themselves if the U.S. military was properly valuing human life in Iraq and Afghanistan. As taxpayers who fund that military, we deserve that opportunity.Learn now how you can write a letter to be included in Chelsea Manning’s official application for clemency!
Please share this information to friends and community leaders, urging them to add their voice to this important effort before it's too late.
http://www.privatemanning.org/pardonpetition
Help
us continue to cover 100%
of Pvt. Manning's legal fees! Donate today.
of Pvt. Manning's legal fees! Donate today.
https://co.clickandpledge.com/sp/d1/default.aspx?wid=38591
COURAGE
TO RESIST
http://couragetoresist.org
484 Lake Park Ave #41, Oakland CA 94610
510-488-3559
http://couragetoresist.org
484 Lake Park Ave #41, Oakland CA 94610
510-488-3559
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Only an Innocent Man Would Voluntarily Return
to Prison to Fight Against his Life Sentence
and For Exoneration —
That Courageous Man is Lorenzo Johnson.
The PA Attorney General’s Office Agrees to Investigate New Facts and Witnesses —
Send Your Message Now to PA AG
Kathleen Kane: Dismiss the Charges!
Free Lorenzo Johnson!
On January 29, 2014 Lorenzo Johnson’s attorney, Michael Wiseman, met with representatives of PA Attorney General Kathleen Kane to discuss the new evidence of Lorenzo Johnson’s innocence contained in legal filings now pending in the Pennsylvania courts. This includes affidavits confirming Johnson’s presence in New York City at the time of the Harrisburg murder and the identity of the actual killers, as well as police and prosecutorial misconduct.
Attorney Wiseman said Kane’s office promised to investigate these new facts in order to assess whether they merit the relief that Lorenzo Johnson seeks in his PCRA petition.
Speaking to AP reporter Mary Claire Dale on February 11, 2014 Wiseman said, “We believe the witnesses we presented to them are credible, and give a coherent version of the events. I take them at their word, that they’re going to do a straightforward, honest review.” Kane spokesman Joe Peters confirmed the meeting to AP “but said the office won’t comment on the new evidence until the court filing,” (referring to the March 31, 2014 date for the AG’s response to Johnson’s October 2013 court filing).
It is the Office of the PA Attorney General that is responsible for the false prosecution of Lorenzo Johnson from trial through appeals. And just a few months ago, the Attorney General’s office opposed a federal petition based on this new evidence saying there was no prima facie claim for relief. This resulted in the denial of Lorenzo Johnson’s Motion to File a Second Writ of Habeas Corpus in the federal court.
On December 18, 2013 a press conference called by the Campaign to Free Lorenzo Johnson protested these actions of the PA Attorney General and delivered petitions demanding dismissal of the charges and immediate freedom for Lorenzo. Tazza, Lorenzo’s wife, declared, “1,000 signatures means we are not in this alone…I won't stop until he’s home. There is nothing and no one that can stop me from fighting for what’s right.”
This is Lorenzo Johnson’s second fight for his innocence and freedom. In January 2012, after 16 years of court battles to prove his innocence, a federal appeals court held his sentence was based on insufficient evidence – a judicial acquittal. Lorenzo was freed from prison. But after a petition filed by the PA Attorney General the U.S. Supreme Court reinstated Lorenzo Johnson’s conviction and he was re-incarcerated to continue serving a life sentence without parole for a murder he did not commit.
This innocent man drove himself back to prison in June 2012—after less than five months of freedom—leaving his new wife and family, construction job and advocacy on behalf of others wrongfully convicted. The reason Lorenzo Johnson voluntarily returned to prison? Because he is innocent and fighting for full vindication.
In the words of Lorenzo Johnson, “A second is too long to be in prison when you are Innocent, so eighteen years … is Intolerable.”
Add your voices and demand again: Dismiss the charges against Lorenzo Johnson. Free Lorenzo NOW!
SIGN LORENZO JOHNSON'S FREEDOM PETITION
CONTRIBUTE TO HELP TAZZA AND THE OTHER FAMILY MEMBERS VISIT LORENZO AND STAY IN CONTACT!
Write: Lorenzo Johnson
DF 1036
SCI Mahanoy
301 Morea Rd.
Frackville, PA 17932
Email: Lorenzo Johnson through JPAY.com code:
Lorenzo Johnson DF 1036 PA DOC
www.FreeLorenzoJohnson.org
Only an Innocent Man Would Voluntarily Return
to Prison to Fight Against his Life Sentence
and For Exoneration —
That Courageous Man is Lorenzo Johnson.
The PA Attorney General’s Office Agrees to Investigate New Facts and Witnesses —
Send Your Message Now to PA AG
Kathleen Kane: Dismiss the Charges!
Free Lorenzo Johnson!
On January 29, 2014 Lorenzo Johnson’s attorney, Michael Wiseman, met with representatives of PA Attorney General Kathleen Kane to discuss the new evidence of Lorenzo Johnson’s innocence contained in legal filings now pending in the Pennsylvania courts. This includes affidavits confirming Johnson’s presence in New York City at the time of the Harrisburg murder and the identity of the actual killers, as well as police and prosecutorial misconduct.
Attorney Wiseman said Kane’s office promised to investigate these new facts in order to assess whether they merit the relief that Lorenzo Johnson seeks in his PCRA petition.
Speaking to AP reporter Mary Claire Dale on February 11, 2014 Wiseman said, “We believe the witnesses we presented to them are credible, and give a coherent version of the events. I take them at their word, that they’re going to do a straightforward, honest review.” Kane spokesman Joe Peters confirmed the meeting to AP “but said the office won’t comment on the new evidence until the court filing,” (referring to the March 31, 2014 date for the AG’s response to Johnson’s October 2013 court filing).
It is the Office of the PA Attorney General that is responsible for the false prosecution of Lorenzo Johnson from trial through appeals. And just a few months ago, the Attorney General’s office opposed a federal petition based on this new evidence saying there was no prima facie claim for relief. This resulted in the denial of Lorenzo Johnson’s Motion to File a Second Writ of Habeas Corpus in the federal court.
On December 18, 2013 a press conference called by the Campaign to Free Lorenzo Johnson protested these actions of the PA Attorney General and delivered petitions demanding dismissal of the charges and immediate freedom for Lorenzo. Tazza, Lorenzo’s wife, declared, “1,000 signatures means we are not in this alone…I won't stop until he’s home. There is nothing and no one that can stop me from fighting for what’s right.”
This is Lorenzo Johnson’s second fight for his innocence and freedom. In January 2012, after 16 years of court battles to prove his innocence, a federal appeals court held his sentence was based on insufficient evidence – a judicial acquittal. Lorenzo was freed from prison. But after a petition filed by the PA Attorney General the U.S. Supreme Court reinstated Lorenzo Johnson’s conviction and he was re-incarcerated to continue serving a life sentence without parole for a murder he did not commit.
This innocent man drove himself back to prison in June 2012—after less than five months of freedom—leaving his new wife and family, construction job and advocacy on behalf of others wrongfully convicted. The reason Lorenzo Johnson voluntarily returned to prison? Because he is innocent and fighting for full vindication.
In the words of Lorenzo Johnson, “A second is too long to be in prison when you are Innocent, so eighteen years … is Intolerable.”
Add your voices and demand again: Dismiss the charges against Lorenzo Johnson. Free Lorenzo NOW!
SIGN LORENZO JOHNSON'S FREEDOM PETITION
CONTRIBUTE TO HELP TAZZA AND THE OTHER FAMILY MEMBERS VISIT LORENZO AND STAY IN CONTACT!
Write: Lorenzo Johnson
DF 1036
SCI Mahanoy
301 Morea Rd.
Frackville, PA 17932
Email: Lorenzo Johnson through JPAY.com code:
Lorenzo Johnson DF 1036 PA DOC
www.FreeLorenzoJohnson.org
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
End Drone Killing, Drone Surveillance and Global
Militarization
United National Antiwar Coalition Call for Spring Days of
Action 2014
Today we issue an international call for Spring Days of Action—2014, a coordinated campaign in April and May to end drone killings, drone surveillance and global militarization.
The campaign will focus on drone bases, drone research facilities and test sites and drone manufacturers.
The campaign will provide information on:
1. The suffering of tens-of-thousands of people in Afghanistan, Pakistan, Yemen, Somalia and Gaza who are under drone attack, documenting the killing, the wounding and the devastating impact of constant drone surveillance on community life.
2. How attack and surveillance drones have become a key element in a massive wave of surveillance, clandestine military attacks and militarization generated by the United States to protect a global system of manufacture and oil and mineral exploitation that is creating unemployment and poverty, accelerating the waste of nonrenewable resources and contributing to environmental destruction and global warming.
In addition to cases in the Middle East, Africa and Central Asia, we will examine President Obama’s “pivot” into the Asia-Pacific, where the United States has already sold and deployed drones in the vanguard of a shift of 60 percent of its military forces to try to control China and to enforce the planned Trans-Pacific Partnership. We will show, among other things, how this surge of “pivot” forces, greatly enabled by drones, and supported by the U.S. military-industrial complex, will hit every American community with even deeper cuts in the already fragile social programs on which people rely for survival. In short, we will connect drones and militarization with “austerity” in America.
3. How drone attacks have effectively destroyed international and domestic legal protection of the rights to life, privacy, freedom of assembly and free speech and have opened the way for new levels of surveillance and repression around the world, and how, in the United States, increasing drone surveillance, added to surveillance by the National Security Agency and police, provides a new weapon to repress black, Hispanic, immigrant and low-income communities and to intimidate Americans who are increasingly unsettled by lack of jobs, economic inequality, corporate control of politics and the prospect of endless war.
We will discuss how the United States government and corporations conspire secretly to monitor U.S. citizens and particularly how the Administration is accelerating drone surveillance operations and surveillance inside the United States with the same disregard for transparency and law that it applies to other countries, all with the cooperation of the Congress.
The campaign will encourage activists around the world to win passage of local laws that prohibit weaponized drones and drone surveillance from being used in their communities as well as seeking national laws to bar the use of weaponized drones and drone surveillance.
The campaign will draw attention to the call for a ban on weaponized drones by RootsAction.org that has generated a petition with over 80,000 signers:
http://act.rootsaction.org/p/dia/action/public/?action_KEY=6180
And to efforts by the Granny Peace Brigade (New York City), KnowDrones.org and others to achieve an international ban on both weaponized drones and drone surveillance.
The campaign will also urge participation in the World Beyond War movement.
The following individuals and organizations endorse
this Call:
Lyn Adamson, Co-chair, Canadian Voice of Women for
Peace; Dennis Apel, Guadalupe Catholic Worker, California; Judy Bello, Upstate
NY Coalition to Ground the Drones & End the Wars; Medea Benjamin, Code Pink;
Leah Bolger, Former National President, Veterans for Peace; Canadian Voice of
Women for Peace; Sung-Hee Choi, Gangjeong Village International Team, Jeju,
Korea; Chelsea C. Faria, Graduate student, Yale Divinity School; Promoting
Enduring Peace; Sandy Fessler, Rochester (NY) Against War; Joy First; Bruce K.
Gagnon, Global Network Against Weapons & Nuclear Power in Space; Holly
Gwinn Graham, Singer/songwriter, Olympia, WA; Regina Hagen, Darmstaedter
Friedensforum, Germany; Kathy Kelly, Voices for Creative Nonviolence; Malachy
Kilbride; Marilyn Levin and Joe Lombardo, Co-Coordinators, United National
Antiwar Coalition; Tamara Lorincz, Halifax Peace Coalition, Canada; Nick
Mottern, KnowDrones.org; Agneta
Norberg, Swedish Peace Council; Pepperwolf, Director, Women Against Military
Madness; Lindis Percy, Coordinator, Campaign for the Accountability of American;
Bases CAAB UK; Mathias Quackenbush, San Francisco, CA; Lisa Savage, Code
Pink, State of Maine; Janice Sevre-Duszynska; Wolfgang Schlupp-Hauck, Friedenswerkstatt
Mutlangen, Germany; Cindy Sheehan; Lucia Wilkes Smith, Convener, Women Against
Military Madness (WAMM), Ground; Military
Drones Committee; David Soumis, Veterans for Peace; No Drones Wisconsin; Debra
Sweet, World Can’t Wait; David Swanson, WarisACrime.org;
Brian Terrell, Voices for Creative Nonviolence; United National Antiwar
Coalition; Veterans for Peace; Dave Webb, Chair, Campaign for Nuclear
Disarmament (UK); Curt Wechsler, Fire John Paki Wieland, Northampton (MA)
Committee to Stop War(s); Loring Wirbel, Citizens for Peace in Space (Colorado
Springs, CO); Women Against Military Madness; Ann Wright, Retired U.S. Army
colonel and former diplomat; Leila Zand, Fellowship of Reconciliation.
United National Antiwar Coalition
UNACpeace@gmail.com
UNAC
P.O. Box 123
Delmar, NY 12054
518-227-6947
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Sireen Khudairy Appeal Update.
Sireen
Khudairy was arrested again at 4am on Tuesday 7th January 2014. According to
reports she has been taken to Huwwara military point. When the Israeli army
took her from her home they didn't show any papers to her or the person she was
with.
This
follows eight months of harassment of this 24-year-old Palestinian woman who is
a teacher, activist and supporter of the non-violent action against the Israeli
occupation. She was previously imprisoned from May to July 2013, and has been
subjected to frequent harassment ever since. See further details at:
http://freesireen.wordpress.com
Please
help by contacting your Embassies urgently to demand her release and spread her
appeal widely. Follow updates on:
https://www.facebook.com/FreeSireenKhudiri?ref=hl
Please
contact us to let us know any action you take. We will pass this information on
to her family. Thanks for your solidarity and support.
Steven Katsineris, January 2014
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
U.S.
Court of Appeals Rules Against Lorenzo Johnson’s
New Legal Challenge to His Frame-up Conviction!
Demand the PA Attorney General Dismiss the Charges!
Free Lorenzo Johnson, Now!
New Legal Challenge to His Frame-up Conviction!
Demand the PA Attorney General Dismiss the Charges!
Free Lorenzo Johnson, Now!
The
U.S. Court of Appeals for the Third Circuit denied Lorenzo Johnson’s motion to
file a Second Habeas Corpus Petition. The order contained the outrageous
declaration that Johnson hadn’t made a “prima facie case” that he had new
evidence of his innocence. This not only puts a legal obstacle in Johnson’s
path as his fight for freedom makes its way (again) through the state and
federal courts—but it undermines the newly filed Pennsylvania state appeal that
is pending in the Court of Common Pleas.
Stripped
of “legalese,” the court’s October 15, 2013 order says Johnson’s new
evidence was not brought into court soon enough—although it was the prosecution
and police who withheld evidence and coerced witnesses into lying or not coming
forward with the truth! This, despite over fifteen years and rounds of legal
battles to uncover the evidence of government misconduct. This is a set-back
for Lorenzo Johnson’s renewed fight for his freedom, but Johnson is even more
determined as his PA state court appeal continues.
Increased
public support and protest is needed. The fight for Lorenzo Johnson’s freedom
is not only a fight for this courageous man and family. The fight for Lorenzo
Johnson is also a fight for all the innocent others who have been framed and
are sitting in the slow death of prison. The PA Attorney General is directly
pursuing the charges against Lorenzo, despite the evidence of his innocence and
the corruption of the police. Free Lorenzo Johnson, Now!
—Rachel
Wolkenstein, Esq.
October 25, 2013
For
more on the federal court and PA state court legal filings.
Hear
Mumia’s latest commentary, “Cat Cries”
Go
to: www.FreeLorenzoJohnson.org for more information, to sign the petition, and
how to help.
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
PUSH
CHELSEA'S JAILERS TO RESPECT HER IDENTITY
Call
and write Ft Leavenworth today and tell them to honor Manning's wishes around
her name and gender:
Call:
(913) 758-3600
Write
to:
Col.
Sioban Ledwith, Commander
U.S.
Detention Barracks
1301
N Warehouse Rd
Ft.
Leavenworth KS 66027
Private
Manning has been an icon both for the government transparency movement and
LGBTQ activists because of her fearlessness and acts of conscience. Now, as she
begins serving her sentence, Chelsea has asked for help with legal appeals,
family visits, education, and support for undergoing gender transition. The
latter is a decision she’s made following years of experiencing gender
dysphoria and examining her options. At a difficult time in her life, she
joined the military out of hope–the hope that she could use her service to save
lives, and also the hope that it would help to suppress her feelings of gender
dysphoria. But after serving time in Iraq, Private Manning realized what
mattered to her most was the truth, personal as well as political, even when it
proved challenging.
Now
she wants the Fort Leavenworth military prison to allow her access to hormone
replacement therapy which she has offered to pay for herself, as she pursues
the process to have her name legally changed to ‘Chelsea Elizabeth Manning.’
To
encourage the prison to honor her transgender identity, we’re calling on
progressive supporters and allies to contact Fort Leavenworth officials
demanding they acknowledge her requested name change immediately. Currently,
prison officials are not required to respect Chelsea’s identity, and can even
refuse to deliver mail addressed to the name ‘Chelsea Manning.’ However, it’s
within prison administrators’ power to begin using the name ‘Chelsea Manning’
now, in advance of the legal name change which will most likely be approved
sometime next year. It’s also up to these officials to approve Private
Manning’s request for hormone therapy.
Call:
(913) 758-3600
Write
to:
Col.
Sioban Ledwith, Commander
U.S.
Detention Barracks
1301
N Warehouse Rd
Ft.
Leavenworth KS 66027
Tell
them: “Transgender rights are human rights! Respect Private Manning’s identity
by acknowledging the name ‘Chelsea Manning’ whenever possible, including in
mail addressed to her, and by allowing her access to appropriate medical
treatment for gender dysphoria, including hormone replacement therapy (HRT).”
While
openly transgender individuals are allowed to serve in many other militaries
around the world, the US military continues to deny their existence. Now, by
speaking up for Chelsea’s right to treatment, you can support one brave
whistleblower in her personal struggle, and help set an important benchmark for
the rights of transgender individuals everywhere. (Remember that letters
written with focus and a respectful tone are more likely to be effective.) Feel
free to copy this sample letter.
Earlier
this year, the Private Manning Support Network won the title of most
“absolutely fabulous overall contingent” at the San Francisco Pride Parade, the
largest celebration of its kind for LGBTQ (Lesbian, Gay Bisexual, Transgender
and Questioning) people nationwide. Over one thousand people marched for
Private Chelsea (formerly Bradley) Manning in that parade, to show LGBTQ
community pride for the Iraq War’s most well-known whistleblower.
Help
us continue to cover 100%
of Pvt. Manning's legal fees! Donate today.
of Pvt. Manning's legal fees! Donate today.
https://co.clickandpledge.com/sp/d1/default.aspx?wid=38591
COURAGE
TO RESIST
http://couragetoresist.org
484 Lake Park Ave #41, Oakland CA 94610
510-488-3559
http://couragetoresist.org
484 Lake Park Ave #41, Oakland CA 94610
510-488-3559
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
SAVE
CCSF!
Posted
on August 25, 2013
Cartoon
by Anthonty Mata for CCSF Guardsman
DOE
CAMPAIGN
We
are working to ensure that the ACCJC’s authority is not renewed by the
Department of Education this December when they are up for their 5-year
renewal. Our campaign made it possible for over 50 Third Party Comments to be
sent to the DOE re: the ACCJC. Our next step in this campaign is to send a
delegation from CCSF to Washington, D.C. to give oral comments at the hearing
on December 12th. We expect to have an array of forces aligned on the other
side who have much more money and resources than we do.
So
please support this effort to get ACCJC authority revoked!
LEGAL
CAMPAIGN
Save
CCSF members have been meeting with Attorney Dan Siegel since last May to
explore legal avenues to fight the ACCJC. After much consideration, and
consultation with AFT 2121’s attorney as well as the SF City Attorney’s office,
Dan has come up with a legal strategy that is complimentary to what is already
being pursued. In fact, AFT 2121’s attorney is encouraging us to go forward.
The
total costs of pursuing this (depositions, etc.) will be substantially more
than $15,000. However, Dan is willing to do it for a fixed fee of $15,000. He
will not expect a retainer, i.e. payment in advance, but we should start
payments ASAP. If we win the ACCJC will have to pay our costs.
PLEASE
HELP BOTH OF THESE IMPORTANT EFFORTS!
Checks
can be made out to Save CCSF Coalition with “legal” in the memo line and sent
to:
Save
CCSF Coalition
2132
Prince St.
Berkeley, CA 94705
Or
you may donate online: http://www.gofundme.com/4841ns
http://www.saveccsf.org/
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
16 Years in Solitary Confinement Is Like a "Living Tomb"
American
Civil Liberties Union petition to end long-term solitary confinement:
California
Corrections Secretary Jeffrey Beard: We stand with the prisoners on hunger
strike. We urge you to comply with the US Commission on Safety and Abuse in
America’s Prisons 2006 recommendations regarding an end to long-term solitary
confinement.
In
California, hundreds of prisoners have been held in solitary for more than a
decade – some for infractions as trivial as reading Machiavelli's "The
Prince."
Gabriel
Reyes describes the pain of being isolated for at least 22 hours a day for the
last 16 years:
“Unless
you have lived it, you cannot imagine what it feels like to be by yourself,
between four cold walls, with little concept of time…. It is a living tomb …’ I
have not been allowed physical contact with any of my loved ones since 1995…I
feel helpless and hopeless. In short, I am being psychologically tortured.”
That’s
why over 30,000 prisoners in California began a hunger strike – the biggest the
state has ever seen. They’re refusing food to protest prisoners being held for
decades in solitary and to push for other changes to improve their basic
conditions.
California
Corrections Secretary Jeffrey Beard has tried to dismiss the strikers and
refuses to negotiate, but the media pressure is building through the strike. If
tens of thousands of us take action, we can help keep this issue in the
spotlight so that Secretary Beard can’t ignore the inhumane treatment of
prisoners.
Sign
the petition urging Corrections Secretary Beard to end the use of long-term
solitary confinement.
Solitary
is such an extreme form of punishment that a United Nations torture rapporteur
called for an international ban on the practice except in rare occasions.
Here’s why:
The
majority of the 80,000 people held in solitary in this country are severely
mentally ill or because of a minor infraction (it’s a myth that it’s only for
violent prisoners)
Even
for people with stable mental health, solitary causes severe psychological
reactions, often leading people to attempt suicide
It
jeopardizes public safety because prisoners held in solitary have a harder time
reintegrating into society.
And
to add insult to injury, the hunger strikers are now facing retaliation – their
lawyers are being restricted from visiting and the strikers are being punished.
But the media continues to write about the hunger strike and we can help keep
the pressure on Secretary Beard by signing this petition.
Sign
the petition urging Corrections Secretary Beard to end the use of long-term
solitary confinement.
Our
criminal justice system should keep communities safe and treat people fairly.
The use of solitary confinement undermines both of these goals – but little by
little, we can help put a stop to such cruelty.
Thank
you,
Anthony
for the ACLU Action team
P.S.
The hunger strikers have developed five core demands to address their basic
conditions, the main one being an end to long-term solitary confinement. They
are:
-End
group punishment – prisoners say that officials often punish groups to address
individual rule violations
-Abolish
the debriefing policy, which is often demanded in return for better food or
release from solitary
-End
long-term solitary confinement
-Provide
adequate and nutritious food
-Expand
or provide constructive programming and privileges for indefinite SHU inmates
Sources
“Solitary
- and anger - in California's prisons.” Los Angeles Times July 13, 2013
“Pelican
Bay Prison Hunger-Strikers' Stories: Gabriel Reyes.” TruthOut July 9, 2013
“Solitary
confinement should be banned in most cases, UN expert says.” UN News October
18, 2011
"Stop
Solitary - Two Pager" ACLU.org
*---------*---------*---------*---------*---------*---------*
What
you Didn't know about NYPD's Stop and Frisk program !
http://www.youtube.com/watch?feature=player_embedded&v=rfJHx0Gj6ys#at=990
*---------*---------*---------*---------*---------*---------*
Egypt:
The Next President -- a little Egyptian boy speaks his remarkable mind!
http://www.youtube.com/watch?v=QeDm2PrNV1I
*---------*---------*---------*---------*---------*---------*
Wealth
Inequality in America
[This
is a must see to believe video...bw]
https://www.youtube.com/watch?feature=player_embedded&v=QPKKQnijnsM
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Read
the transcription of hero Bradley Manning's 35-page statement explaining why he
leaked "state secrets" to WikiLeaks.
March
1, 2013
Alternet
The
statement was read by Pfc. Bradley Manning at a providence inquiry for his
formal plea of guilty to one specification as charged and nine specifications
for lesser included offenses. He pled not guilty to 12 other specifications.
This rush transcript was taken by journalist Alexa O'Brien at Thursday's
pretrial hearing and first appeared on Salon.com.
http://www.alternet.org/news-amp-politics/bradley-mannings-surprising-statement-court-details-why-he-made-his-historic?akid=10129.229473.UZvQfK&rd=1&src=newsletter802922&t=7
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
You
Have the Right to Remain Silent: NLG Guide to Law Enforcement Encounters
Posted
1 day ago on July 27, 2012, 10:28 p.m. EST by OccupyWallSt
Occupy
Wall Street is a nonviolent movement for social and economic justice, but in
recent days disturbing reports have emerged of Occupy-affiliated activists
being targeted by US law enforcement, including agents from the FBI and
Department of Homeland Security. To help ensure Occupiers and allied activists
know their rights when encountering law enforcement, we are publishing in full
the National Lawyers Guild's booklet: You Have the Right to Remain Silent. The
NLG provides invaluable support to the Occupy movement and other activists –
please click here to support the NLG.
We
strongly encourage all Occupiers to read and share the information provided
below. We also recommend you enter the NLG's national hotline number
(888-654-3265) into your cellphone (if you have one) and keep a copy handy.
This information is not a substitute for legal advice. You should contact the
NLG or a criminal defense attorney immediately if you have been visited by the
FBI or other law enforcement officials. You should also alert your relatives,
friends, co-workers and others so that they will be prepared if they are
contacted as well.
You
Have the Right to Remain Silent: A Know Your Rights Guide for Law Enforcement
Encounters
What
Rights Do I Have?
Whether
or not you're a citizen, you have rights under the United States Constitution.
The Fifth Amendment gives every person the right to remain silent: not to
answer questions asked by a police officer or government agent. The Fourth
Amendment restricts the government's power to enter and search your home or
workplace, although there are many exceptions and new laws have expanded the
government's power to conduct surveillance. The First Amendment protects your
right to speak freely and to advocate for social change. However, if you are a
non-citizen, the Department of Homeland Security may target you based on your
political activities.
Standing
Up For Free Speech
The
government's crusade against politically-active individuals is intended to
disrupt and suppress the exercise of time-honored free speech activities, such
as boycotts, protests, grassroots organizing and solidarity work. Remember that
you have the right to stand up to the intimidation tactics of FBI agents and
other law enforcement officials who, with political motives, are targeting
organizing and free speech activities. Informed resistance to these tactics and
steadfast defense of your and others' rights can bring positive results. Each
person who takes a courageous stand makes future resistance to government oppression
easier for all. The National Lawyers Guild has a long tradition of standing up
to government repression. The organization itself was labeled a
"subversive" group during the McCarthy Era and was subject to FBI
surveillance and infiltration for many years. Guild attorneys have defended
FBI-targeted members of the Black Panther Party, the American Indian Movement,
and the Puerto Rican independence movement. The NLG exposed FBI surveillance,
infiltration and disruption tactics that were detailed during the 1975-76
COINTELPRO hearings. In 1989 the NLG prevailed in a lawsuit on behalf of
several activist organizations, including the Guild, that forced the FBI to
expose the extent to which it had been spying on activist movements. Under the
settlement, the FBI turned over roughly 400,000 pages of its files on the
Guild, which are now available at the Tamiment Library at New York University.
What
if FBI Agents or Police Contact Me?
What
if an agent or police officer comes to the door?
Do
not invite the agents or police into your home. Do not answer any questions.
Tell the agent that you do not wish to talk with him or her. You can state that
your lawyer will contact them on your behalf. You can do this by stepping
outside and pulling the door behind you so that the interior of your home or
office is not visible, getting their contact information or business cards and
then returning inside. They should cease questioning after this. If the agent
or officer gives a reason for contacting you, take notes and give the
information to your attorney. Anything you say, no matter how seemingly
harmless or insignificant, may be used against you or others in the future.
Lying to or misleading a federal agent is a crime. The more you speak, the more
opportunity for federal law enforcement to find something you said (even if not
intentionally) false and assert that you lied to a federal officer.
Do
I have to answer questions?
You
have the constitutional right to remain silent. It is not a crime to refuse to
answer questions. You do not have to talk to anyone, even if you have been
arrested or are in jail. You should affirmatively and unambiguously state that
you wish to remain silent and that you wish to consult an attorney. Once you
make the request to speak to a lawyer, do not say anything else. The Supreme
Court recently ruled that answering law enforcement questions may be taken as a
waiver of your right to remain silent, so it is important that you assert your
rights and maintain them. Only a judge can order you to answer questions. There
is one exception: some states have "stop and identify" statutes which
require you to provide identity information or your name if you have been
detained on reasonable suspicion that you may have committed a crime. A lawyer
in your state can advise you of the status of these requirements where you
reside.
Do
I have to give my name?
As
above, in some states you can be detained or arrested for merely refusing to
give your name. And in any state, police do not always follow the law, and
refusing to give your name may make them suspicious or more hostile and lead to
your arrest, even without just cause, so use your judgment. Giving a false name
could in some circumstances be a crime.
Do
I need a lawyer?
You
have the right to talk to a lawyer before you decide whether to answer
questions from law enforcement. It is a good idea to talk to a lawyer if you
are considering answering any questions. You have the right to have a lawyer
present during any interview. The lawyer's job is to protect your rights. Once
you tell the agent that you want to talk to a lawyer, he or she should stop
trying to question you and should make any further contact through your lawyer.
If you do not have a lawyer, you can still tell the officer you want to speak to
one before answering questions. Remember to get the name, agency and telephone
number of any investigator who visits you, and give that information to your
lawyer. The government does not have to provide you with a free lawyer unless
you are charged with a crime, but the NLG or another organization may be able
to help you find a lawyer for free or at a reduced rate.
If
I refuse to answer questions or say I want a lawyer, won't it seem like I have
something to hide?
Anything
you say to law enforcement can be used against you and others. You can never
tell how a seemingly harmless bit of information might be used or manipulated
to hurt you or someone else. That is why the right not to talk is a fundamental
right under the Constitution. Keep in mind that although law enforcement agents
are allowed to lie to you, lying to a government agent is a crime. Remaining
silent is not. The safest things to say are "I am going to remain
silent," "I want to speak to my lawyer," and "I do not consent
to a search." It is a common practice for law enforcement agents to try to
get you to waive your rights by telling you that if you have nothing to hide
you would talk or that talking would "just clear things up." The fact
is, if they are questioning you, they are looking to incriminate you or someone
you may know, or they are engaged in political intelligence gathering. You
should feel comfortable standing firm in protection and defense of your rights
and refusing to answer questions.
Can
agents search my home or office?
You
do not have to let police or agents into your home or office unless they have
and produce a valid search warrant. A search warrant is a written court order
that allows the police to conduct a specified search. Interfering with a
warrantless search probably will not stop it and you might get arrested. But
you should say "I do not consent to a search," and call a criminal
defense lawyer or the NLG. You should be aware that a roommate or guest can
legally consent to a search of your house if the police believe that person has
the authority to give consent, and your employer can consent to a search of
your workspace without your permission.
What
if agents have a search warrant?
If
you are present when agents come for the search, you can ask to see the
warrant. The warrant must specify in detail the places to be searched and the
people or things to be taken away. Tell the agents you do not consent to the
search so that they cannot go beyond what the warrant authorizes. Ask if you
are allowed to watch the search; if you are allowed to, you should. Take notes,
including names, badge numbers, what agency each officer is from, where they
searched and what they took. If others are present, have them act as witnesses
to watch carefully what is happening. If the agents ask you to give them
documents, your computer, or anything else, look to see if the item is listed
in the warrant. If it is not, do not consent to them taking it without talking
to a lawyer. You do not have to answer questions. Talk to a lawyer first.
(Note: If agents present an arrest warrant, they may only perform a cursory
visual search of the premises to see if the person named in the arrest warrant
is present.)
Do
I have to answer questions if I have been arrested?
No.
If you are arrested, you do not have to answer any questions. You should
affirmatively and unambiguously state that you wish to assert your right to
remain silent. Ask for a lawyer right away. Do not say anything else. Repeat to
every officer who tries to talk to or question you that you wish to remain
silent and that you wish to speak to a lawyer. You should always talk to a
lawyer before you decide to answer any questions.
What
if I speak to government agents anyway?
Even
if you have already answered some questions, you can refuse to answer other
questions until you have a lawyer. If you find yourself talking, stop. Assert
that you wish to remain silent and that you wish to speak to a lawyer.
What
if the police stop me on the street?
Ask
if you are free to go. If the answer is yes, consider just walking away. If the
police say you are not under arrest, but are not free to go, then you are being
detained. The police can pat down the outside of your clothing if they have
reason to suspect you might be armed and dangerous. If they search any more
than this, say clearly, "I do not consent to a search." They may keep
searching anyway. If this happens, do not resist because you can be charged
with assault or resisting arrest. You do not have to answer any questions. You
do not have to open bags or any closed container. Tell the officers you do not
consent to a search of your bags or other property.
What
if police or agents stop me in my car?
Keep
your hands where the police can see them. If you are driving a vehicle, you
must show your license, registration and, in some states, proof of insurance.
You do not have to consent to a search. But the police may have legal grounds
to search your car anyway. Clearly state that you do not consent. Officers may
separate passengers and drivers from each other to question them, but no one
has to answer any questions.
What
if I am treated badly by the police or the FBI?
Write
down the officer's badge number, name or other identifying information. You
have a right to ask the officer for this information. Try to find witnesses and
their names and phone numbers. If you are injured, seek medical attention and
take pictures of the injuries as soon as you can. Call a lawyer as soon as
possible.
What
if the police or FBI threaten me with a grand jury subpoena if I don't answer
their questions?
A
grand jury subpoena is a written order for you to go to court and testify about
information you may have. It is common for the FBI to threaten you with a
subpoena to get you to talk to them. If they are going to subpoena you, they
will do so anyway. You should not volunteer to speak just because you are
threatened with a subpoena. You should consult a lawyer.
What
if I receive a grand jury subpoena?
Grand
jury proceedings are not the same as testifying at an open court trial. You are
not allowed to have a lawyer present (although one may wait in the hallway and
you may ask to consult with him or her after each question) and you may be asked
to answer questions about your activities and associations. Because of the
witness's limited rights in this situation, the government has frequently used
grand jury subpoenas to gather information about activists and political
organizations. It is common for the FBI to threaten activists with a subpoena
in order to elicit information about their political views and activities and
those of their associates. There are legal grounds for stopping
("quashing") subpoenas, and receiving one does not necessarily mean
that you are suspected of a crime. If you do receive a subpoena, call the NLG
National Hotline at 888-NLG-ECOL (888-654-3265) or call a criminal defense
attorney immediately.
The
government regularly uses grand jury subpoena power to investigate and seek
evidence related to politically-active individuals and social movements. This
practice is aimed at prosecuting activists and, through intimidation and
disruption, discouraging continued activism.
Federal
grand jury subpoenas are served in person. If you receive one, it is critically
important that you retain the services of an attorney, preferably one who
understands your goals and, if applicable, understands the nature of your
political work, and has experience with these issues. Most lawyers are trained
to provide the best legal defense for their client, often at the expense of
others. Beware lawyers who summarily advise you to cooperate with grand juries,
testify against friends, or cut off contact with your friends and political
activists. Cooperation usually leads to others being subpoenaed and
investigated. You also run the risk of being charged with perjury, a felony,
should you omit any pertinent information or should there be inconsistencies in
your testimony.
Frequently
prosecutors will offer "use immunity," meaning that the prosecutor is
prohibited from using your testimony or any leads from it to bring charges
against you. If a subsequent prosecution is brought, the prosecutor bears the
burden of proving that all of its evidence was obtained independent of the
immunized testimony. You should be aware, however, that they will use anything
you say to manipulate associates into sharing more information about you by
suggesting that you have betrayed confidences.
In
front of a grand jury you can "take the Fifth" (exercise your right
to remain silent). However, the prosecutor may impose immunity on you, which
strips you of Fifth Amendment protection and subjects you to the possibility of
being cited for contempt and jailed if you refuse to answer further. In front
of a grand jury you have no Sixth Amendment right to counsel, although you can
consult with a lawyer outside the grand jury room after each question.
What
if I don't cooperate with the grand jury?
If
you receive a grand jury subpoena and elect to not cooperate, you may be held
in civil contempt. There is a chance that you may be jailed or imprisoned for
the length of the grand jury in an effort to coerce you to cooperate. Regular
grand juries sit for a basic term of 18 months, which can be extended up to a
total of 24 months. It is lawful to hold you in order to coerce your
cooperation, but unlawful to hold you as a means of punishment. In rare
instances you may face criminal contempt charges.
What
If I Am Not a Citizen and the DHS Contacts Me?
The
Immigration and Naturalization Service (INS) is now part of the Department of
Homeland Security (DHS) and has been renamed and reorganized into: 1. The
Bureau of Citizenship and Immigration Services (BCIS); 2. The Bureau of Customs
and Border Protection (CBP); and 3. The Bureau of Immigration and Customs
Enforcement (ICE). All three bureaus will be referred to as DHS for the
purposes of this pamphlet.
?
Assert your rights. If you do not demand your rights or if you sign papers
waiving your rights, the Department of Homeland Security (DHS) may deport you
before you see a lawyer or an immigration judge. Never sign anything without
reading, understanding and knowing the consequences of signing it.
?
Talk to a lawyer. If possible, carry with you the name and telephone number of
an immigration lawyer who will take your calls. The immigration laws are hard
to understand and there have been many recent changes. DHS will not explain
your options to you. As soon as you encounter a DHS agent, call your attorney.
If you can't do it right away, keep trying. Always talk to an immigration
lawyer before leaving the U.S. Even some legal permanent residents can be
barred from returning.
Based
on today's laws, regulations and DHS guidelines, non-citizens usually have the
following rights, no matter what their immigration status. This information may
change, so it is important to contact a lawyer. The following rights apply to
non-citizens who are inside the U.S. Non-citizens at the border who are trying
to enter the U.S. do not have all the same rights.
Do
I have the right to talk to a lawyer before answering any DHS questions or
signing any DHS papers?
Yes.
You have the right to call a lawyer or your family if you are detained, and you
have the right to be visited by a lawyer in detention. You have the right to
have your attorney with you at any hearing before an immigration judge. You do
not have the right to a government-appointed attorney for immigration
proceedings, but if you have been arrested, immigration officials must show you
a list of free or low cost legal service providers.
Should
I carry my green card or other immigration papers with me?
If
you have documents authorizing you to stay in the U.S., you must carry them
with you. Presenting false or expired papers to DHS may lead to deportation or
criminal prosecution. An unexpired green card, I-94, Employment Authorization
Card, Border Crossing Card or other papers that prove you are in legal status
will satisfy this requirement. If you do not carry these papers with you, you
could be charged with a crime. Always keep a copy of your immigration papers
with a trusted family member or friend who can fax them to you, if need be.
Check with your immigration lawyer about your specific case.
Am
I required to talk to government officers about my immigration history?
If
you are undocumented, out of status, a legal permanent resident (green card
holder), or a citizen, you do not have to answer any questions about your
immigration history. (You may want to consider giving your name; see above for
more information about this.) If you are not in any of these categories, and
you are being questioned by a DHS or FBI agent, then you may create problems
with your immigration status if you refuse to provide information requested by
the agent. If you have a lawyer, you can tell the agent that your lawyer will
answer questions on your behalf. If answering questions could lead the agent to
information that connects you with criminal activity, you should consider
refusing to talk to the agent at all.
If
I am arrested for immigration violations, do I have the right to a hearing
before an immigration judge to defend myself against deportation charges?
Yes.
In most cases only an immigration judge can order you deported. But if you
waive your rights or take "voluntary departure," agreeing to leave
the country, you could be deported without a hearing. If you have criminal
convictions, were arrested at the border, came to the U.S. through the visa
waiver program or have been ordered deported in the past, you could be deported
without a hearing. Contact a lawyer immediately to see if there is any relief
for you.
Can
I call my consulate if I am arrested?
Yes.
Non-citizens arrested in the U.S. have the right to call their consulate or to
have the police tell the consulate of your arrest. The police must let your
consulate visit or speak with you if consular officials decide to do so. Your
consulate might help you find a lawyer or offer other help. You also have the
right to refuse help from your consulate.
What
happens if I give up my right to a hearing or leave the U.S. before the hearing
is over?
You
could lose your eligibility for certain immigration benefits, and you could be
barred from returning to the U.S. for a number of years. You should always talk
to an immigration lawyer before you decide to give up your right to a hearing.
What
should I do if I want to contact DHS?
Always
talk to a lawyer before contacting DHS, even on the phone. Many DHS officers
view "enforcement" as their primary job and will not explain all of
your options to you.
What
Are My Rights at Airports?
IMPORTANT
NOTE: It is illegal for law enforcement to perform any stops, searches,
detentions or removals based solely on your race, national origin, religion,
sex or ethnicity.
If
I am entering the U.S. with valid travel papers can a U.S. customs agent stop
and search me?
Yes.
Customs agents have the right to stop, detain and search every person and item.
Can
my bags or I be searched after going through metal detectors with no problem or
after security sees that my bags do not contain a weapon?
Yes.
Even if the initial screen of your bags reveals nothing suspicious, the
screeners have the authority to conduct a further search of you or your bags.
If
I am on an airplane, can an airline employee interrogate me or ask me to get
off the plane?
The
pilot of an airplane has the right to refuse to fly a passenger if he or she
believes the passenger is a threat to the safety of the flight. The pilot's decision
must be reasonable and based on observations of you, not stereotypes.
What
If I Am Under 18?
Do
I have to answer questions?
No.
Minors too have the right to remain silent. You cannot be arrested for refusing
to talk to the police, probation officers, or school officials, except in some
states you may have to give your name if you have been detained.
What
if I am detained?
If
you are detained at a community detention facility or Juvenile Hall, you
normally must be released to a parent or guardian. If charges are filed against
you, in most states you are entitled to counsel (just like an adult) at no
cost.
Do
I have the right to express political views at school?
Public
school students generally have a First Amendment right to politically organize
at school by passing out leaflets, holding meetings, etc., as long as those
activities are not disruptive and do not violate legitimate school rules. You
may not be singled out based on your politics, ethnicity or religion.
Can
my backpack or locker be searched?
School
officials can search students' backpacks and lockers without a warrant if they
reasonably suspect that you are involved in criminal activity or carrying drugs
or weapons. Do not consent to the police or school officials searching your property,
but do not physically resist or you may face criminal charges.
Disclaimer
This
booklet is not a substitute for legal advice. You should contact an attorney if
you have been visited by the FBI or other law enforcement officials. You should
also alert your relatives, friends, co-workers and others so that they will be
prepared if they are contacted as well.
NLG
National Hotline for Activists Contacted by the FBI
888-NLG-ECOL
(888-654-3265)
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Free
Mumia NOW!
Prisonradio.org
Write
to Mumia:
Mumia
Abu-Jamal AM 8335
SCI
Mahanoy
301
Morea Road
Frackville,
PA 17932
FOR
IMMEDIATE RELEASE Contact: Rachel Wolkenstein
August
21, 2011 (917) 689-4009
MUMIA
ABU-JAMAL ILLEGALLY SENTENCED TO
LIFE
IMPRISONMENT WITHOUT PAROLE!
FREE
MUMIA NOW!
www.FreeMumia.com
http://blacktalkradionetwork.com/profiles/blogs/mumia-is-formally-sentenced-to-life-in-prison-w-out-hearing-he-s
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
"A
Child's View from Gaza: Palestinian Children's Art and the Fight Against
Censorship"
book
https://www.mecaforpeace.org/civicrm/contribute/transact?reset=1&id=25
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Justice
for Albert Woodfox and Herman Wallace: Decades of isolation in Louisiana
state
prisons must end
Take
Action -- Sign Petition Here:
http://www.amnesty.org/en/appeals-for-action/justice-for-albert-woodfox-and-herm\
an-wallace
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
WITNESS
GAZA
http://www.witnessgaza.com/
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Write
to Bradley
http://bradleymanning.org/donate
View
the new 90 second "I am Bradley Manning" video:
I
am Bradley Manning
http://www.youtube.com/watch?v=o-P3OXML00s
Courage
to Resist
484
Lake Park Ave. #41
Oakland,
CA 94610
510-488-3559
couragetoresist.org
"A
Fort Leavenworth mailing address has been released for Bradley Manning:
Bradley
Manning 89289
830
Sabalu Road
Fort
Leavenworth, KS 66027
The
receptionist at the military barracks confirmed that if someone sends
Bradley
Manning a letter to that address, it will be delivered to him."
http://www.bradleymanning.org/news/update-42811
This
is also a Facebook event
http://www.facebook.com/event.php?eid=207100509321891#!/event.php?eid=2071005093\
21891
Courage
to Resist needs your support
Please
donate today:
https://co.clickandpledge.com/sp/d1/default.aspx?wid=38590
"Soldiers
sworn oath is to defend and support the Constitution. Bradley Manning
has
been defending and supporting our Constitution." --Dan Ellsberg, Pentagon
Papers
whistle-blower
Jeff
Paterson
Project
Director, Courage to Resist
First
US military service member to refuse to fight in Iraq
Please
donate today.
https://co.clickandpledge.com/sp/d1/default.aspx?wid=38590
P.S.
I'm asking that you consider a contribution of $50 or more, or possibly
becoming
a sustainer at $15 a month. Of course, now is also a perfect time to
make
a end of year tax-deductible donation. Thanks again for your support!
Please
click here to forward this to a friend who might also be interested in
supporting
GI resisters.
http://ymlp.com/forward.php?id=lS3tR&e=bonnieweinstein@yahoo.com
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
The
Battle Is Still On To
FREE
MUMIA ABU-JAMAL!
The
Labor Action Committee To Free Mumia Abu-Jamal
PO
Box 16222 • Oakland CA 94610
www.laboractionmumia.org
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
KEVIN
COOPER IS INNOCENT! FREE KEVIN COOPER!
Reasonable
doubts about executing Kevin Cooper
Chronicle
Editorial
Monday,
December 13, 2010
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2010/12/13/EDG81GP0I7.DTL
Death
penalty -- Kevin Cooper is Innocent! Help save his life from San Quentin's
death
row!
http://www.savekevincooper.org/
http://www.savekevincooper.org/pages/essays_content.html?ID=255
URGENT
ACTION APPEAL
-
From Amnesty International USA
17
December 2010
Click
here to take action online:
http://takeaction.amnestyusa.org/siteapps/advocacy/index.aspx?c=jhKPIXPCIoE&\
b=2590179&template=x.ascx&action=15084
To
learn about recent Urgent Action successes and updates, go to
http://www.amnestyusa.org/iar/success
For
a print-friendly version of this Urgent Action (PDF):
http://www.amnestyusa.org/actioncenter/actions/uaa25910.pdf
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Short
Video About Al-Awda's Work
The
following link is to a short video which provides an overview of Al-Awda's
work
since the founding of our organization in 2000. This video was first shown
on
Saturday May 23, 2009 at the fundraising banquet of the 7th Annual Int'l
Al-Awda
Convention in Anaheim California. It was produced from footage collected
over
the past nine years.
Video:
http://www.youtube.com/watch?v=kTiAkbB5uC0&eurl
Support
Al-Awda, a Great Organization and Cause!
Al-Awda,
The Palestine Right to Return Coalition, depends on your financial
support
to carry out its work.
To
submit your tax-deductible donation to support our work, go to
http://www.al-awda.org/donate.html
and
follow the simple instructions.
Thank
you for your generosity!
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
D.
VIDEO, FILM, AUDIO. ART, POETRY, ETC.:
[Some
of these videos are embeded on the BAUAW website:
http://bauaw.blogspot.com/
or bauaw.org ...bw]
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Published on Jan 28, 2014
"Checkpoint" is based on the
oppression and discrimination Jasiri X witnessed firsthand during his
recent trip to Palestine and Israel "Checkpoint" is produced by Agent of
Change, and directed by Haute Muslim. Download "Checkpoint" at https://jasirix.bandcamp.com/track/ch....
Follow Jasiri X at https://twitter.com/jasiri_x
LYRICS
Journal of the hard times tales from the dark side
Evidence of the settlements on my hard drive
Man I swear my heart died at the end of that car ride
When I saw that checkpoint welcome to apartheid
Soldiers wear military green at the checkpoint
Automatic guns that's machine at the checkpoint
Tavors not m16s at the checkpoint
Fingers on the trigger you'll get leaned at the checkpoint
Little children grown adults or teens at the checkpoint
All ya papers better be clean at the checkpoint
You gotta but your finger on the screen at the checkpoint
And pray that red light turns green at the check point
If Martin Luther King had a dream of the checkpoint
He wake with loud screams from the scenes at the checkpoint
It's Malcolm X by any means at the check point
Imagine if you daily routine was the checkpoint
Separation walls that's surrounding the checkpoint
On top is barbwire like a crown on the checkpoint
Better have ya permits if your found at the checkpoint
Gunmen on the tower aiming down at the checkpoint
The idea is to keep you in fear of the checkpoint
You enter through the cage in the rear of the checkpoint
It feels like prison on a tier at the check point
I'd rather be anywhere but here at this checkpoint
Nelson Mandela wasn't blind to the check point
He stood for free Palestine not a check point
Support BDS don't give a dime to the checkpoint
This is international crime at the checkpoint
Arabs get treated like dogs at the checkpoint
Cause discrimination is the law at the checkpoint
Criminalized without a cause at the checkpoint
I'm just telling you what I saw at the checkpoint
Soldiers got bad attitudes at the checkpoint
Condescending and real rude at the checkpoint
Don't look em in they eyes when they move at the checkpoint
They might strip a man or woman nude at the checkpoint
Soldiers might blow you out of ya shoes at the checkpoint
Gas you up and then light the fuse at the checkpoint
Everyday you stand to be accused at the checkpoint
Each time your life you could lose at the checkpoint
If Martin Luther King had a dream of the checkpoint
He wake with loud screams from the scenes at the checkpoint
It's Malcolm X by any means at the check point
Imagine if you daily routine was the checkpoint
At the airport in Tel Aviv is a checkpoint
They pulled over our taxi at the checkpoint
Passport visa ID at the checkpoint
Soldiers going all through my things at the checkpoint
Said I was high risk security at the checkpoint
Because of the oppression I see at the checkpoint
Occupation in the 3rd degree at the checkpoint
All a nigga wanna do is leave fuck a checkpoint
Follow Jasiri X at https://twitter.com/jasiri_x
LYRICS
Journal of the hard times tales from the dark side
Evidence of the settlements on my hard drive
Man I swear my heart died at the end of that car ride
When I saw that checkpoint welcome to apartheid
Soldiers wear military green at the checkpoint
Automatic guns that's machine at the checkpoint
Tavors not m16s at the checkpoint
Fingers on the trigger you'll get leaned at the checkpoint
Little children grown adults or teens at the checkpoint
All ya papers better be clean at the checkpoint
You gotta but your finger on the screen at the checkpoint
And pray that red light turns green at the check point
If Martin Luther King had a dream of the checkpoint
He wake with loud screams from the scenes at the checkpoint
It's Malcolm X by any means at the check point
Imagine if you daily routine was the checkpoint
Separation walls that's surrounding the checkpoint
On top is barbwire like a crown on the checkpoint
Better have ya permits if your found at the checkpoint
Gunmen on the tower aiming down at the checkpoint
The idea is to keep you in fear of the checkpoint
You enter through the cage in the rear of the checkpoint
It feels like prison on a tier at the check point
I'd rather be anywhere but here at this checkpoint
Nelson Mandela wasn't blind to the check point
He stood for free Palestine not a check point
Support BDS don't give a dime to the checkpoint
This is international crime at the checkpoint
Arabs get treated like dogs at the checkpoint
Cause discrimination is the law at the checkpoint
Criminalized without a cause at the checkpoint
I'm just telling you what I saw at the checkpoint
Soldiers got bad attitudes at the checkpoint
Condescending and real rude at the checkpoint
Don't look em in they eyes when they move at the checkpoint
They might strip a man or woman nude at the checkpoint
Soldiers might blow you out of ya shoes at the checkpoint
Gas you up and then light the fuse at the checkpoint
Everyday you stand to be accused at the checkpoint
Each time your life you could lose at the checkpoint
If Martin Luther King had a dream of the checkpoint
He wake with loud screams from the scenes at the checkpoint
It's Malcolm X by any means at the check point
Imagine if you daily routine was the checkpoint
At the airport in Tel Aviv is a checkpoint
They pulled over our taxi at the checkpoint
Passport visa ID at the checkpoint
Soldiers going all through my things at the checkpoint
Said I was high risk security at the checkpoint
Because of the oppression I see at the checkpoint
Occupation in the 3rd degree at the checkpoint
All a nigga wanna do is leave fuck a checkpoint
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
Exceptional
art from the streets of Oakland:
Oakland
Street Dancing
*---------*---------*---------*---------*---------*---------*
NYC
RESTAURANT WORKERS DANCE & SING FOR A WAGE HIKE
http://www.youtube.com/watch?v=L_s8e1R6rG8&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
On
Gun Control, Martin Luther King, the Deacons of Defense and the history of
Black Liberation
http://www.youtube.com/watch?v=qzYKisvBN1o&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
Fukushima
Never Again
http://www.youtube.com/watch?v=LU-Z4VLDGxU
"Fukushima,
Never Again" tells the story of the Fukushima nuclear plant meltdowns in
north east Japan in March of 2011 and exposes the cover-up by Tepco and the
Japanese government.
This
is the first film that interviews the Mothers Of Fukushima, nuclear power
experts and trade unionists who are fighting for justice and the protection of
the children and the people of Japan and the world. The residents and citizens
were forced to buy their own geiger counters and radiation dosimeters in order
to test their communities to find out if they were in danger.
The
government said contaminated soil in children's school grounds was safe and
then
when
the people found out it was contaminated and removed the top soil, the
government and TEPCO refused to remove it from the school grounds.
It
also relays how the nuclear energy program for "peaceful atoms" was brought
to Japan under the auspices of the US military occupation and also the criminal
cover-up of the safety dangers of the plant by TEPCO and GE management which
built the plant in Fukushima. It also interviews Kei Sugaoka, the GE nulcear
plant inspector from the bay area who exposed cover-ups in the safety at the
Fukushima plant and was retaliated against by GE. This documentary allows the
voices of the people and workers to speak out about the reality of the disaster
and what this means not only for the people of Japan but the people of the
world as the US government and nuclear industry continue to push for more new
plants and government subsidies. This film breaks
the
information blockade story line of the corporate media in Japan, the US and
around the world that Fukushima is over.
Production
Of Labor Video Project
P.O.
Box 720027
San
Francisco, CA 94172
www.laborvideo.org
lvpsf@laborvideo.org
For
information on obtaining the video go to:
www.fukushimaneveragain.com
(415)282-1908
*---------*---------*---------*---------*---------*---------*
1000
year of war through the world
http://www.youtube.com/watch?v=NiG8neU4_bs&feature=share
*---------*---------*---------*---------*---------*---------*
Anatomy
of a Massacre - Afganistan
http://www.youtube.com/watch?v=v6BnRc11aug&feature=player_embedded
Afghans
accuse multiple soldiers of pre-meditated murder
To
see more go to http://www.youtube.com/user/journeymanpictures
Follow
us on Facebook (http://goo.gl/YRw42) or Twitter
(http://www.twitter.com/journeymanvod)
The
recent massacre of 17 civilians by a rogue US soldier has been shrouded in
mystery.
But through unprecedented access to those involved, this report
confronts
the accusations that Bales didn't act alone.
"They
came into my room and they killed my family". Stories like this are common
amongst
the survivors in Aklozai and Najiban. As are the shocking accusations
that
Sergeant Bales was not acting alone. Even President Karzai has announced
"one
man can not do that". Chief investigator, General Karimi, is suspicious
that
despite being fully armed, Bales freely left his base without raising
alarm.
"How come he leaves at night and nobody is aware? Every time we have
weapon
accountability and personal accountability." These are just a few of the
questions
the American army and government are yet to answer. One thing however
is
very clear, the massacre has unleashed a wave of grief and outrage which
means
relations in Kandahar will be tense for years to come: "If I could lay my
hands
on those infidels, I would rip them apart with my bare hands."
A
Film By SBS
Distributed
By Journeyman Pictures
April
2012
*---------*---------*---------*---------*---------*---------*
Photo
of George Zimmerman, in 2005 photo, left, and in a more recent photo.
http://www.nytimes.com/interactive/2012/04/02/us/the-events-leading-to-the-sooti\
ng-of-trayvon-martin.html?hp
SPD
Security Cams.wmv
http://www.youtube.com/watch?v=9WWDNbQUgm4&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
Kids
being put on buses and transported from school to "alternate
locations" in
Terror
Drills
http://www.youtube.com/watch?v=qFia_w8adWQ
*---------*---------*---------*---------*---------*---------*
Private
prisons,
a
recession resistant investment opportunity
http://www.youtube.com/watch?v=DIGLDOxx9Vg
*---------*---------*---------*---------*---------*---------*
Attack
Dogs used on a High School Walkout in MD, Four Students Charged With
"Thought
Crimes"
http://www.youtube.com/watch?v=_wafMaML17w
*---------*---------*---------*---------*---------*---------*
Common
forms of misconduct by Law Enforcement Officials and Prosecutors
http://www.youtube.com/watch?v=ViSpM4K276w&feature=related
*---------*---------*---------*---------*---------*---------*
Organizing
and Instigating: OCCUPY - Ronnie Goodman
http://arthazelwood.com/instigator/occupy/occupy-birth-video.html
*---------*---------*---------*---------*---------*---------*
Rep
News 12: Yes We Kony
http://www.youtube.com/watch?v=68GbzIkYdc8
*---------*---------*---------*---------*---------*---------*
The
New Black by The Mavrix - Official Music Video
https://www.youtube.com/watch?v=Y4rLfja8488
*---------*---------*---------*---------*---------*---------*
Japan
One Year Later
http://www.onlineschools.org/japan-one-year-later/
*---------*---------*---------*---------*---------*---------*
The
CIA's Heart Attack Gun
http://www.brasschecktv.com/videos/assassination-studies/the-cias-heart-attack-g\
un-.html
*---------*---------*---------*---------*---------*---------*
The
Invisible American Workforce
http://www.democracynow.org/2011/8/5/new_expos_tracks_alec_private_prison
*---------*---------*---------*---------*---------*---------*
Labor
Beat: NATO vs The 1st Amendment
http://www.youtube.com/watch?v=HbQxnb4so3U
For
more detailed information, send us a request at mail@laborbeat.org.
*---------*---------*---------*---------*---------*---------*
The
Battle of Oakland
by
brandon jourdan plus
http://vimeo.com/36256273
*---------*---------*---------*---------*---------*---------*
Officers
Pulled Off Street After Tape of Beating Surfaces
By
ANDY NEWMAN
February
1, 2012, 10:56 am
http://cityroom.blogs.nytimes.com/2012/02/01/officers-pulled-off-street-after-ta\
pe-of-beating-surfaces/?ref=nyregion
*---------*---------*---------*---------*---------*---------*
This
is excellent! Michelle Alexander pulls no punches!
Michelle
Alexander, Author of The New Jim Crow, speaks about the political
strategy
behind
the War on Drugs and its connection to the mass incarceration of Black
and
Brown people in the United States.
http://www.youtube.com/watch?v=P75cbEdNo2U&feature=player_embedded
If
you think Bill Clinton was "the first black President" you need to
watch this
video
and see how much damage his administration caused for the black community
as
a result of his get tough attitude on crime that appealed to white swing
voters.
This
speech took place at Abyssinian Baptist Church in Harlem on January 12,
2012.
*---------*---------*---------*---------*---------*---------*
FREE
BRADLEY MANNING
http://www.bradleymanning.org/news/national-call-in-for-bradley
I
received the following reply from the White House November 18, 2011 regarding
the
Bradley Manning petition I signed:
"Why
We Can't Comment on Bradley Manning
"Thank
you for signing the petition 'Free PFC Bradley Manning, the accused
WikiLeaks
whistleblower.' We appreciate your participation in the We the People
platform
on WhiteHouse.gov.
The
We the People Terms of Participation explain that 'the White House may
decline
to address certain procurement, law enforcement, adjudicatory, or
similar
matters properly within the jurisdiction of federal departments or
agencies,
federal courts, or state and local government.' The military justice
system
is charged with enforcing the Uniform Code of
Military
Justice. Accordingly, the White House declines to comment on the
specific
case raised in this petition...
That's
funny! I guess Obama didn't get this memo. Here's what Obama said about
Bradley:
BRADLEY
MANNING "BROKE THE LAW" SAYS OBAMA!
"He
broke the law!" says Obama about Bradley Manning who has yet to even be
charged,
let alone, gone to trial and found guilty. How horrendous is it for the
President
to declare someone guilty before going to trial or being charged with
a
crime! Justice in the U.S.A.!
Obama
on FREE BRADLEY MANNING protest... San Francisco, CA. April 21, 2011-
Presidential
remarks on interrupt/interaction/performance art happening at
fundraiser.
Logan Price queries Barack after org. FRESH JUICE PARTY political
action:
http://www.youtube.com/watch?v=IfmtUpd4id0&feature=youtu.be
Release
Bradley Manning
Almost
Gone (The Ballad Of Bradley Manning)
Written
by Graham Nash and James Raymond (son of David Crosby)
http://www.youtube.com/watch?v=dAYG7yJpBbQ&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
Julian
Assange: Why the world needs WikiLeaks
http://www.youtube.com/watch?v=bVGqE726OAo&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
School
police increasingly arresting American students?
http://www.youtube.com/watch?v=Zl-efNBvjUU&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
FYI:
Nuclear
Detonation Timeline "1945-1998"
The
2053 nuclear tests and explosions that took place between 1945 and 1998 are
plotted
visually and audibly on a world map.
http://www.youtube.com/watch?v=I9lquok4Pdk&feature=share&mid=5408
*---------*---------*---------*---------*---------*---------*
We
Are the 99 Percent
We
are the 99 percent. We are getting kicked out of our homes. We are forced to
choose
between groceries and rent. We are denied quality medical care. We are
suffering
from environmental pollution. We are working long hours for little pay
and
no rights, if we're working at all. We are getting nothing while the other 1
percent
is getting everything. We are the 99 percent.
Brought
to you by the people who occupy wall street. Why will YOU occupy?
OccupyWallSt.org
Occupytogether.org
wearethe99percentuk.tumblr.com
http://wearethe99percent.tumblr.com/
*---------*---------*---------*---------*---------*---------*
We
Are The People Who Will Save Our Schools
YouTube:
http://www.youtube.com/watch?v=lFAOJsBxAxY
*---------*---------*---------*---------*---------*---------*
In
honor of the 75th Anniversary of the 44-Day Flint Michigan sit-down strike at
GM
that began December 30, 1936:
According
to Michael Moore, (Although he has done some good things, this clip
isn't
one of them) in this clip from his film, "Capitalism a Love Story,"
it was
Roosevelt
who saved the day!):
"After
a bloody battle one evening, the Governor of Michigan, with the support
of
the President of the United States, Franklin Roosevelt, sent in the National
Guard.
But the guns and the soldiers weren't used on the workers; they were
pointed
at the police and the hired goons warning them to leave these workers
alone.
For Mr. Roosevelt believed that the men inside had a right to a redress
of
their grievances." -Michael Moore's 'Capitalism: A Love Story'
-
Flint Sit-Down Strike http://www.youtube.com/watch?v=h8x1_q9wg58
But
those cannons were not aimed at the goons and cops! They were aimed straight
at
the factory filled with strikers! Watch what REALLY happened and how the
strike
was really won!
'With
babies & banners' -- 75 years since the 44-day Flint sit-down strike
http://links.org.au/node/2681
--Inspiring
*---------*---------*---------*---------*---------*---------*
HALLELUJAH
CORPORATIONS (revised edition).mov
http://www.youtube.com/watch?v=ws0WSNRpy3g
*---------*---------*---------*---------*---------*---------*
ONE
OF THE GREATEST POSTS ON YOUTUBE SO FAR!
http://www.youtube.com/watch?v=M8C-qIgbP9o&feature=share&mid=552
*---------*---------*---------*---------*---------*---------*
ILWU
Local 10 Longshore Workers Speak-Out At Oakland Port Shutdown
http://www.youtube.com/watch?v=3JUpBpZYwms
Uploaded
by laborvideo on Dec 13, 2011
ILWU
Local 10 longshore workers speak out during a blockade of the Port of
Oakland
called for by Occupy Oakland. Anthony Levieges and Clarence Thomas rank
and
file members of the union. The action took place on December 12, 2011 and
the
interview took place at Pier 30 on the Oakland docks.
For
more information on the ILWU Local 21 Longview EGT struggle go to
http://www.facebook.com/groups/256313837734192/
For
further info on the action and the press conferernce go to:
http://www.youtube.com/watch?v=Jz3fE-Vhrw8&feature=youtu.be
Production
of Labor Video Project www.laborvideo.org
*---------*---------*---------*---------*---------*---------*
UC
Davis Police Violence Adds Fuel to Fire
By
Scott Galindez, Reader Supported News
19
November 11
http://readersupportednews.org/opinion2/275-42/8485-uc-davis-police-violence-add\
s-fuel-to-fire
UC
Davis Protestors Pepper Sprayed
http://www.youtube.com/watch?v=6AdDLhPwpp4&feature=player_embedded
Police
PEPPER SPRAY UC Davis STUDENT PROTESTERS!
http://www.youtube.com/watch?v=wuWEx6Cfn-I&feature=player_embedded
Police
pepper spraying and arresting students at UC Davis
http://www.youtube.com/watch?v=WmJmmnMkuEM&feature=player_embedded
*---------*
UC
Davis Chancellor Katehi walks to her car
http://www.youtube.com/watch?feature=player_embedded&v=CZ0t9ez_EGI#!
Occupy
Seattle - 84 Year Old Woman Dorli Rainey Pepper Sprayed
http://www.youtube.com/watch?v=TTIyE_JlJzw&feature=related
*---------*
THE
BEST VIDEO ON "OCCUPY THE WORLD"
http://www.youtube.com/watch?v=S880UldxB1o
*---------*---------*---------*---------*---------*---------*
Shot
by police with rubber bullet at Occupy Oakland
http://www.youtube.com/watch?v=I0pX9LeE-g8&feature=player_embedded
*---------*
Copwatch@Occupy
Oakland: Beware of Police Infiltrators and Provocateurs
http://www.youtube.com/watch?v=VrvMzqopHH0
*---------*
Occupy
Oakland 11-2 Strike: Police Tear Gas, Black Bloc, War in the Streets
http://www.youtube.com/watch?v=0Tu_D8SFYck&feature=player_embedded
*----*
Quebec
police admitted that, in 2007, thugs carrying rocks to a peaceful protest
were
actually undercover Quebec police officers:
POLICE
STATE Criminal Cops EXPOSED As Agent Provocateurs @ SPP Protest
http://www.youtube.com/watch?v=KoiisMMCFT0&feature=player_embedded
*----*
Quebec
police admit going undercover at montebello protests
http://www.youtube.com/watch?v=gAfzUOx53Rg&feature=player_embedded
G20:
Epic Undercover Police Fail
http://www.youtube.com/watch?v=jrJ7aU-n1L8&feature=player_embedded
*----*
WHAT
HAPPENED IN OAKLAND TUESDAY NIGHT, OCTOBER 25:
Occupy
Oakland Protest
http://www.youtube.com/watch?v=wlPs-REyl-0&feature=player_embedded
Cops
make mass arrests at occupy Oakland
http://www.youtube.com/watch?v=R27kD2_7PwU&feature=player_embedded
Raw
Video: Protesters Clash With Oakland Police
http://www.youtube.com/watch?v=CpO-lJr2BQY&feature=player_embedded
Occupy
Oakland - Flashbangs USED on protesters OPD LIES
http://www.youtube.com/watch?v=QqNOPZLw03Q&feature=player_embedded
KTVU
TV Video of Police violence
http://www.ktvu.com/video/29587714/index.html
Marine
Vet wounded, tear gas & flash-bang grenades thrown in downtown
Oakland
http://www.youtube.com/watch?v=cMUgPTCgwcQ&feature=player_embedded
Tear
Gas billowing through 14th & Broadway in Downtown Oakland
http://www.youtube.com/watch?v=OU4Y0pwJtWE&feature=player_embedded
Arrests
at Occupy Atlanta -- This is what a police state looks like
http://www.youtube.com/watch?v=YStWz6jbeZA&feature=player_embedded
*---------*
Labor
Beat: Hey You Billionaire, Pay Your Fair Share
http://www.youtube.com/watch?v=PY8isD33f-I
*---------*
Voices
of Occupy Boston 2011 - Kwame Somburu (Paul Boutelle) Part I
http://www.youtube.com/watch?v=DA48gmfGB6U&feature=youtu.be
Voices
of Occupy Boston 2011 - Kwame Somburu (Paul Boutelle) Part II
http://www.youtube.com/watch?v=cjKZpOk7TyM&feature=related
*---------*
#Occupy
Wall Street In Washington Square: Mohammed Ezzeldin, former occupier of
Egypt's
Tahrir Square Speaks at Washington Square!
http://www.youtube.com/watch?v=ziodsFWEb5Y&feature=player_embedded
*---------*
#OccupyTheHood,
Occupy Wall Street
By
adele pham
http://vimeo.com/30146870
*---------*
Live
arrest at brooklyn bridge #occupywallstreet by We are Change
http://www.youtube.com/watch?v=yULSI-31Pto&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
FREE
THE CUBAN FIVE!
http://www.thecuban5.org/wordpress/index.php
http://www.youtube.com/watch?v=JmS4kHC_OlY&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
One
World One Revolution -- MUST SEE VIDEO -- Powerful and beautiful...bw
http://www.youtube.com/watch?v=aE3R1BQrYCw&feature=player_embedded
"When
injustice becomes law, resistance becomes duty." Thomas Jefferson
*---------*---------*---------*---------*---------*---------*
Japan:
angry Fukushima citizens confront government (video)
Posted
by Xeni Jardin on Monday, Jul 25th at 11:36am
http://www.youtube.com/watch?v=rVuGwc9dlhQ&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
Labor
Beat: Labor Stands with Subpoenaed Activists Against FBI Raids and Grand
Jury
Investigation of antiwar and social justice activists.
"If
trouble is not at your door. It's on it's way, or it just left."
"Investigate
the Billionaires...Full investigation into Wall Street..." Jesse
Sharkey,
Vice
President,
Chicago Teachers Union
http://www.youtube.com/watch?v=BSNUSIGZCMQ
*---------*---------*---------*---------*---------*---------*
Coal
Ash: One Valley's Tale
http://www.youtube.com/watch?v=6E7h-DNvwx4&feature=player_embedded
*---------*---------*---------*---------*---------*---------*
*---------*---------*---------*---------*---------*---------*
To
unsubscribe go to: bauaw2003-unsubscribe@yahoogroups.com
1 comment:
replica bags bangkok replica bags cheap replica ysl bags australia
Post a Comment