"Only dull people are brilliant at breakfast"
-Oscar Wilde
Brilliant at Breakfast title banner "The liberal soul shall be made fat, and he that watereth, shall be watered also himself."
-- Proverbs 11:25
"...you have a choice: be a fighting liberal or sit quietly. I know what I am, what are you?" -- Steve Gilliard, 1964 - 2007

"For straight up monster-stomping goodness, nothing makes smoke shoot out my ears like Brilliant@Breakfast" -- Tata

"...the best bleacher bum since Pete Axthelm" -- Randy K.

"I came here to chew bubblegum and kick ass. And I'm all out of bubblegum." -- "Rowdy" Roddy Piper (1954-2015), They Live
Thursday, November 25, 2010

Who benefits? And where are the opportunities?
Posted by Jill | 8:11 AM
The story of terrorism, and the fight against terrorism in this country, always contains a question: Who Benefits?

9/11 "Truthers" speculate on who benefitted from the 9/11 attacks, but you don't have to be a "Truther" to wonder, when a presidency was deemed in the press to be over almost as soon as it began turned into a press darling over the corpses of nearly three thousand people. Dick Cheney has profited handsomely over contracts given to Halliburton in Iraq.

A year after the so-called "underwear bomber", whose own father notified the U.S.Embassy in Nigeria that his son was planning something, failed in his attempt to bring down an airliner, and weeks after CARGO PLANES were targeted, air passengers are being whipped into a frenzy of terrorism fear again by a TSA that works according to some strange alchemy in which ignoring cargo but x-raying and groping passengers somehow prevents explosives from being deployed on cargo planes.

Despite the potential risks to both passenger and TSA worker posed by radiation administered to travelers by low-wage workers without medical training, and despite the consensus among security experts without a financial stake in body scanners that their implementation simply is not effective, not only are more airports planning to deploy these monstrosities, but there is a very real possibility of Americans having to go through this security theatre nonsense if they want to take a cruise or a ferry, or get to work via train or subway.

If you have ever worked in New York City, or commuted to ANY major metropolitan area, or for that matter, ever been any place where people congregate -- shopping malls, ball games, concerts, ballets, operas, megachurches, you can imagine the chaos that would result from a requirement to be groped or strip-searched just to get to work, or watch the Yankees play, or go see Bruce Springsteen, or take your aunt from Dubuque on the Circle Line.

They're getting away with it for air travel because the images of the 9/11 attacks are etched into our minds. But taken to this logical extreme, as Janet Napolitano appears to be considering, I wonder if Americans will stand for it.

Images of government-money sugarplums are dancing in the heads of lobbyists for the x-ray scanner industry, who are the REAL beneficiaries of this insanity, as Cenk Uygur, who seems to be handling the anchor load on MSNBC during this holiday weekend all by himself, noted yesterday:




We already know that George W. Bush's head of the Department of Homeland Security, Michael Chertoff, stands to profit handsomely from the indiscriminate deployment of these scanners. Chertoff has been a tireless advocate for this industry, advocating that the "administration must stand firm against privacy ideologues"in a Washington Post op-ed last January.

Who else benefits?

There's an opportunity here for the progressive netroots to find common cause with the Tea Party, if we only dare to take it. Granted, many Tea Party followers give lip service to the Constitution without knowing what's in it beyond the Second Amendment. But as I've often said, the political spectrum is sometimes less a continuum than a circle, in which left and right eventually meet at the top. All too often, civil liberties have been framed as a leftist issue, what with George H.W. Bush calling his opponent during the 1988 campaign a "card-carrying member of the American Civil Liberties Union". But now that the right has been whipped into a frenzy about "big government", and Tea Partiers are subject to virtual strip searches and government-mandated groping along with the Dirty Fucking Hippies they loathe, perhaps there's some room here to find common cause. And once we find common cause there, are there other areas as well?

Labels: , ,

Bookmark and Share
Wednesday, May 05, 2010

What, no waterboarding? Damn....
Posted by Jill | 4:49 AM
Within 53 hours of a car bomb being found in New York, a combination of a vigilant public, good, solid police work, and federal agency participation, not only has a suspect in Saturday's car bombing been apprehended, but is singing like a canary, apparently without being tortured -- even after having been read his rights.

But why let a good capture stand in the way of the Republican effort to turn this country into Stalinist Russia? Barely able to contain their glee at the opportunity to whip themselves and their sympathizers into a frenzy o'fear again, Republicans from John McCain to Peter King to Joe Lieberman are falling all over each other trying to see who can shred the Constitution the fastest:

Rachel documented the insanity last night:



You especially have to love Lieberman's idea of automatically stripping the citizenship of anyone who affiliates with anyone the government, or more specifically, Joe Lieberman, doesn't like -- without any kind of due process at all.

The sight of these same craven opportunists, getting up again and again to use every incident in which someone swarthy commits a crime, to try to systematically eviscerate the Constitution, while calling Obama a tyrant, is sickening.

And yet, while Republicans are using this as a way to perhaps address the coming white minority by giving the government to walk up to swarthy people on the street and make them non-citizens eligible for deportation immediately, they don't seem to be at all concerned about why Emirates Airlines allowed Faisal Shahzad on a plane in the first place:
But at about 12:30 p.m. on Monday, more certain that Mr. Shahzad was the suspected terrorist, investigators asked the Department of Homeland Security to put him on the no-fly list. Three minutes later, the department sent airlines, including Emirates, an electronic notification that they should check the no-fly list for an update. At about 4:30 p.m., more information was added to the list, including Mr. Shahzad’s passport number, officials said.

Workers at Emirates evidently did not check the list, because at 6:30 p.m., Mr. Shahzad called the airline and booked a flight to Pakistan via Dubai, officials said. At 7:35 p.m., he arrived at the airport, paid cash for his ticket and was given a boarding pass.

Airlines are not required to report cash purchases, a Homeland Security official said. Emirates actually did report Mr. Shahzad’s purchase to the Transportation Security Administration — but only hours later, when he was already in custody, the official said.

Mr. Shahzad had evaded the surveillance effort and bought his ticket seven hours after his name went on the no-fly list. But the system gives security officials one more chance to stop a dangerous passenger.

Labels: ,

Bookmark and Share
Monday, March 10, 2008

They didn't stop the Total Information Awareness program, they just buried it.
Posted by Jill | 9:18 PM

Remember Total Information Awareness, that Big Brother-esque effort complete with its Masonic / Illuminati imagery and its ominous motto, "scientia est potentia" (knowledge is power), to be led by Iran-Contra bigwig John Negroponte? Remember how the program was killed by Congress?

Well, since the Bush Administration don't need no es-teenking Congressional permission for anything, they just moved it to the NSA. No longer was NSA spying and data mining about foreign terrorists; now it was about scooping up every piece of phone, e-mail, and other communications traffic in the U.S.

This horrific bombshell report appeared in Rupert Murdoch's Wall Street Journal, of all places:

Five years ago, Congress killed an experimental Pentagon antiterrorism program meant to vacuum up electronic data about people in the U.S. to search for suspicious patterns. Opponents called it too broad an intrusion on Americans' privacy, even after the Sept. 11 terrorist attacks.

But the data-sifting effort didn't disappear. The National Security Agency, once confined to foreign surveillance, has been building essentially the same system.

The central role the NSA has come to occupy in domestic intelligence gathering has never been publicly disclosed. But an inquiry reveals that its efforts have evolved to reach more broadly into data about people's communications, travel and finances in the U.S. than the domestic surveillance programs brought to light since the 2001 terrorist attacks.

Congress now is hotly debating domestic spying powers under the main law governing U.S. surveillance aimed at foreign threats. An expansion of those powers expired last month and awaits renewal, which could be voted on in the House of Representatives this week. The biggest point of contention over the law, the Foreign Intelligence Surveillance Act, is whether telecommunications and other companies should be made immune from liability for assisting government surveillance.

Largely missing from the public discussion is the role of the highly secretive NSA in analyzing that data, collected through little-known arrangements that can blur the lines between domestic and foreign intelligence gathering. Supporters say the NSA is serving as a key bulwark against foreign terrorists and that it would be reckless to constrain the agency's mission. The NSA says it is scrupulously following all applicable laws and that it keeps Congress fully informed of its activities.

According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions, travel and telephone records. The NSA receives this so-called "transactional" data from other agencies or private companies, and its sophisticated software programs analyze the various transactions for suspicious patterns. Then they spit out leads to be explored by counterterrorism programs across the U.S. government, such as the NSA's own Terrorist Surveillance Program, formed to intercept phone calls and emails between the U.S. and overseas without a judge's approval when a link to al Qaeda is suspected.

The NSA's enterprise involves a cluster of powerful intelligence-gathering programs, all of which sparked civil-liberties complaints when they came to light. They include a Federal Bureau of Investigation program to track telecommunications data once known as Carnivore, now called the Digital Collection System, and a U.S. arrangement with the world's main international banking clearinghouse to track money movements.

The effort also ties into data from an ad-hoc collection of so-called "black programs" whose existence is undisclosed, the current and former officials say. Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach. Among them, current and former intelligence officials say, is a longstanding Treasury Department program to collect individual financial data including wire transfers and credit-card transactions.

It isn't clear how many of the different kinds of data are combined and analyzed together in one database by the NSA. An intelligence official said the agency's work links to about a dozen antiterror programs in all.

A number of NSA employees have expressed concerns that the agency may be overstepping its authority by veering into domestic surveillance. And the constitutional question of whether the government can examine such a large array of information without violating an individual's reasonable expectation of privacy "has never really been resolved," said Suzanne Spaulding, a national-security lawyer who has worked for both parties on Capitol Hill.


I wonder if this is how they nailed Spitzer.

Before Congress votes to give the telecom companies retroactive and open-ended immunity, I hope they read this article.

Labels: , , ,

Bookmark and Share
Monday, August 06, 2007

First they came for the whistleblower....
Posted by Jill | 10:04 PM
...but because we are not DOJ lawyers, we remained silent.

Now they may be coming for the New York Times:

Writing in Commentary, editor Gabriel Schoenfeld is renewing his call for the indictment of the New York Times for its December 16, 2005 publication of the NSA story. Perhaps sensing a momentum shift with the Tamm raid and the Democrats' capitulation on the draconian new FISA law, Schoenfeld reasserted his 2006 claim that the New York Times violated federal criminal statutes, if not the Espionage Act of 1917.




And then it will be progressive talk radio.

And then it will be bloggers.

What ARE those camps that Kellogg, Brown and Root are building for, anyway? Hmmmmm?

(hat tip: Nicole Belle at C&L)

Labels:

Bookmark and Share
Monday, February 19, 2007

But al-Qaeda gets to regroup without being hassled
Posted by Jill | 7:20 AM
I don't know how I missed this story last week:

A House Republican is pushing a measure that echoes a long-sought Bush administration goal: to require all Internet service providers to keep records on their subscribers.

The measure, introduced by Rep. Lamar Smith (R-Tex.) last week as part of the larger SAFETY Act, would give the attorney general broad discretion to write the rules on what information companies have to retain and for how long.

It is aimed at protecting children from predators, but privacy advocates say its privacy and civil-liberties implications are huge, and industry is concerned about the costs of compliance. News of the measure has spread around the blogosphere, as critics seek to mobilize opposition to the SAFETY Act.

The provision would require Internet service companies to provide at a minimum the Internet subscriber's name and address, which can be linked to an Internet protocol address -- an identification number associated with a particular computer at a given time. Law enforcement officials would have to obtain a subpoena to have access to the records and could not use the tool to track law-abiding citizens on the Internet, Smith said.


Riiiiight. And I am Marie of Rumania. It's amazing just how much Republicans focus on child porn, isn't it? For that matter, it's amazing how much they focus on everything having to do with sex. Let's not forget that in the summer of 2001, then-Attorney General John Ashcroft was focused like a laser beam on cracking down on a New Orleans brothel while the 9/11 attacks were being plotted.

I'm not trying to belittle the problem of child pornography. But passing legislation demanding that ISPs conduct dragnets of all internet users is once again -- and I keep coming back to this, don't I -- conducting government like the old Franken and Davis sketch in which Tom Davis' character promises to "kill 'em BEFORE they can commit a crime."

The Bush Administration is all about "guilty until proven innocent." Every policy it has instituted or advocated in the name of national security is less about stopping terrorists, or chid pornographers, or drug dealers, than it is about monitoring the activities of ordinary Americans who might have the capability of waking up a sleeping population to the danger presented by its own government.

(hat tip: Lynn)

Labels: ,

Bookmark and Share