|
STUDY MUELLER'S HESITATION I would encourage a "fresh look" at not just the transcript, but the _audio_: <"Mueller: The discussion was on a National -- uh, NSA program that has been much discussed, yes."> It appears he _almost_ mentioned "national security council" program. . . NSC is not the same as NSA. Another way to read between the lines . . ."National security program": Something that is _outside_ FISA; and _outside_ what the FISA current covers. . .although it was intended to cover _all_ things. Listen closely to the pauses, spacing, and hemming and hawing. Mueller is dancing around something that -- it appears -- President and AG have said falls "outside" the FISA-coverage: This might be a Canadian-Australian-NZ-UK data transfer program: Whereby non-US interception methods are used, but the data is forwarded to the NSA through non-direct US means. . . . . Also, if the Senate's Leahy/Specter do not trust Gonzalez, why would they trust him on this AG-certifications under FISA? If he's been lying to the Senate, then his AG-certifications on "OK to do this without a warrant" are also in doubt. He could define anything -- rightly or wrongly -- as being under that umbrella. Question becomes: What certification has the AG made on things that not even the Gang of 8 was told about; and how was the NSC (not NSA) involved with the oversight of this, outside FISA-Gang of 8 review? "National security" could mean: "Maintaining morale" or "maintaining confidence": That could mean providing false information to the public; or, based on data mining, issuing public news releases to justify public support for illegal activity; or maintain confidence in something that was an illegal contract. This would involve capture through NSA of meta-language; then stripping out identifying information;; then transferring that data to a firm like Flieshman Hilliard which would examine it, and issue public news releases on various government "public oversight" and "media messaging issues": Smith Act issues in re domestic propaganda: Possibly a "public service" announcement to maintain loyalty in non-sense. Something for AT&T to discuss. _______________________________________ LEARN LESSON OF OLC IN RE SUBPOENA RESPONSES Recall, OLC issued a "memo" saying that WH Counsel did not have to testify. This, according to the WH, was "gospel." Untrue, but that's another issue. OLC made a "rule" and then everyone said, "See, that's what they said." Now, consider this, from TPMM quote, above: <"that program was not something that was legally controversial."> That could mean anything, anybody, and without reference to any legal standard. "not legally controversial" . . . _according to whom_. . . ?...: - OLC? - Consensus within NSC? - Consensus within NSA? - Rove's determination? - Gonzalez assessment after talking to Goodling about door mats for the Hoover Building? . . . What's their idea of "non legal controversy", as opposed to a "controversy that is real, but not based on a law, just the Constitution"? What is someone like Darth Cheney said, "We need to justify this -- find a reason. Ignore words in the law if you need to. Just give me a memo. You get an appointment to the bench if you can figure this out." What if Roberts or Alito gave a really good opinion on this and made everyone -- in that room -- believe it was "not controversial", even though it was? . . . Again, saying <"that program was not something that was legally controversial."> could mean: A. "other programs" were controversial; B. "other groups" _are_ doing illegal things, but you haven't asked us about them, so we haven't made up a lie. . . yet; C. OLC "determined" (using a feather, some fairy dust, and after gazing into GOodling's eyes) that anything the NSC wanted to do under Cheney was OK, just as long as nobody traced the money. . . . There's another way of looking at this <"that program was not something that was legally controversial."> D. "This program" is different from "that program" which has been hidden in another budget, unrelated to the NSA or NSC: E. DoD _is_ allowed to do things overseas, and contractors have been assigned -- working for those _overseas_ entities -- in the US. F. The data that is managed is channelled, but the contractors have no idea who it is they are monitoring: All they see is the raw data; someone else then recombines the data if there is a problem. G. If we find a problem in the data, we then use the data we've collected to justify the warrant; if we can't get one, we self-issue one, and get the AG to certify it as being OK> Never mind that Qwest objected. <"that program was not something that was legally controversial."> could also mean: H. Legal counsel assigned to our units have been told to keep their comments to themselves I. All contracts supporting this activity are -- by definition -- "legal contracts"; (just don't talk about whether they support a lawful or unlawful objective. Far too scary to contemplate!) J. "not controversial" could mean all the legal views that opposed it were ignored; and the remaining opinions were in "full support". K. The legal counsel who knew of the Constitutional violations were sent to Guantanamo, threatened with nasty things: "To the washroom, counsellor! No gloves for you." L. Legal counsel who remained quiet were promised a "good rating" by "the decider" in their upcoming DOJ ranking list -- the names given to the Senate for Federal Benches. "not legally controversial" could mean all case law showing it was illegal was ignored; or selectively rewritten, as Addington well did with the Iran-Contra minority report. <"that program was not something that was legally controversial."> could mean: other programs were contentious; but since AG Gonzalez is on the pig-spit this week, we need to pretend we are concerned, even though we are not. The people who said this was "no problem" and were not saying tat it was lawful, just that it wouldn't be a problem to find a judge who they could bribe to not take action. "not legally controversial" does not mean that it was legal; only that the in "someone's mind" (God knows where) their idea of "controversial" is a different definition which does not use controversy. Maybe legal counsel who opposed were _not_ using spears with _poison_ tips, so the spin misters said, "See not controversial, if they ere really upset they would have had nasty poison, the kind that makes Ebola look like a fuzzy kitten." The infamy! How dare they! ______________________________________ don't personally think the fact that they are or are not referring to "this" or "that" or "TSP" or "Not TSP" is the issue: The fact is that there isn't a consistent story, raising the question: What other activity is occurring that may be an NSA-related function, but has been organized to fall _outside_ FISA oversight, but is still illegal under the Constitution: - Roving bands of contractors harassing US citizens; - Temporary detention centers to detain US citizens without warrant or trial; - Use of tax information by JTTF to compel US citizens to explain things that the agents are not able to determine through NSA intercepts - Groups whose sole function is to fill in the gaps in the NSA intercepts, and provide some meat to explain what is going on with something that is unusual, but they don't want the court to know they're looking at . . . again. Recall, the RNC has deleted/destroyed e-mail. If this "other program" were "OK," how does the RNC explain the failure to retain detain related to an ongoing "OK" activity? The question goes back to DOJ, OLC, and outside counsel: < "When you learned of the "other programs" involved with this intelligence activity, did you fear that the information in the RNC accounts would be disclosed; or was there something you learned from the EU -- and CIA visits with the EU -- which prompted the evidence destruction related to rendition, FISA< prisoner abuse, and other things OLC apparently "all agreed" -- in a perverse Yoo-like fashion -- was "lawful". . . (never mind Geneva, FISA< or The Constitutional requirements)." >
Sounds like a law firm which was auditing a company related to various NSA programs and prisoner transfers should have detected this chance of fraud, and internal control problems. Or is a law firm saying, despite attestations to the SEC on those financial statements, that they had "no idea" what was going on, despite counsel's awareness of the activity -- as evidenced by their meeting with the DoD General Counsel's staff on these very issues?
_____________________________________________
My question is:
mo2" How do we know October 2001 was the beginning of the illegal spying program?"
Excellent point: We don't; allegations are that the _illegal_ surveillance started _before_ Sept 2001.
-------------
mo2: "Given that Bush/Rice were warned about al quaeda before Bush was sworn in in 2001, why is it thought that they did absolutely nothing before October 2001?"
Good point again.
mo2:" Because they say so is not good enough."
Right. Getting warmer.
-------------
mo2: Could it be that they did do something, but that something was illegal?
You are correct.
mo2: "And they feel it is better to be called do-nothings than criminals?"
Also, they like the idea people are focusing on the wrong surveillance, wrong time period: The confusion menas they can blame Congress for "not asking teh right questions."
mo2: "Can somebody please provide the link to the testimony that says the TSP started on October 1, 2001?"
Someone said that, you're correct; but TSP isn't necessarily what's being talked about.
- - - - -
THe point is: If the GOP will not convice Gonzalez for lying, then Gonzalez needs to explain why his comments are _true_: - What programs could exist under both the inconsenst statementes of Gonzalez; and also the disparity between what Gonzalez and Mueller are saying.
The GOP Senators canot have it both ways: Sayhing, "AG is telling the truth; but not having any information to support _that_ conclusion.
___________________________________
Posted by: mo2 Date: July 27, 2007 7:50 PM
The problem they have: Not only were they doign illegal things _before_ Sept 2001; those illegal things did _not_ work.
There's no basis for the President to say, "We need to do more of this illegal stuff" as it didn't work before Sept 2001; rather, what's needed is the opposite: "Given we tried ilegal things, and _that_ didn't work, who has some other ideas?"
They can't ask _that_ question because they'll admit: 1. They screwed up 2. They have no clue 3. They're not able to hire someone to help them out
The only option they have is to pretend the problem is one thing; and then solve that "new problem" in a way that appears to solve it. Forget the fact that the problem they may be "sovling" is illusory. They may have defined the program in terms of what _appears_ to be a solveable problem.
IN other words, if they've realized that they can't win, they<'ll [a> redefine the enemy in terms of what Congress can be led to believe is a credilbe threat; and redefine the solution in terms of not solvinga real problem, but in terms of what appers to solve what they've created the impression is the problem.
Problems, solutions, reality, and the illusion may or may not be matching: This may explain why things are not appearing all that straightforward: They're still tring to figure out how they're in power despite their stupidity.
_____________________________________
KNOW THE NATURE OF US GOVERNMENT LEGAL COUNSEL AND WHAT THEY ARE CAPABLE OF DOING
I read this, and thought of the attorneys in DOJ who were saying gum this to death; and what Gonzalez has been saying/doing -- Lying, obstruction: <"Army attorneys sent each other congratulatory e-mails for keeping criminal investigators at bay">
The quote and subject are not as important as the point: US Government legal counsel will obstruct justice, and stupidly document that obstruction: How many of the RNC e-mails would WH-EOP-OVP-DoJ staff counsel have sent back and forth on their progress in blocking review of FISA, Geneva, and other illegal activity; then delete these e-mails when they learned it was on the Libby/Abramoff Grand Jury subpoena list?
Know who you're up against: People who have no remorse over engaging in illegal conduct, and (apparently) hiding evidence related to executions of people who opposite reckless conduct. These are lawyers who are doing this: The very people who supposedly are the "best" and "brightest" in the legal profession: The same people who are put on the Federal Benches. Congress needs to take a wider view of the DOJ Staff misconduct in re FISA, Geneva, rendition, and prisoner abuse.
Doesn't look as through Congress has really woken up to the recklessness in the legal community. Let's get some state level disbarment investigations going; and forward the results to the public so we can throw it back at them during future confirmation hearings.
The lawyers were behind the Watergate break-ins, and the Holocaust. We can't let this happen again, and the lawyers need to be put on a tight leash. They've defied their oath, putting their party and President before the Constitution. That which is not lawfully opposed, will continue; the legal profession, left unleashed, will do what is least expected: Turn the law inside out to justify genocide, war crimes, prisoner abuse, and defiance of their oath and Constitution.
A president does not do this on their own; nor does a Congress -- with lawful options to end it -- have much of a defense when they have powers to investigate, block funding, and compel oversight. The Ranking Members of the Committees have had this power to compel reviews since day one. Doesn't matter that the GOP "controlled" Congress: The DNC has the power to filibuster bills; and could have issued letters to the DoJ-NSA-CIA-DoD IG requesting assistance. There's no merit to any assertion that "nobody was going to do anything" -- how do the Members of Congress explain the effort to _do_ something: Pass proclamations calling for Congress to impeach _despite_ the GOP "controlling" the US Government.
One answer: There is a way to lawfully oppose. There is no merit to any assertion that there is no opting; or that were are stuck with this abuse. There is a way: If Congress will not oppose this abuse; and Congress will not end funding, then there is _someone else_ who can be trusted to assert their oath, and defend the Constitution. Assent to DNC-GOP joint assent to this despotism is unacceptable. It doesn't matter if its unwillingness to impeach, refusal to investigate, inaction on subpoenas, or stupid assent to DoJ-US Atty decisions to do nothing to enforce the law. _Someone else_ can be found who _will_ do their job. Stop listening to excuses of why this "cannot" be done;and _find_ a way to make those who have an oath to _do_ their job: Defend the Constitution, even it means prosecuting the President, VP, Speaker, and House Judiciary Chairman for violating Geneva; and refusing to enforce the Constitution using all lawful options. It is reckless -- this many years after 9-11 and the disclosures of the prisoner abuse and illegal NSA -- for Congress to be still rubber stamping legislation/funding: There are options to end the funding, which the DNC refuses; and there are options to lawfully target legal counsel complicit with this illegal activity.
This isn't about DoJ, FISA, or RNC e-mails, but whether legal counsel -- with that "special position of trust before the court" -- can really be trusted; or whether they need to be overseen, audited, and intruded upon as if they were a branch of government. America's legal counsel have expected too much deference for reckless service; and this many years after the illegal activity has surfaced it is absurd for the American legal community to flaunt "how great it is" or ask anyone to embrace the "American model" when the lawyers have their disastrous results on _their_ hand. Their only solution appears to be to laugh at what they've done to gum things up; never realizing We the People have the option to get them disbarred, and make _them_ the lawful target of war crimes prosecutions. America's lawyers, indeed, did learn the lesson of the Holocaust: How to commit illegal warfare and not get caught. We the People have something to say about that. This is far from over. These are issues of international criminal law with one large defense pool: American legal counsel inside DoJ, OVP, DoD, and outside counsel
They wished this.
- - - -
there were too many shows going on in Afghanistan; they were really not going after AlQueda; and the staged engagements were just a dog and pony show, not really serious about defeating an enemy.]
___________________________________________
Posted by: TheraP Date: July 29, 2007 4:21 PM
TheraP" And ask why the illegal activity is being funded."
TheraP: "And that is a very good question. Why have things been reauthorized over and over?"
- - - -
TheraP: "And what blackmail or bribery or whatever is being used to keep people in line?"
TheraP: "And, where is the paper trail for that?"
- - -
1. There is the option to cut funding: http://rawstory.com/news/2007/Murtha_says_Pentagon_frustrates_Congressional_oversight_0727.html
2. People who have been complicit with Geneva violations -- malfeasance in failing to cut budgets -- like to change the subject.
3. Google: < descriptive summaries NSA 614113 R-2 >
4. Google < JROC NSA >
5. Google < " Under any civilized judicial system he could have been impeached and removed from office or convicted of malfeasance in office on account of the scheming malevolence with which he administered injustice. ">
6. Google <5 USC 3331 malfeasance >
7. Google <32 CFR 2800 Ad Hoc Committees >
8. Google < Statement Accounting standard 74 compliance >
9. Before Sept 2001, NSA had program funding for a lawful NSA surveillance method which fully complied with FISA. JROC is the DoD group which oversees the funding/program authorization; they make decisions: "Is there a _cheaper_ way to do this?" They decided that they had to spend money. Then it was cancelled. Someone made the decision to _cancel_ what is _lawful_; but Congress is making a decision to _keep funding_ what is _illegal_.
10. Evidence is not only what exists; but the _absense_ what what should exist: The Ranking Members of the Committees 2001-2006 had the _option_ to document their concerns; and forward that concern to the DOD-NSA-CIA-DOJ IG.
11. Compliance audits of OVP would have detected the documentation of whether OVP, Addington, and others aware of rendition, NSA survilance were or were not retaining records. The auditors have been blocked.
- - - -
_Q&A_
TP1: See 2, then 11.
TP2: See 1, then 10.
TP3: See 5, then 2.
TP4: See 3, then revisit 2, then 1; then reconsider 7, then link with 8; then reconsider 10.
___________________________________
"But now it makes me wonder if there are any events in the US related to the London bombings?" Posted by: TheraP Date: July 29, 2007 3:11 PM
- - - - 1. Google: <"attorneys sent each other congratulatory e-mails for keeping criminal investigators at bay">
2. Google: < Procurement Guidance Documents Software PGD >
- - - -
3. Consider: RNC offices were attacked in the run up to the 2006 elections.
4. Compare the following A. Location of attacks on RNC offices before the election; B. Point spread of RNC going into the election in those districts.
5. Consider: RNC wrote a note/letter to the unions "complaining" about "unions" attacking the RNC offices.
6. If you could convince someone "your opponent' was engaged in "dirty tricks" would that not convince some of the opposition to rejoin you and denounce "the opposition"?
7. Then consider: Supposedly the RNC 'knew" enough to write a letter to "who was involved"? Why didn't the US Atty's bring prosecutions:
8. The information in the RNC/DoJ offices will show you: A. What basis there was to conclude "the unions" were behind the attacks ; B. The subsequent discussion on prosecutions, or non-prosecutions; C. Which DoJ staff liaison were involved with the campaigns; D. The IP Numbers for the DOJ Staff not involved on processing FISA warrants, but engaged in discussions/non-official business using official government resources.
9. Evidence isn't just what exists, but what is _absent_ but what _should exist_
- - - - - - - _Q&A_
A. Funding, records: What physical evidence was retained of the RNC office destruction; who was assigned; and how was the investigation closed out: Either there is a report, and that report was given to the RNC as the basis for their "letter about the unions"; or there is no evidence, and no basis for the letter.
B. These are issues of criminal law, not just e-mail or voting. That State AG would have to get information from the JTTF to understand what basis there was to conclude that terrorism was _not_ an issue; and who should have been involved with the preliminary review _before_ the RNC issued their letter to the DNC.
C. Link to FISA warrants: The same DoJ Staff computers that were "supposed" to be working with the FISA warrants, are linked with non-official business. How did the RNC get the "fast answer" on what was 'going on' with these attacks; but the AG says that he's "undermanned" and "can't process FISA warrants"?
D. Where is the US Atty review of the evidence related to these attacks on the RNC offices; and how did the US atty go through the process to decline prosecution: Which FBI agents were involved; which State officials were assigned to which fusion center; and how was CIFA involved; were there no NSLs issued to determine who was involved?
E. What is the explanation of the FBI director, and those assigned to the FBI support staff: Do they have no OPR experience; or is there a supervising problem within the FBI; is there any record of any of the FBI agents "involved" with this "investigation" not fully reviewing anything, ever while they were a SAC, ASAC, or assigned to DOJ OPR; what review per SAS74/99 was done of the DOJ OPR/IG/FBI budgets in light of these fraud indicators?
F. When the reports within the FBI of leadership not doing what they should, how was this addressed?
G. Issue: Voting fraud, absent/incomplete investigation files; property destruction. No JTTF concern or prosecutors?
H. JCS and CIFA are also involved with domestic surveillance. What was the DoD General Counsel's involvement with the notifications related to these domestic issues: Was terrorism not on the notification list; was the DOD General counsel not consulted; was DoD General counsel never in receipt of, connected to any briefing given to anyone at the White House related to DoD domestic intelligence gathering efforts?
Someone was briefed: No other explanation for the RNC letter. The question is whether the _appropriate_ investigations, notifications were or were not made: These calls, reports are logged in the correspondence logs; and they are tracked with various messages, workflows, and other assignments. Within Microsoft Outlook, there is a scheduling function: That information is familiar to you via the US Atty e-mail disclosures. Rove's link to Microsoft Outlook is clear; the question is whether the DOJ Staff IP numbers -- commonly linked to outside sites in other states -- were or were not reviewed by the Grand Jury when they examined the third-party-data transfer systems. Recall how quickly legal counsel coordinated on the Libby defense memoranda: They have a file sharing capability; however, Goodlings notifications of "delete this file" means that the auto-notification feature was turned off; or the file sharing system was not being used.
Questions:
A. Which DoJ Small Business Contract personnel were involved with the computer/IT/SW updates related to the DOJ-RNC file transfer systems;
B. Where is a copy of the computer utilization meeting minutes where the pro/con of a file transfer system was discussed; who approved the budget profile within DoJ; and how was this decision coordinated with the RNC;
C. If the file transfer system was in place -- and not subject to any "recent" review (Since 2001), why did Goodling not rely on the auto-notify feature when forwarding the updates to the readers?
D. Where are the e-mail notifications to the DoJ staff related to authorization for them to use, access, and transfer data using this file transfer system; when were the authorizations sent; who ensured the continued use and access to this system was proper; how were non-official uses of this system monitored; were there any efforts by non-DoJ personnel to use this system to transfer non-official records?
______________________________________________
S1: Procedure check sheets: "there must be paper trails of procedures." S2: Investigations: "Procedures for everything! And whether it is investigations that took place (or didn't)" S3: Evidence: "what kinds of paper trails may exist" S4: Storage: "what form they might be stored" S5: Indicators: "what the data suggest was happening" - - - - "Just a tiny example of how one strange event can lead to another - and more evidence of something really strange - and probably illegal going on." - - -- -
Yes. It's all connected: The open source will dance around the illegal information that has been illegally classified.
Google < GAGAS > These are some of the procedures to audit. Google < CFR > These are things that are standards that are audited. Note, an
EO may or may not apply; and a CFR may or may not apply.
Google <38 CFR 2800 > These are the Security classification _procedures_ that the VP must comply related to _classified information_.
Google < Statement Accounting Standard 74 Compliance > This is the standard used to review entities receiving Federal Funds: To review their internal controls.
Google < SAS 99 > These are the fraud indicators used to assess whether auditors should increase or decrease audit scope. More indicators of fraud, trigger more sampling. If there are audit risks, but the auditor does _not_ increase audit scope, that is a problem for the _auditor_ not juts the original _audit target_. - - - -
Recent discussions about whether the President's EO "do or do not apply to OVP" are irrelevant: 38 CFR 2800 _does_. - - - - Google < Manual of Administrative Operations and Procedures > and/or < Manual of Investigative Operations and Guidelines > -- These are the FBI standards.
Google < USAM >
These guidelines show how the prosecutors and investigators find evidence, comply with internal procedures, and do things to enforce the law.
Google < CONGRESSIONAL AND COMMITTEE PROCEDURE; INVESTIGATIONS > These are the guidelines for _Congress_ to meet.
Google < PART 160 DEFENSE ACQUISITION REGULATORY SYSTEM > -- These are some example guidelines of what people are supposed to follow. Auditors are supposed to review these requirements; then do audit/samples to test whether the procedures are or are not being followed.
Once the auditor completes their review, they provide an audit report. The report is sometimes called a report of an "audit engagement". Either the audit report exists or it does not; either management met the requirements, or it did not; either the management developed a plan to correct their problems, or they did not. Once an audit is done, there is required _follow-up to test whether the implemented solutions solve the _original_ problem identified. Either the program/solution is _solving_ the problem or it is not. - - - -
There's also problem the President has: There are mandatory audits which _he_ has to oversee, but the audit target is _outside his control_ This means, that we can test whether the _president's auditors_ were or were not doing their job.
Google < PART 266 AUDITS OF STATE AND LOCAL GOVERNMENTS, INSTITUTIONS OF HIGHER EDUCATION, AND OTHER NONPROFIT INSTITUTIONS >
That is the trap that Congress has laid. By funding these "non-US government entities", what Congress has created are entities which can _observe_ whether the President is or is not overseeing his auditors; and how competent the audits are.
Don't miss the point: Congress is allowed to set up dummy entities not to waste money, but to create _bait_ that the President is _required_ to engage, target, and put under surveillance. The Presidents' problem is that he doesn't know which of the companies are real; or which ones are bait that are direct reporting units to the Congressional staffers.
Anything that the bait detects is then back challenged to Congress: Has the team from the President's office attempted to do something inappropriate; have the audit rules been followed; or have there been unusual interactions suggesting that the President and RNC have attempted to deploy "people not related to the President".
The problem: Once Congress creates this dummy entity, from that point on, all interactions with that entity are from a specific _time_. Congress can then use the President's efforts to interact -- directly or indirectly -- and test:
A. What are the President's method to share information about the upcoming target; B. Who is coordinating; C. And are the President's personnel able to professional respond to unusual situations.
These are part of the _designed_ problems the President is forced to confront. Then, going backwards from the audit, we can examine
1. Which data fields did the President's auditors use, access, and adjust when _preparing_ for the audit; 2. Which records _only related to this dummy audit_ were created; and how were those records updated; and how was the information sent/transmitted/stored 3. Once we let this data sit for a while, and then create the impression that there ha has been illegal activity, what effort do legal counsel, the President, DOJ staff, and others make to destroy that audit data that was _only_ connected to that bogus entity.
This is what has happened with the President right now. He and his auditors have been set up; the records that they've destroyed were based on discrete communications on specific dates and times. Before that information was received, the records were fine; after the data was received, the records were destroyed.
SO we can pinpoint:
1. What the President, DoJ Staff, legal counsel, OVP, EOP, and others were told; how they were told; and the means that the records were stored; 2. The time that the triggering event occurred; 3. Then trace the record holes -- knowing that a credible search would trigger responses related to the known target.
Once those known targets are missing, then we broaden the line of inquiry: A. When did legal counsel review the information, procedures, and conduct an audit; B. Who last had access; C. Who had the responsibility to establish this baseline.
It can't be changed. Either its there; or its not. The President's problem is he doesn't know which of the data sets have been planted; and that doesn't matter: There are known holes that were once linked with information that outside personnel put there _knowing_ they would be removed.
There is a second set of data that can be compared to the existing data set. That second data set is a clean version of all the data. Had the auditors done their job, and the records not been destroyed, the clean/secure version would match the President's version. Again, we don't need t to see any details of how they do things: We only need to plant the data, and let the President put that information where it is supposed to go; then let him destroy it. Then the second/secure data set is presented to the Grand Jury, and the Grand Jury can see the holes; and the _time_ that the holes were created.
That is his problem with the FISA, Prisoner abuse, and the Geneva violations. Discrete information was transmitted; and on specific dates the NSA, NSC, and President were _known_ to believe something that was orchestrated. They've reacted to something they thought was real. Whether it was or was not real is irrelevant. The point is that the data existed; then its missing; and the missing holes are linked with specific lines of data and evidence that only specific people were told.
Those people are linked with specific offices, budgets, computers. It's all been stored, secure, and even if they destroy the records, they have no idea what other things are happening. This has been done using methods the NSA cannot detect. There are Trojan horses inside the NSA systems, WH computers, and other things: They are not viruses, but they are discrete information packages that are organized in unique ways. They're either there, as they're supposed to be; or they've been destroyed.
Part of the answer to this is the Congressional Correspond log. These are the records that show when Members of Congress were notified by letter of certain things. JCS, NSA, WH, and all other departments have the same type of tracking systems. If you noticed on the DOJ e-mails, you may have come across something called a "work flow": These are discrete tasks. Once a person is assigned a task, that is logged; either the log is OK, and has the information; or the log has been tampered with.
Again, once NSC and NSA have been triggered with a known event that will catch their attention, that package of information will get stored. Either it is still there as it should be, and the auditors can locate it; or its not there, because its been tampered with. Once the auditors know which information they're looking for, but that information is gone, then they can tell something about the entities responsiveness; procedural compliance. If its there, fine; but if its missing, then they do a flow charge of the procedures from data collection to data storage. They can tell who accessed it; which personnel had which authorities; and when the information -- known to have been stored -- was removed. That removal is linked with pre-destruction e-mails, guidance, and other memoranda linked with the legal counsel. The problem is when legal counsel also has missing gaps at the same time as the data is missing.
Here's the problem for the President and Congress and outside legal counsel: Once the dummy entity is created, it can be determined who was aware of that information; and the means by which Congress, the President, outside counsel and others coordinated their efforts to retaliate, identify, and discredit those who are involved.
Once the President and/or Congress and/or legal counsel issue a subpoena for something that is _false_; and has been created with the intent to _identify_ the methods the President is using to support illegal activity, that court action is linked to that discrete task. The problem is the legal counsel, Congress, and President have rushed without thinking, and have generated evidence, memoranda, notes, and communications.
The issue isn't what _is_ going one, but is the _line of evidence_ that should be in the Congressional computers, Presidents' files, and the legal counsel records be there? Their problem is they cannot control the records _of their responses, messages, communications, and documentation_ which have been stored _outside their control_. Again, we have two sets of data: The data that should be there if things were going as required; and the remaining data that will have holes.
Once we align the two timelines, the holes will then be traceable to legal counsel communications, presidential notes, conversations, and Member of Congress communications. Don't miss the point: Congress and the President, not just legal counsel, have a problem. There are required stops that all three have taken; and then not acted on. They're stuck. This goes back to 2001. They can't prevent the comparison between what should have happened; vs what their records say happened. The holes are things they can't go back and fill. They're not sure exactly what they were dealing with.
REVIEW
The first line of evidence is in the Congressional correspond logs. These are the notification dates to Congress on FISA violations, illegal activity, prisoner abuse, and other things.
The second lines of evidence is the IG memoranda they get from the ranking Members related to problems.
The third line of evidence is the audit engagement and workflow.
The fourth line of evidence is the audit report of compliance related to that audit engagement.
The fifth line of evidence is the safeguarded information which the President, Congress, and legal counsel have been exposed to and either: Ignored, reacted to, panicked, or did what they were supposed to do.
This information relates to the safeguarded information provided to outside personnel at the EU; and has been transmitted by the CIA to foreign entities.
Then we go down the oath of office, list of malfeasance standards, and start our prosecutions of Members of Congress, the President, VP, legal counsel, DoJ-EOP-OVP legal staff. They're stuck. This isn't just a data retention problem, this is related to allegations of war crimes, malfeasance.
Small tiny problem: It's July 2007, sixteen <16> months before the 2008 election. Congress, the President, and legal counsel know they are stuck. Normally, they have the advantage on their side: They can find a scapegoat, and agree to pin the problem on them; this time -- they are the problem, and they can't bury this.
All the notifications to Congress are documented; legislative immunity falls apart; and their defenses fall away when we look at what they did; then compare it with what they should have done per 5 USC 3331, their oath of office. We need only look at the FISA violations -- as reported publicly -- then compare that with the open information -- of that illegal activity -- and contrast that with the votes: They, knowing there was a problem with illegal activity, continued to fund and spend money on things that violated the Constitution. Nobody made them. they freely chose to do this; despite knowing of that illegal activity, they did not -- as they had the power to do -- either document their concerns with the IGS or US Atty; nor did they remove themselves from the votes to pay for what they should have known was not lawful.
_Your Points_
S1: Procedure check sheets: "there must be paper trails of procedures." -- Yes, and these are not classified. They are open records. Auditors' compliance testing is also public evidence.
S2: Investigations: < "Procedures for everything! And whether it is investigations that took place (or didn't)" > Indeed.
S3: Evidence: < "what kinds of paper trails may exist" > Right again. Not complicated.
S4: Storage: < "what form they might be stored" > Right, and there are standards not only for the way the data is stored; but also the physical infrastructure used: Not just information, but security of that IT hardware that comes up with a 32 CFR 2800 audit.
S5: Indicators: < "what the data suggest was happening" > Right, all we have to do is ook at the holes. The bigger the hole, the bigger the problem _they_ have. The key is the timeline: What happened; what was their _known_ response; and then what is missing _despite_ their procedures to follow when notified of that event/information.
Evidence is not needed proving that they didn't do their job; the fact that there are holes this big, and no correction, but continued funding is enough. Take your pick: This is all over the place. You have to decide your deadline to make this decision; and when you want to stop. _That's_ the concern: It appears people are spending so much time digging through this evidence, that they're missing the big picture: Each line of evidence isn't telling us new information: It's part of the same kettle of fish: Malfeasance in re FISA violations, prisoner abuse, rendition, war crimes, and oath of office.
Time to engage with the State AGs. All fifty <50> of them, and bring in the Certified Fraud Examiners, Auditors, and some people who have some inclination of the prosecution possible against the Members of Congress, president, VP, and legal counsel in OVP, DoJ, EOP, and outside legal counsel. We don't need more evidence; we need some public trials, indictments, prosecutions, legal counsel disbarments, and jail time. The oath wasn't enough to inspire them.
_______________________________________
Posted by: The Oracle Date: July 29, 2007 9:59 PM
You are correct. They use a system of intermediaries who process the FISA warrants. They're also located overseas.
Also, think broadly when you See the word "data mining" What could someone be induced to believe was "lawful"? If a "computer" does the "mining" does that mean a "person" isn't violating the Constitution? Someone's argued that.
The problem is fiduciary duty; and responsibility. Someone had to write the software; and that software was written with the intent it do something; then someone has to audit that software to ensure it meets the requirements. That auditor is supposed to review:
A. What are the legal requirements, restrictions; B. What is this software doing; C. Are there any problems D. Has the certification of that legal compliance been tested independently?
Oversight means overseeing, not pointing to confusion, and hoping it remains hidden behind a secret briefing. Either it's explained in plain English; or it is not. The problem is when FISA violations are rubber stamped on the basis of gobbly goop.
The Constitution is very simple and clear. All that is required is that you comply with it. When you ignore it, then you have a problem: The "excuses to ignore" these simple rules, then become the same excuse to ignore planning, leadership, oversight, backups, training, and audits. Then we have Katrina, botched operations in Afghanistan, and a President that has to be fed lines because he can't think on his feet. We need real leadership, not what we have.
____________________________________________
So that's why they had to classify everything!!!" Posted by: TheraP Date: July 29, 2007 10:52 PM - - - - Google < ORCON Executive Order corruption > - - - Yes, and there's a rule about that as well: ORCON, it's illegal go classify evidence of illegal activity.
Which takes us back to the dispute over Cheney's assertion that "that" EO "didn't apply." The "EO that did or didn't apply" contains the rules on ORCON. It doesn't matter whether the "_EO_" did or didn't apply, the _32 CFR 2800_ does apply: It has OVP name on it. It can be enforced through prosecutions; and that CFR _does_ list EOs which _do_ apply.
Whether the _standards listed_ does or does not apply is meaningless; the issue is whether the _requirement_ regardless which standard is used, ignored, or explained away is _legally enforceable_. Arguing over which EO does or doesn't apply is a distraction from the ORCON requirements which prohibit classification of that data; and the data which _must_ be protected per the applicable CFR: 38 CFR 2800. - - - - This takes us back to the RNC e-mails. Recall, the White Hose legal counsel did something very stupid: 1. Determined that the information would be protected by privilege 2. Created an illegal backup database 3. Destroyed that database
Here's the problem, and why we know legal counsel was involved: Once someone assumes a database will "never" see the light of day; they have a choice: Do they talk candidly; or do they use that "to be forever hidden" database to hide illegal activity?
Here's how we know something very important: Once the evidence of illegal activity was _known_ to be revealed; and that _claims_ of executive privilege would _fail_, then they had a problem: The backup e-mail could be detected; and the _existence_ and content of that backup e-mail could be breached. In other words, one does not destroy evidence in the RNC e-mails unless they believe that privilege would fail; but then contradict themselves and say, "But we have executive privilege". That defies reason. Again, if the _expectation_ of privilege -- going forward from time of creation -- were real, then there would have been no reason to have a backup systems; no reason to have an e-mail system that violated the law; and no reason to _destroy_ the very thing that would "forever" enjoy a shield of privilege. - - -
Rule: Privilege isn't a power: It's a _claim_ that the _court_ doe snot have to recognize. If a claim of privilege has been abused; or adverse inferences _about missing data_ suggest that the evidence was _illegally destroyed_, the claim of privilege is one that the court is _not required_ to recognize. A defendant can do things that will make the claim meaningless, without effect, or irrelevant: By disclosing that information in an e-mail, as Miers did with the DoJ e-mail. Executive privilege isn't something the _court_ is required to recognize. It can be claimed, asserted, and demanded as a "right" but that's meaningless: It is a _court recognized_ claim that the court -- for whatever reason it chooses -- can refuse.
The key is for the Grand Jury to know: It can decide that the _claim_ of privilege was not real; and that it was _not_ reasonable for legal counsel to believe that the claim of privilege was bonafide. In other words, going forward from the time that the e-mail was created, and the fact that that "supposedly privileged e-mail was destroyed" wold _undermine_ confidence that counsel _really_ believed that the evidence was privileged or protected. Again, it makes no sense for counsel to argue "but it's privilege" _while_ that supposed "stuff which would never see the light of day" is destroyed.
This then translates into whether legal counsel's _assertions_ to the grand jury about what they _believed_ was privileged are true; or whether the legal counsel has _retroactively_ asserted something which is not supported by the subsequent actions. Namely, once legal counsel says -- in hindsight -- we "believed' our actions were lawful, they key point is: That is a _dubious belief_ and a _dubious assertion of what was a belief_ because of the subsequent destruction of information that was supposedly going to be shielded.
In so many words, the problem legal counsel has is that their "assertion of a belief" about that evidence and legality of that data archiving method gets called into question: And forms _for the Grand Jury_ a reasonable basis to impeach that legal counsel as a witness. This means that the Grand Jury says, "We do not believe this witness"; whether they want to investigate that legal counsel further over that dubious claim is what the Libby Grand Jury did. - - -
In other words, going back to our discrete events, RNC legal counsel and WH Counsel established that illegal database and e-mail system; but _then_ were alerted to questions about that content; but then worried that their _claim_ of executive privilege would fail.
This is linked to the Grand Jury subpoenas in re Libby and Ashcroft. Once the evidence destruction _time_ is known, we can pinpoint _what_ they were responding to. Again, if the privilege claims were bonafide -- that the WH counsel "believed" the documents were privileged -- they wold not have a reason to set up any backup system; or destroy the very thing that was supposed to be shielded.
The key is subtle: _When_ did WH counsel suddenly get religion and realize, "Our dubious belief that this claim of privilege would prevail isn't going to work; someones told them what is here; we can't hide this behind privilege; we have to destroy this."
The only people who cold understand what data there was; where it was located; how it was crated; and the assumptions they had relative to executive privilege were the people who made the rules, did the vetting for the documents, and knew the rules of privilege.
At some point _after_ the Grand Jury subpoena landed, WH counsel had two paths they attempted to go down at the same time: First, their legal/public position of asserting privileged; but second, the private path of comparing which documents would most likely be admissible, and not survive the claim of privilege, and had to be destroyed.
Someone did a comparison _after_ the Subpoena landed, but moved quickly enough to sort through the data, and get rid of the things that had _previously_ been retained. In other words, someone convinced themselves -- after a first look -- that the documents would be protected; but then something changed. - - - - - - - - - - - - - - - - - -
Timeline: (Time from left to right)
There are seven milestones: < A-G > < > --<1> -- X ---<2> ---- 0 -----<3> ------- D A. < > Origination of data B. C. X First visit/review D. E. 0 Subpoenas land F. G. D Destruction - - - - - - - - - - - - - - - - ---
The time line is simple: After first creation point < >, A , there is a timeline of data; that was not tampered with _for some time_ , B; then, they had a problem, looked at the data , but decided to do nothing , D; then they had a real problem : Ooops, we aren't going to be able to hide this , F; then the destruction orders went out .
Each of those points is discrete; and things were kept; and other things were not kept; things were reviewed; and there were discussions inside the RNC and WH Counsel's office.
Again, we're not talking about conversations that are privilege, but the WH Counsel's office discussions about the _problematic data_: That discussion is different, and not protected. That's what the outside legal counsel has a problem with right now: They were the ones who knew the standards; did the audit; and came back with certifications.
Either they found problems and documented them; or they didn't find the problems and left them alone. Their problem: They don't know which data was deliberately placed in the WH Datasets, and sent through the RNC e-mails with the intent that it be _destroyed_: It would create a hole for the auditors to ask: "Why isn't this here?" RNC doesn't know what was test data; and which was real data. They can't tell the difference. Someone else does. Not them.
The problem they have is that they didn't realize what was happening _while_ it happened. Again, this isn't just in the WH, but all over the place. and not just in the President's office, but OSC, DoJ, EOP, OVP, NSA, NSC, and Congress. They have no control over the baseline data which has been captured, and remains secure outside their control. They're being led to believe the data -- including all backups -- has been totally destroyed. Now they realize they have a problem.
But it's worse than they imagined. CIA transferred data to the EU: This is connected with the NSA intercepts of the war crimes; confirming the timing of the notifications to the White House; and explaining the timelines of the destruction actions. Add in the Libby and Abramoff investigations and destruction, and the President has another problem: Too many discrete events that the RNC is _responding to_; and too many holes that are only linked with concerns about _discrete events_.
The destruction wasn't random, but related to awareness by WH counsel that their original delusions weren't going to prevail. That's the key: It only takes one link between notification, and subsequent destruction for the WH Counsel to hang themselves. It's already happened. Multiple Times. Take your pick:
A. Conversations over whether to transfer prisoners after disclosure of Eastern European prisoner abuses; B. Whether to, after the Supreme Court ruled against them, to move the prisoners; C. Coordination with members of Congress to start investigation of the _leaks_, despite the President knowing for one year that the NYT had been looking at things. Surely if the President was "concerned" about leaks, he wouldn't talk tot he NYT to confirm or Deny anything,b but would have -- without talking to the NYT -- order an investigation.
But the silly President got it backwards: Ordered the investigation _publicly_ _after_ the NYT disclosed what was a "big secret".
The key is simple: hat should have been happening; and what _did_ happen; what should counsel have been doing, but what _were_ they doing. They want us to believe X, but reality best supports something other than X.
The timelines don't match. The GOP-Rove, and RNC have attempted to create a separate timeline that does not match what the CIA and EU know to be true about rendition, notification, and prisoner abuse. These are war crimes; and that evidence destruction relates to _war crimes prosecution obstruction_. This isn't about RNC e-mails, but about _war crimes evidence_.
The FISA violations aren't about the law, they're about _transferring_ data for illegal objectives, including the support of illegal war crimes, prisoner abuse, and other breaches of Geneva. AG Gonzalez doesn't care about FISA violations because his _real_ concern are the war crimes which the CIA has confirmed to the EU.
Keep in mind who you're dealing with: Legal counsel who believe they are generals, but have failed in military campaigns. Their idea of "winning" is to block enforcement of the law and hiding evidence of _their complicity_ with war crimes. The think they are above the law. They're not. The holes tell us something else.
____________________________________
To those who are asking for views/comments/reactions, I would encourage you to take a large perspective on this Gonzalez situation. I'm going to point you to something that may not seem related, but with time you'll see there is something to this. 1 Enter at URL < http://mpuc.informe.org/easyfile/easyweb.php?func=easyweb_query >
2. At the second block, "Case ID" -- Enter this number < 2006274 >
The case file you are looking at is the backup information and messages related to the Maine Power Utility Lawsuit against Verizon. This relates to the recent ruling that the state AG's of Vermont, Maine, Missouri, and New Jersey can proceed with the litigation on re NSA at the _state_ level. Recall DoJ threatened to sue the state AGs to dissuade them from taking action, in re Honorable Vaughn R. Walker.
There are some important things to notice in the casefile: If you go through the records, as you have with the DOJ E-mail dumps you're going to see some interesting things.
* Disclosed Verizon E-mail Addresses Link To NSA, FISA Intermediaries
Recall, one of the problems has been the missing RNC e-mails. There's an answer to the missing holes. Inside the Maine PUC file for the Verizon, are their e-mail addresses for their internal e-mails. These were not supposed to have been disclosed; but one of the counsel's memoranda lists an e-mail for the internal system. To make a long story short, once you index the e-mails for the Verizon internal e-mail system, you can then use open source information to cross-index with the outside NSA-FISA intermediaries: One of them is AMDOCS. Within the Verizon e-mail is also open disclosure of the Verizon General Counsel request for and receipt of information related to specific legal questions related to various litigation issues of interest to the FISA-NSA surveillance.
In court, once something has been disclosed, that cannot be hidden. In light of the Gonzalez testimony on FISA, and the Verizon GC disclosures, plus the knowledge that Verizon does have this internal e-mail system, I would encourage a broad view: There is an overlap between the WH, RNC, Verizon, DoJ on the FISA through the AMDCOS-intermediary link within the Verizon e-mail.
ALso, you will notice that the Verizon GC initially _failed to deny_ (very important) something that they later _changed their position_ (also important) on whether the NSA did or did not have "access" to their systems/facilities. Verizon is also linked through the NSA with one of its certified fiber optic test centers; and this NSA contractor appears on the JROC funding/operational documents within the pentagon; and is also listed on classified documents related to testing, performance, and other things.
The point is simple: The MAINE PUC data set on this case -- like the DOJ Staff e-mails -- is a gold mine of information related to the very things the DOJ and President are refusing to provide to Congress on the ground of privilege. As a heads up to the Verizon e-mails in the PUC data, they're somewhat clunky to link to. I would encourage you to reference them not by links, but by the _date_ of the file.
Here are my suggestions:
1. In light of the FISA-DoJ-US Atty-DoJ Staff e-mail lessons (thinks that are surfacing, or disclosures by the General counsel), look through the documents.
2. Make a records of any Verizon e-mail reference; and then do a cross index with all NSA contractors, intermediaries, and RNC business units linked with the White House IT department. You will be able to see that the White House-RNC e-mail connection on the RNC e0-mails is also something that traces from the WH to the RNC IT then into the Verizon e-mail system: The common link will be the companies names listed on the Verizon BCC copies.
3. Note closely the comments of the Verizon General Counsel immediately after they were asked questions: They have said some things about NSA access.
4. Then, you want to compare the nature, and terms of the Verizon contract with the various media-messaging firms within the GOP-WH-DOJ that are linked with AT&T. One of the names that may appear is Fleishman Hilliard. This firm's name is one that has been linked with AT&T, and could very well have a contract that permits it to get the stripped down versions of the NSA intercept data; and which they use to develop some sort of media messages. The speculation is that the Gonzalez testimony about "this program" or "that program" relates to the method by which NSA data is stripped of identifying information; and how this non-specific information is then transferred possibly through an Intermediary to a firm associated with DoJ and DoD. As you dig into the Fleishman Hilliard Contracts, you Will find a common contract number that crosses multiple Presidential programs and appropriations -- DoJ, DHS, DoD. The contract numbers are essentially the same.
Your job should be to consider the Gonzalez testimony and WH efforts to claim privilege as a _subset_ effort to shield attention from the open source information that can be back doored into the WH, DoJ, and DOD. IN other words, the WH, DoJ, and AG are screaming, "You can't come in this door," and apparently hoping you don't realize that the stuff they're hiding, and the WH connection, isn't noticed through the Maine PUC data. I'll leave it up to you to independently conclude whether the link is real; or whether the data supports something else.
To review, the Maine PUC data affirmatively links Verizon e-mail with a FISA intermediary; Verizon General counsel disclosures outside the firm; and to WH IT entities that have been liked with the NSA Fiber optic testing facilities and NSA budgeting documents held at the JROC level. Also within the data set is information suggesting that the DOJ Staff counsel -- after the Verizon GC commented in writing -- did intervene behind the scenes to provide a copy of WH EOP/OVP/OLC legal positions on issues of privilege.
It would appear, given the disclosures, change in position, and the link between Verizon and the NSA -- through their openly available documents -- that the Congress has the basis to subpoena those who are familiar with the DoJ OLC-Verizon GC coordination related to the media inquiry. Because the Verizon GC has changed their position, this forms the basis to ask about what they have disclosed. Further, once the Walker Court ruled the State AGs could proceed with the litigation, we need to look at the DoJ Staff counsel "threats" against State AGs and determine whether this was an improper use of DOJ resources, an illegal threat of prosecution, or other actionable conduct per DC Bar Rules.
Also consider the Vaughn Court finding: That the States are not required to assent to the Federal law; and that the states are not behold to follow the lead of Congress, DoJ, or the President when the Federal Government is not protecting the state citizens' rights. This is important when planning the State AG prosecutions of the President, VP, and Members of congress: State AGs do have standing, and the inaction of Congress on these matters does not mean the State AGs are forced into inaction.
The point is simple: If the Congress and DoJ-WH Counsel_President get into a tug of war, and protracted litigation over the RNC e0-mails, remember there are NSA contractors who, with the right financial leverage applied to them, can be inducted to disclose more of what they've already disclosed. Congress has the power of the purse: The Congress can say to the President, AG, and NSA contractors: WE know about your internal e-mails; we've got open records linking the WH with the NSA contractors on this n arrow issue of FISA warrants; and we also have the contract numbers of the Media messaging firm. Either you give us the documents we are asking for, or we in Congress -- like Murtha did -- will zero-out the budgets for those contractor facilities, test ranges, system program offices, and other activities which the NSA contractors are currently working under. If you want your money, give us the information; no information means no money -- but the litigation will continue.
In other words, don't let the WH-President make you believe that you have to play nice "while the RNC-WH Counsel" waste your time in court arguing over privilege. You have leverage _right now_ to go to the Joint staff and say: We want the information by Close of business today; if you don't get it, your budgets are going to get zeroed out, just like Murtha did with the congressional liaison. Then the NSA contractors will have to decide whether they're going to want to go through termination negotiations, and lose funding; or whether they're going to turn over the evidence linked with these disclosed Verizon documents. Don't wait for congress and the DOJ to agree: Press now for the Congress to cut the budget first; then tell the WH to provide the information, or the litigation will continue, and he has no prospect of getting that money returned. Time to remind the President: If he refuses to cooperate, hes' going to get no money; and the Congress is fully prepared to litigate. The money gets taken first.
All information you glean is then then admissible to the State AGs as the prepare to prosecute the Members of Congress, contractors, President, VP, and legal counsel for their alleged complicity with, and refusal to prevent FISA violations, war crimes, prisoner abuse, rendition, and other illegal activity. As you collect the responses, keep in mind you'll want to organize it so the Grand Jury can understand what happened first; and they can see the inconsistent statements between the contracts; the e-mail responses before DOJ intervened; the e-mails after DoJ intervened; and the subsequent response to you, Congress, or the media on this subject. As stated above, the problem the President, DOJ, and the NSA have is that they're stuck with the original lines of evidence that have been captured, retained, and stored outside their control.
______________________________________
Posted by: Anna S. Date: July 30, 2007 1:57 AM
Your points about ICC are well taken; indeed, this is one of the concerns I have: That the apparent "lack of US interest" in a legal issues is "precedent" to do nothing, as Pelosi has done with impeachment. However, there appear to be at least six <6> reasons why war crimes appeared to be a real concern inside the White House:
1. Language In the MCA language was specific language authorizing US govt funds to defend US personnel before any tribunal. It appears someone in DoJ OLC worked with the WH-EOP-OVP to insert this language into the MCA. They appear to be concerned.
2. Absurd: Destroying "Privileged" Information Further, given the disconnected between claiming that they "believed" the information would be privileged; yet destruction of that supposed "p 3. Change in Position War crimes appears to have been a _concern_ as evidenced by the movement of personnel from Eastern Europe to Guantanamo. Previously, one of the reasons to "not move" the prisoners was Addington's positions that if they _did_ change position, that would be an admission the original treatment was illegal.
4. US Code The US is a signatory to Geneva, and the laws of war do apply. Regardless the US involvement with the ICC, the US itself must enforce Geneva. It appears _despite_ the US non involvement with ICC, someone introduced the language, and moved the prisoners.
5. Supreme Court Rules Against Bush Despite Roberts and Alito on the high court, they decided to agree that Geneva was a "good" thing to follow. Even a Bush loyalists refused to defy Geneva, openly the way to prisoner of war status; and litigation against the US government for abuses.
6. EU and CIA Conversations, Litigation CIA personnel have disclosed information to the EU, prompting the President and Congress to not go after the war crimes, but to "target the lakers". It also appears the US Grand Jury, legal counsel, and others have taken a particular concern with the war crimes issues. Italy and Germany are litigating these issues on rendition.
________________________________
FOCUSING ON VERIZON GC COMMENTS _BEFORE_ DOJ STAFF COORDINATED ON FISA RESPONSES
1. Sample file
When you look at the MPUC file, you'll want to go to the first records, at the end of the file. The date you want to look for is May 2006. Currently, this file is at the _end_ on page 9; if the future, as more documents are added at the beginning, this last page will increase.
Today, the last page is page 9 of the file. Look for this file, and open it: which has this information on the line : - Col_2: Date: 05/08/2006 - Col_4: DocTYpe: Initial Filing - Col_12: Name: Cowie
You'll see two files, click on the one that is 58 pages, the top row; pdf file is on the left. Click that icon. The file we're focusing on is 58 pages long.
- - - - -
2. Arena
Scroll to the end, page 58: You'll see a name: The Verizon GC name listed is "Arena", the one who isn't the primary Verizon GC: Here's your first connection with the FISA: "Arena" is a former DoJ Type; and has been linked with the intermediaries; and his name is linked with the same AT&T-conference attendees in re NSA-JTTF-FISA intermediaries for processing warrants.
- Play with the phone numbers in the DC Madam list. Just for fun.
- - - - -
3. Verizon Internal E-mail Format Disclosed
Go to page 56 of 58: This is the funny part: Look at the e-mails: That is a unique Verizon internal e-mail format that can be cross indexed within the RNC and WH e-mail systems to get some hits; as well as with DoJ, DoD, NSA, and outside legal counsel. This is the third party data transfer system we've been talking about. . . someone said it was "impossible" -- sorry, there it is. That e-mail is linked with an IP number; which is then cross indexed with various US government computers in other databases. Ooops! Funny, weren't those DOJ Staff supposed to be processing warrants not using their computers for unofficial things?
The format also includes the CITY where the Particular verizon emloyee is assigned. YOu'll have to review how the employee transfers related to changes or no changes in designations.
Here's the neat thing: Verizon in that e-mail on page 56 has an EMPL format: That means "employee": Verizon General counsel has foolish in disclosing their e-mail outside their office; also Verizon _contractors_ have another formatted code. If you play with this format, you're going to see the open records, and you can eventually find which Verizon employees have been sharing information with the FISA intermediaries.
- - - -
4. Out of court Inconsistent statements
YOu want to comare what Arena first said to Cowie with all subsequent Verizon-Gonzalez statements. The short version: What Arena said doesn't later match with the DoJ "version" of spin, subsequent sent through the Verizon GC.
- - - - -
5. Subpoenas of Verizon E-mail senders/recivers
Page 54 has an e-mail, and you can find others. The point is that, as with the RNC e-mails in the DOJ Staff dump to the Congress, Verizon has disclosed that there is a _contractor_ e-mail system which -- with their own records -- links them to the FISA intermediaries. This means that those working with the JTTF, NSLs, and the DoJ FISA processing warrants' system have to explain why their computers and e-mails include the Verizon notes in them. Congress needs to go to the DOJ and say, "OK, we know about these e-mails; and can link them to the FISA; let's see the DOJ, NSA, DOJ, and WH/OVP e-mails sent to coordinate the Verizon responses which _contradict_ Arena's first statements.
- Why did the DOJ's later responses adjust what Arena first said?
DoJ, OVP, EOP, RNC, and Verizon are stuck: The e-mails have been disclosed; and the link between Verizon and the NSA fiber optic testing center matches the NSA budgeting documents at the JROC, which are disclosed through an executive order. No wonder they OVP said they didn't apply: "We don't want you to look there."
- - - - - -
6. COnnections to FISA, NSA, and White House
Bottom line: The RNC e-mails can be cross indexed with the holes within the Verizon e-mails system: And any of the US government e-mails sent to these Verizon addresses can be requested. We know there was coordination because the DOJ and Verizon openly confirmed their cooperation; but this isn't "provided" because it relates to an inconsistent statement by the Verizon counsel: Did NSA and Verizon have an agreement; and why did the first response of "may" have given access not match the later "refuse to comment"?
The answer is the same as what Berenson was saying about Rendition: First he commented on PBS; then it went to "can nether conform nor deny.," IT appears WH Counsel, DoJ Staff, OLC and Sidley Austin-Verizon changed their position. That is admissible: There would have been a meeting, agreement, or communication to go from the original position to the second one. Where documents have been destroyed, or not provided, adverse inferences may be made.
- - - - -
7. Where to find the baseilne data to check for RNC and Verizon Email Destruction/Holes
The key will be to find any verizon e-mails sent _oustide_ the US government, use those as a baseline; then look in teh verizon archives to see if any of those sent e-mails -- unrelated to the nSA-DoJ -- have also been destroyed/removed. Verizon has no clue where else these are being stored right now. Yes, the files were sent; but who knows about those files; and who has forwarded them to the Grand Jury, TPM, and Congress?
_____________________________________
Wow! He/she responded to my post:
Anon, I think I love you. Your posts are a thing of beauty. :D Posted by: Oilwellian Date: July 31, 2007 2:50 PM
Posted by: Oilwellian Date: July 31, 2007 2:50 PM
Remember, this information is open. Anyone can do this. The key is to notice the leverage We the People have on Congress, the President, and US government.
Time for them to join We the People with the Constitution. Now, not "next election". Today. Need actions and results; not excuses or hand waving.
Without action and results, We the People can discuss alternatives: State AG prosecutions of the VP, and President oustide Congress and outside impeachment; and methods to ensure the oath of office means something and is asserted by all Members of Congress, US government officials and legal counsel.
There is a way.
_____________________________ Whew!
|