Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

CLUES? - Bushco Already Caught? - Is This "Mystery Poster" Another "DeepThroat"?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:05 PM
Original message
CLUES? - Bushco Already Caught? - Is This "Mystery Poster" Another "DeepThroat"?
Edited on Tue Jul-31-07 01:50 PM by kpete
The depth of knowledge is stunning…this is really incredible reading guys, go there and spend some time


kpete: way too much for me to understand - but a feeling (strong) that this guy/gal KNOWS!!! I had heard mention of this poster in other places but #148 at http://www.firedoglake.com/2007/07/31/choose-not-to-hate/ points the way...let me know what you think



Is this mystery poster another “deepthroat”?

Go to the comments and follow the “mystery poster” anonymous postings - especially toward the end of the comments….

O.M.G. It is long, detailed and complicated with back-up links, but it sure looks like Bushco is caught.
wow, that is great stuff

it took me a while to find the “mystery” poster

those are the posts with no name so if you do a controll=f and type in “mystery” you’re not gonna get what you’re looking for, you just have to search for his (her) posts

that is terrific stuff there

GO HERE (look for the posts with NO NAME):
http://www.tpmmuckraker.com/archives/003805.php
Printer Friendly | Permalink |  | Top
NashVegas Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:08 PM
Response to Original message
1. I Thought It Was Real Interesting
That Mueller refused to be specific in confirming the warrantless wiretapping program that was known to us.
Printer Friendly | Permalink |  | Top
 
The Stranger Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:25 PM
Response to Reply #1
9. That was PRECISELY the follow-up question that appeared in my mind:

"Is there ANOTHER PROGRAM other than the one to which we are referring?"

Printer Friendly | Permalink |  | Top
 
AwakeAtLast Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:33 PM
Response to Reply #9
34. Don't we already know in the back of our minds that there are?
I know that we don't have proof, but I think the known existence of one means there have to be at least a few others not known.

Sorry to rain on the parade. :hide:
Printer Friendly | Permalink |  | Top
 
Starfury Donating Member (615 posts) Send PM | Profile | Ignore Tue Jul-31-07 08:28 PM
Response to Reply #34
129. Secret programs are like cockroaches
Whenever you see one, you know there are dozens more hiding in the walls.
Printer Friendly | Permalink |  | Top
 
AwakeAtLast Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:36 AM
Response to Reply #129
220. That's what frightens me.
:scared:
Printer Friendly | Permalink |  | Top
 
babylonsister Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:11 PM
Response to Original message
2. I need to bookmark this-very mysterious! nt
Printer Friendly | Permalink |  | Top
 
liberalnurse Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:47 PM
Response to Reply #2
281. OMG I sure did!
This is why DU is so important to me....O8)
Printer Friendly | Permalink |  | Top
 
OnceUponTimeOnTheNet Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:11 PM
Response to Original message
3. K&R look for the posts w/ no name later.
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:13 PM
Response to Original message
4. You mean an unauthorized wiretapping surveillance program(s) don't you ?
Printer Friendly | Permalink |  | Top
 
NashVegas Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:14 PM
Response to Original message
5. Ooh - OOH! SEX SCANDAL TIE-IN!
"2. Arena

Scroll to the end, page 58: You'll see a name: The Verizon GC name listed is "Arena", the one who isn't the primary Verizon GC: Here's your first connection with the FISA: "Arena" is a former DoJ Type; and has been linked with the intermediaries; and his name is linked with the same AT&T-conference attendees in re NSA-JTTF-FISA intermediaries for processing warrants.

Play with the phone numbers in the DC Madam list. Just for fun."
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:23 PM
Response to Reply #5
7. Again I must repeat were these programs 'authorized' ?
As in why did Card and Gonzo go post haste to AG Ashcroft's bedside ? Comey didn't authorized and neither did Ashcroft.

I'm left scratching my head over this one, aren't you ?
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:25 PM
Response to Reply #7
8. they were not authorized
they were NOT legal

that is why - they can NEVER let us see the evidence
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:30 PM
Response to Reply #8
11. Damn, you spoiled the surprise. Now if only the media would bring this up....
FAT CHANCE ! That's why you read about it here and not on the front pages...M$M isn't under our control.
Printer Friendly | Permalink |  | Top
 
Rosa Luxemburg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:09 PM
Response to Reply #11
84. yes MSM is under the Thought Police control
Printer Friendly | Permalink |  | Top
 
WinkyDink Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:33 PM
Response to Reply #8
59. I wonder if even the Democratic Congress is terrified of letting us know.
Printer Friendly | Permalink |  | Top
 
jgraz Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:35 PM
Response to Reply #8
103. Also because of who they were spying on
Anybody doubt that most of the spying targets had (D) after their names?

Printer Friendly | Permalink |  | Top
 
sybylla Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:22 AM
Response to Reply #103
218. There was an interest in possible spying on my congresscritter
back in 2002 or 2003. It was in the paper, even, that his office phones in-state had been monitored. Unfortunately, I don't remember all the details and I don't think I can find the article anymore.

But, the interesting part comes in 2006 when, in conversation with him and his wife at a fundraiser, I mentioned the monitoring quite flippantly in conversation, much as one likes to remind Russ Feingold to stay off small planes. His wife's face went pale and he looked like a man who had been caught cheating on his wife. Apparently, she knew nothing about it and even more apparently he knew lots. I think our congresscritters know far more about these suspected secret surveillance programs than they generally let on.

Might explain why they are so obviously overcautious in going after the administration.
Printer Friendly | Permalink |  | Top
 
Ladyhawk Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:53 PM
Response to Reply #218
284. It would be best for America for politicians of conscience (oxymoron?) to come clean.
Edited on Wed Aug-01-07 12:55 PM by Ladyhawk
Might explain why they are so obviously overcautious in going after the administration.


My feeling is that our government is completely corrupt, through and through. Some of the Dems are in bed with the bushies and others are possibly being blackmailed because the bushies have the goods on them. The same may apply to any Republicans that may entertain notions of getting uppity.

If these people care at all about our country and the world, they will come clean about their involvement and let everything be known. If what they did is unforgivable, they need to accept the consequences...even if it means taking a long walk off a short pier at some point.

They got all of us into this mess. Only coming clean will help fix it.

Printer Friendly | Permalink |  | Top
 
Qutzupalotl Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:10 PM
Response to Reply #7
26. I gather that the programs were modified to bring them into
some sort of compliance, and with these changes they were approved. Which really is a tacit admission that they initially were breaking the law.

"Oops, my bad."
Printer Friendly | Permalink |  | Top
 
dflprincess Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:57 PM
Response to Reply #5
121. A sex scandal? - Maybe the MSM will cover it all then
n/t
Printer Friendly | Permalink |  | Top
 
dipsydoodle Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:20 PM
Response to Original message
6. Don't forget
You read it here first.B-)
Printer Friendly | Permalink |  | Top
 
speedoo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:29 PM
Response to Original message
10. K&R nt
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:34 PM
Response to Original message
12. The anonymous poster is also posting on CREW:
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:19 PM
Response to Reply #12
159. This anonymous post concerned Susan Ralston:
E-mail isn't the Only Evidence
Submitted by Anonymous on 20 June 2007 - 5:30pm.
Please encourage Congress to review the online collabortaive file sharing programs used outside e-mail to share views between DoJ, EOP, and outside counsel.

One such tool is SharePoint linked with Miscrosoft Outlook, which the US government uses, and consistent with the C:drive file format of Rove's computer.

» reply
Details: Discussion of Online Collaborative Tools
Submitted by Anonymous on 20 June 2007 - 5:37pm.
The Following is an opinion, not statement of fact nor accusation of criminal activity. These views may not necessarily represent the views of CREW, its officers, or anyone associated with this website.
We disagree with the NYT emphasis on e-mails. Based on Ralston's denial, it appears there is something else going on.

Question: Karl Rove didn't discuss this claim with you?
: No.
Mr. Berenson . Do you want to clarify that last answer?
Ralston. I don't recall. I don't have a recollection of anyone discussing with me specifically that claim.

Ralson leaves open the possibility that the GOP and WH-EOP have an online collaborative file sharing program such as SharePoint, which integrates with MicrosoftOutlook. However, this is a third-party website, which RNC could hide, say it is not a file system they own, and avoid providing it to Congress. What review has Congress does on online collaborative file sharing programs which are not related to e-mail, but could fit nicely within Ralston's denial above?
Prior, related, basis for statements below:
< http://www.citizensforethics.org/node/29131#comment-6429 >

Details

What's curious about Ralston's denial is that she, as Goodling did, leaves open other possibilities. This information builds off the discussion related to Ralston's apparent vague, open-ended comment. Ralston stated in her deposition that she was not aware of any discussions related to this claim:

I don't have a recollection of anyone discussing with me specifically that claim.

The above Ralston comment leaves open the possibility that Ralston was aware of non-discussions: Online White House-EOP-DoJ communications in a collaborative electronic environment. As Ralston as carefully worded her denial, she does not specifically exclude the possibility that she, while working for Rove, was not aware of any online electronic data exchange; or collaborative work product review. One such product that integrates with Windows Office 2007 is SharePoint from Microsoft.

The following information is not an endorsement of this product, nor a solicitation to buy, sell, or review the product for private or commercial purposes. The information below may related to online collaboration between White House Staff, legal counsel, and other contractors on issues related to war crimes and Geneva violations. If you are in the law enforcement community, intelligence services, or legal profession and have a duty to report allegations of war crimes-related evidence, you are encouraged to discuss the information below with counsel for advise how to proceed and remain in compliance with your legal and ethical obligations under Article 82 of the Geneva Conventions.

Basis for Subpoena Discussion

The information below forms the basis to request a subpoena of all White House IT information contracts, software, and data which is used in a collaborative environment. The current Congressional Subpoenas do not appear to adequately focus on non-email data interchange. As Ralston's denial is worded, she leaves open the possibility that the White House staff has engaged in online data transfer using software and hosts outside the White House on separate software systems.

Allegations

1. There is evidence identifying Microsoft Outlook as one of the software products which Karl Rove used. Karl Rove is widely reported, and it was disclosed on the DOJ Staff e-mails to the Congressional Senate and House Judicial Committees in the "data dump", that he had an F:drive. The nomenclature and spacing for his published/inadvertently disclosed e-mail archive is in the format matching Microsoft Outlook.

2. Microsoft Outlook, Internet Explorer and Firefox have RSS-intercept capability

3. Using methods which the NSA cannot intercept, we can confirm that Sidley Austin, and personnel associated with Bradford Berenson, formerly of the White House counsel's office and Ralston's defense counsel, use RSS intercept systems to track online communications. Testing of the Sidley Austin interception capabilities confirms that personnel assigned to Sidley Austin are using software products to timely capture within hours published material matching issues, personnel, names, and key areas of interest to Sidley Austin.

4. The Scooter Libby Court identified the speed with which counsel was able to quickly mobilize within 72 hours to rapidly collaborate on a work product for the court to review.

5. The Department of Justice US Atty e-mails indicates DoJ Staff uses Microsoft Outlook, as evidenced by the calendar templates matching closely the Microsoft Outlook Calendar Options.

6. Ralston in her deposition did not exclude the possibility that the WH, DoJ Staff, and outside counsel were or were not using non-verbal methods to interact. Ralston only asserted that she was not aware of "discussions" leaving open the possibility that she was aware of online interactions, briefings, and other electronic information posted to a common website, and collaboratively updated.

7. Microsoft Outlook SharePoint has an e-mail notification system to notify users of their password; and the e-mail notifications are archived, can be deleted.

8. Using methods which the NSA cannot intercept, we can confirm that EOP and Sidley Austin have jointly met on common websites, and have connected to common websites outside the District of Columbia in websites linked with Indiana. The IP numbers for the White House EOP and Sidley Austin are jointly linked with common websites that are not obviously related to law enforcement, intelligence, national security, or bonafide official US government business.

Disclaimer

Stop reading if you do not understand this:

The following information are not statements of fact, but are allegations based on the above theory. We continue with the presumption that the information is not allegations of illegal activity directed at any specific individual with Sidley Austin, nor are they conclusions of law about the conduct of Ralston.
9. Rove's C: Drive format is consistent with Microsoft Outlook, compatible with Sharepoint. Based on information and belief, the White House EOP and outside counsel have collaboratively worked on various intelligence briefings, work products, and other "non discussions". Mary Walker of the Department of Justice General Counsel's office has been widely reported in the open media has been one of the chief architects of the policies to circumvent Geneva. We judge the speed, efficiency that these rendition-interrogation briefings supports the conclusion that online collaboration, not using e-mail, was used coordinate the communication, briefing updates, and process information from the interrogations.

10. Bradford Berenson of Sidley Austin, self-disclosed on a PBS Frontline interview that he did not personally attend briefings, but was aware of intelligence gathering operations. We judge his statements could be linked with data sharing protocols and software such as SharePoint; and the means by which Berenson and other WH counsel were informed of the progress of the intelligence gathering was through online file sharing systems similar to SharePoint; or some system of sharing files that did not rely on e-mails to send and receive data.

11. SharePoint is not the only software product related to Microsoft Outlook which would permit online collaboration, avoid discussions, and fall within what Ralston asserted. Other products the public may be familiar are LotusNotes, newsgroups, permission notes, remote access to data files. Each of these require sign-in and access authority sent through e-mails.

12. The speed with which the Military Commissions Act, and Scooter Libby Sentencing Defense documents were coordinated are instructive. As the Scooter Sentencing Court concluded, it is very unusual for counsel to be able to process this much information pro bono, yet not have major data errors. We judge the legal defense and amicus briefs related to the Scooter Libby Sentencing memoranda, and notifications about the Sentencing Letters, was widely known on WH, EOP, and DOJ newsgroups, online filing sharing systems.

13. A close reading of the Scooter Libby Sentencing Letters indicates on more than one occasion that personnel were notified of the letters, yet they were emphatic that nobody asked them to act. This suggests that there was some sort of common website, newsgroup, or method of sharing the status of the court information with a close knit group, that there were legal disclaimers on the information, and that legal counsel had access to a closely held group.

14. DoJ and WH E-mails regularly refer to issues as a "close hold." This implies that there is a file sharing system, not necessarily related to e-mail, that permits DOJ and WH personnel to quickly share information within EOP, OMB, and other divisions.

OBJECTIVES

15. We judge the Ralston change in response, prompted by counsel Berenson, is very important. As with Goodling's less than emphatic denials, prompting DOJ OPR to review issues related to the AG, we conclude that Ralston restatement has enough wiggle room in the denial to permit other methods of "non discussions".

16. One apparent assumption of Congress was that the DOJ Staff counsel and others involved with the US Atty firings and Ambramoff issues was that there was specific e-mail sent to coordinate issues. We do not dispute that e-mail was being used. However, recall the scope of Goodling's defense counsel's assertions as a basis to induce Congress to grand immunity: That unless she got immunity, she would not be able to provide valuable information which was incriminating. Goodling's counsel specifically asserted that perjury was on the table if Goodling was not granted immunity. We judge this assertion was a red herring to trump up Goodling's apparent value to the Congress, and create the impressing that because Goodling's legal consequences might be grave, she could not share any information. Similarly, we judge Berenson is doing the same in re Ralston. However, we believe that the sleight of hand in re Goodling is slightly different with Berenson-Ralston: Rather than emphasize her value, Berenson appears to be confirming the existence of Ralston's knowledge of e-mails, yet this has nothing to do with the ambiguous denial of Ralston. Note closely what Berenson keeps focusing on in the deposition -- e-mails -- and contrast that with the denial Ralston officers: Leaving open that non-e-mails were used to share information. As with Goodling, it appears Counsel is creating a red herring for Congress. If this theory is true, then we need to reconsider, in light of Ralston's half-incomplete-denial, what Berenson might be attempting to do with his objections. We judge Berenson is not a disinterested counsel acting only to assert his clients' interests, but has a personal interest in seeing that the alleged non-email communication is suppressed, not raised; and that he has a motivation to distract attention from Ralston's apparent knowledge of Rove's Outlook software products that integrate with SharePoint: Berenson would have been in a position to get access to this SharePoint information.

17. Note closely the PBS Frontline statements Berenson made in re Rendition: He was fairly open. Yet, years later Berenson asserted that the issues involving foreign countries could neither be confirmed nor denied. The issue is Bronson's' apparent inconsistent statements on whether he can or cannot discuss rendition. We judge after the first disclosures of rendition of the PBS Frontline, there was a meeting between WH Counsel, other legal counsel, and Sidley Austin personnel to develop a common media message and commentary. One possible means to review the "new policy" -- that of neither confirming nor denying information on rendition, as opposed to openly commenting on rendition -- was through a online collaborative tool which shared a policy memo. IT remains to be understood how this policy memo, if it existed on this narrow issue of rendition, was crated, reviewed, sent, coordinated; and what "not discussions" occurred to promulgate the new policy on media comments related to rendition.

18. Also implicated with the rendition-FISA violations-warrantless surveillance-Prisoner abuse are several DoD-DOJ Contractors: Abraxas, Boeing, Lockheed Martin, SAIC, Titan. Using the online collaborative tools, contractors could quickly update policies, procedures, and share information, but by pass the e-mail interception NSA uses. Whether this was occurring, or whether this assumption was reasonable remains to be seen. The speed with which the Military Commissions Act updates were coordinated after copying and pasting the UCMJ clauses suggests that there was an on-line collaborative tool which contractors, legal counsel, and other personnel were able to quickly update, make changes, leave comments, and produce a final MCA. Whether the final language was Constitution remains a legal mater outside this discussion.

RECOMMENDATIONS FOR DISCOVERY

18. It is not appropriate to focus only on E-mails. To date, it does not appear Congress has the independent means to specifically target, detect, and sample on-line collaborative tools and data sharing platforms unless Congress receives a copy of the e-mail authorization for that particular platform. We recommend Congress request for all e-mail approvals for any online platform; and that all codes related to the access of these platforms be independently reviewed by a special master and sealed.

19. We are concerned that the Congress appears to be narrowly focusing on e-mails, without necessarily considering the non-email methods for WH, EOP, and outside counsel to have "non discussions". How the online collaboration relates to e-mails, links, URLs, decisions, timing of meetings, or subsequent actions/patterns/decisions remains to be understood. Ralston's changed comment does not in any way exclude the possibility this has occurred and qualifies as a "non discussion."

20. We judge he objective of the online collaboration -- outside e-mails -- was to hide the connection between DoJ and DoD Contractors; insulate them from discovery; and hide the specific information contractors provided to the online collaboration platform. If this online collaboration model was used to have "non discussions", there would be specific contractors accessed the collaboration tool, made changes, or provided comments. Of interest to Congress within these online collaboration tools would be the legal comments related to counsel on issues of Geneva.

21. We judge Ralston's incomplete denial leaves open the possibility that these online tools exist; because their apparent method of communication would be to allegedly violate the Hatch Act, this would remove any expectation of confidentiality or privilege; and legal counsel knew or should have known because the objective of the online collaboration was not to comply with the law, their alleged illegal activity could not be protected by ORCON or any expectation of privilege.

22. Note closely again, Berenson's comments on the PBS Frontline piece: Comments were made with the expectation that they would not be disclosed; and that he "believed" the actions were lawful. Whether this belief was reasonable is another issue: Once Berenson discusses the existence of these comments, he's disclosed specific communications or "non discussions" to working products which fall neatly within the Ralston non-denial, yet would arguably amount to a disclosure that there was a specific online collaborative data exchange on intelligence, rendition, prisoner abuse, FISA violations, and other alleged illegal activity. How this relates to Abramoff and the ongoing Grand Jury remains to be seen, adjudicated, and beyond this discussion.

TESTING OF THIS THEORY

Before we can accept the above theory as having any merit, there are some tests that can be done based on Berenson's comments during the Ralston deposition. If we presume for the moment that the above theory is true, but reconsider Berenson's questions and comments in light of this, we might have another view of what he was doing.

A. Did Berenson hope to focus on e-mails knowing full well that the real information which Congress needed was not in any discussion, e-mail, or meeting, but within a separate platform unrelated to e-mails?

B. To what extent did Berenson hope to mislead Congress to have them believe that the incriminating information was in e-mails, yet Ralston's denial does not exclude the possibility of non-emails to collaborate?

Once we consider the Berenson's statements, we might reconsider his objections and ask whether he was consistently making objections to protect Ralston in re e-mails; or whether Berenson permitted some questions inconsistently on e-mails, when he should have objected to all of them. Based on Berenson's incomplete and inconsistent objections, we judge that Berenson was not objecting to questions about e-mails, but attempting to block inquiry into incriminating evidence, which may or may not be an e-mail.
We encourage the Congress and Staff counsel to re-approach Berenson's objections with an open mind and reconsider whether he consistently objected; and consider the online collaboration theory:

If Berenson was objecting to having Ralston disclose anything incriminating, why Would Ralston's denial leave open the possibility that non-emails were used to "not discuss" information in the online format? Berenson's objections during Ralston's deposition do not appear consitent, especially in light of Ralston's non-denial denial.

We judge Berenson's motivation when he objected during the Ralston deposition was not to protect his client, but to act as a smokescreen from the alleged online collaboration tools and "non discussion" and get Congress to believe that Ralston was "only" worried about e-mails. It appears based on Relston's non-denial of "non discussions" that Berenson was objecting as a red herring from the real data in the common file tools connected with Microsoft Outlook.

We judge the e-mails are, in themselves, only part of the picture; and the larger story is the method by which the files were accessed by outside counsel, lobbyists, contractors, and other DoJ-EOP personnel; and to the extent that the e-mail destruction has not bee to hide information and content, but to hide connections with named legal counsel, contractors, and third parities which the Vice President hoped to suppress by blocking disclosure of the OVP entry-access list.

Again, whether the VP can create a separate data base outside the statute or block the archivists from making a decision is a separate issue; however, in light of the Scooter Libby Sentencing letters which disclose the names and meetings between legal counsel and the OVP Staff, we conclude the OVP has no legal standing to "block" disclosure of information which counsel disclosed freely, voluntarily in the Scooter Sentencing letters.

Interrogatories

1. Which software tools has the WH-EOP-DOJ used to engage in "non discussions"?

2. Which Microsoft Outlook-compatible software does EOP-DOJ use to engage in online collaboration?

3. How do we explain the speed with with the Libby defense counsel worked, pro bono, to coordinate in 72 hours this many documents?

4. What was the means by which Berenson, Walker, and other legal counsel coordinated their information sharing on intelligence briefings?

5. How many contractor visits related to rendition, FISA violations,a and prisoner abuse is the OVP attempting to hide by suppressing the entry-access lists?

6. Which online software tool was used to exchange information related to prisoner abuse, FISA violations, and share media strategy between OVP, EOP, DoJ, DoD?

7. Using the DoD Public Affairs and Information Warfare models known to Mary Walker of DoD Genral Counsel's office, was it the aim of DoD General Counsel
to coordinate the "Geneva violation plan" using online collaboration tools?

8. What was the nature of the non-disclosure agreement between the US Government and DoD-DOJ contractors on issues of rendition, FISA violations, NSLs, intermediary support for subpoena processing: Were contractors not allowed to mention that online collaboration tools were being used?

9. To what extent did the DoJ and EOP coordinate the updates to the MCA using these online collaboration tools?

10. How much input did lobbyists with access to these online collaboration tools have in updating the plans to transport prisoners, engage in interrogation and prisoner abuse, and bypass the known NARUS STA 6400 system which focus on e-mails?

11. To what extent did the GOP rely on their knowledge of the NSA intercept capabilities when developing online collaboration tools?

12. To what extent did the GOP legal counsel assigned to the White House counsel's office know or should have known that the "non discussions" using online collaboration tools did not fully comply with the Hatch Act in re data retention requirements?

13. Why is SIdley Austin's IP number connected to the same site as EOP in Indiana?

14. Which Sidley Austin RSS feeds return results on issues of war crimes surfaces while mentioning issues of rendition, outside counsel, data collaboration, and alleged legal counsel involvement with that activity ,despite the DC Bar Atty Rule 1.6 compelling counsel to withdraw when legal services are being provided to support illegal activity?

15. When Sidley Austin did the financial review of Boeing -- the mother company of the firm alleged attached to rendition -- did Sidley Austin use extensively the Microsoft Outlook SharePoint to coordinate its audit; or was the information contained only in non-electronic format?

16. How does Berenson explain his knowledge of the Ralston e-mails: IS Berenson still on the WH F:Drive access list with Karl Rove; and is this Sidley Austin access part of a contract which has been fully disclosed on the required A-76 contract?

17. Which newsgroups or data file sharing do the NSA-DoD-DoJ-DHS contractors associated with warrantless surveillance, warrantless interrogation of US Citizen not want Congress to know about; and how does Ralston wish to restate her denial in terms of these "non discussions"?

18. Who controls the newsgroup, file sharing system, or platform which WH, outside counsel, and DoD-DoJ contractors allegedly use to share information related to MCA, rendition, prisoner abuse, intelligence?

19. Is the MITRE Corporation in a position to discuss the OSIS system which they apparently know something about; or is the system "so secret" that even the Congress has not been told about?

20. To what extent have the "classified communication systems" been used not to protect national security related information, but to act as a conduit to hide evidence of illegal activity, which ORCON prohibits?

21. What platform did the WH IT department and RNC establish to share data with the GOP membership, outside counsel, lobbyists: Where is the software contract hidden; why has this method to violate Hatch been "classified" when legal counsel knew or should have known the alleged online collaboration tools were to bypass the Hatch requirements in re data retention?

22. When did legal counsel learn that the objective of the e-mail destruction was not to just hide communications, but to block Congress from discovering which contractors have been given access to these online collaboration tools; and prevent Congress from independently auditing the IT software contractors Contractors would allegedly use to gain access to the GOP-EOP-DOJ online collaboration tools to engage in a "non discussion"?

23. Did legal counsel, once they realized Ralston did not have a complete denial, appropriately forward all evidence related to "non discussions" contained in SharePoint, or any other online collaborative file sharing platform?

24. Where are the e-mail notifications sent through Outlook indicating to users, contractors, legal counsel, and WH-EOP-DoJ-GOP staff that they had been given access to this online collaborative tool?

25. What is the contract number of the SharePoint online collaboration tool which the WH-EOP apparently are using, and giving access to legal counsel to apparently assisting with data updates, and inputs from contractors on plans, memoranda, and policies related to alleged war crimes, prisoner abuse, and FISA violations?

26. Does Ralston have an explanation why her modified response does not address the SharePoint storage, and does not exclude the possibility that EOP-WH-DOJ staff were engaging "non discussions' with counsel and contractors using non-email?

27. Why should we believe Ralston's assertions that she wanted the question "repeated"; yet, Raslton when interrupted by counsel could almost recite verbatim -- with appropriately qualifications -- the exact words Congressional Counsel were asking?

28. Who is collaborating on the files in the WH-EOP on issues of Executive Orders used to by pass Congress, and not fully inform Congress -- as required by statute -- of illegal decisions not to enforce the law?

29. To what extent was the budget cutting and "civliznationation" efforts of OMB used as an excuse to "outsource" government policy making, and create an online collaborative tool which would solicit inputs from contractors, lobbyists, and legal counsel -- but without regard to whether there was accountability on those fiduciaries for alleged reckless conduct which did not fully comply with Geneva?

30. Does Sidley Austin have an explanation why it openly discusses its connection with data retention requirements; yet its Client does not exclude the possibility that the data has been retained in a "non discussion" format outside the Hatch Act requirements?

31. How long has Sidley Austin and Berenson had access to the WH-EOP-DoD-DoJ SharePoint/online collaboration platform; and has Berenson or anyone destroyed any entry-access-update information in this platform?

32. Which specific comments related to illegal activity did OVP, WH, EOP, Outside counsel, contractors not want the public to know were being made by third parties, outside the Hatch Act,with the intent to implement FISA violations, illegal rendition, prisoner abuse, and war crimes?

33. What are the terms of the contracts which outside counsel, law firms, EOP, WH, DoJ, DoD, NSA contractors, and other intermediaries relied upon to get access to these records in the common platform?

34. When the Verizon General counsel initially disclosed that it may have given the NSA access to its felicities, was this access also the other way: Verizon had access to the NSA online collaboration tools, but the agreement was that this collaborative tool -- and its existence -- would be classified "secret" because the database did not comply with the Hatch Act, compelling records retention and fully compliance with Geneva?

35. When was the last time DC-Bar Affiliated counsel read rule 1.6 compelling mandatory withdrawals when legal counsel services are used to advance unlawful activity; can all DC-Bar affiliated counsel at all firms, DoJ, NSA, EOP, and outside counsel certify in writing that they have reviewed this requirement; and are in fully compliance with this requirement; When will this certification be made in writing to the Committees without any promise of immunity to any outside counsel or any DC Bar Affiliated personnel?

36. Given all that we don't know about the online collaborative tools like SharePoint which Ralston has not emphatically denied were being used to engage in "non discussions," why should anyone seriously consider a request by Berenson that his client get any immunity: What is Congress immunizing; does Congress understand the scope of data -- outside e-mail -- which Ralston and Berenson have yet to account?

37. What review was done on all Ralston IP numbers she ever used to access her e-mail account, or access any Outlook-related software?

38. Have all IP numbers which Ralston used been resolved to the White House, EOP, or her home; or are there IP numbers which she used, when traced to SharePoint, indicate there is other activity and "non discussions" occurring using online collaboration tools?

39. Did Ralston open any e-mails at DoD, DoJ, or while traveling; or while at any outside legal counsel; or any firms associated with NSA, rendition, FISA violations?

41. What do the records from anyone in re RNC emails to Ralston say about the times Ralston reviewed, accessed, or had information related to IP access information?

42. What patterns of log-in times, unrelated to e-mails, does Ralston have related to newsgroup access, online collaboration tools?

43. Which e-mails did Ralston open first; which did she ignore; which e-mails did she delete without opening?

44. What was the timing of the openly of the blind copies of the e-mails; and how do these relate to updates on key documents RNC-WH-EOP-DoD-DOJ were updating in re FISA violations, NSA surveillance, prisoner abuse, Eastern European detention?

45. What review has been done on all opening and closing of all recipient BCC of RNC e-mails; and what method was used to specifically target with key words online collaboration tools like SharePoint, LotusNotes, newsgroups, or common file sharing programs?

46. What information does RNC and the ISP keep of when an e-mail is opened; and how does this record keeping change with opening of a blind copy: Who gets notified that a file has been uploaded to a common online data sharing platform; where's the archive of the e-mail opening data

47. What as the form of the "non discussion" and "non overheard" communication which Ralston alluded to: Memos, summaries, transcripts, media message based on an NSA intercept given to the GOP?

48. Did Ralston personally review and forward comments about NSLs?

49. What method was Ralston using to track the information, workflows to
Goodling; and how was this tracking system integrated with SharePoint or an Outlook Compatible online collaboration tool?

50. What do the records for anyone in the RNC e-mails to Ralston say about the times that Ralston or others reviewed e-mail or online tools; the IP access information thy had; the partners and groups of files reviewed and commented on; the e-mails and files Ralston and others opened first, ignored, or deleted without comment?

Review

E-mail does not appear to be the only method of exchanging information, especially in light of Ralston's non-denial denial. Ralston's incomplete denial warrants further inquiry. It is premature to consider offering Ralston immunity. Ralston has left open the possibly that online collaborative tools -- outside e-mail -- were used to engage in "non discussions".

If the Outlook compatible SharePoint was used, we may have answer why the GOP has deleted e-mails: To hide who was on n the access list to SharePoint. An online collaboration tool permits "non discussions" without using e-mail. It is possible to plan Boeing-related schedules using these online collaboration tools, avoid NSA detection, and delete information if Congress is not aware of this method of engaging in "non discussions." This method allows outside counsel and EOP-DoJ-DoD to send messages to their peers, coordinate legal briefs, share the progress of interrogations in Eastern Europe, and engage in illegal activity. Whether there is evidence of this alleged illegal activity related to rendition, FISA violations, war crimes, prisoner abuse, or unlawful CIA activity in Eastern Europe remains to be understood.

The evidence is overwhelming: Ralston's incomplete denials leaving open the possibly that there were "non discussions" using SharePoint; Rove's C:drive format showing that the EOP was using Outlook; the Sidley Austin-EOP common websites connected to their respective IP numbers; and the speed with which information is transmitted related to intelligence issues indicates there is non-email communication occurring. Berenson has previously disclosed his awareness of this information related to rendition and intelligence; and the information substantially matches the lines of evidence which Mary Walker of DoD General Counsel coordinated.

It is time for the OVP to stop wasting the Grand Jury's time, cooperate with the inquiry into who visited, and provide a full list of all contractors, legal counsel, and others who are working with Addington, OVP, and the Vice President using online collaboration tools outside e-mail to coordinate FISA violations, rendition, and prisoner abuse. It is time for Ralston and Berenson to be called on the carpet without any promise of immunity and discuss what they know about the online collaboration tools.

The existence, use, and access logs related to SharePoint and any other online file sharing, newsgroup, or file transfer system is material information for the OSC, Grand Jury, and war crimes prosecutors. Ralston's incomplete denial is arguably grounds to review all electronic means which could be used to engage in a "non discussion" as it relates to allegations of war crimes, bribery, and other issues with the Federal Bureau of Investigation is currently involved. FBI leadership needs to explain why it has, in the past, rebuffed information related to voluntary cooperation from informants; and share what they know about non-email systems used within EOP, OVP, and GOP to coordinate "non discussions" related to prisoner abuse, FISA violations, and other Geneva Violations. The FBI's track record on NSLs does not put the Bureau in a favorable light, and raises reasonable questions about the competency of the FBI leadership, compelling a review of the complaints against the FBI leadership going back to 2001; Which information did they rebuff; which concerns about illegal activity did they inappropriately decline; and which specific legal counsel provided any assurances to SACs and ASACs to rebuff information from confidential informants related to alleged illegal activity. it is arrogant for the FBI to pretend that its doing a "great" job when it was instrumental in rebuffing the very information Congress seeks, and the OVP-EOP and outside counsel appear to have hidden in the online collaboration tools. The OSC and Grand Jury need information about when these online tools were created; who knew about them; and when Rove and Ralston were aware that "non discussions" could occur without using e-mail using these systems. This is not impressive, especially given the clearly promulgated DC Standards of Conduct and the Hatch requirements.

Someone has some explaining to do. Ralston needs to get called back without any promise of immunity. Find the files, get the access-authorization e-mails, and find the IP numbers which EOP and Sidley Austin have openly permitted to be disclosed linking them to non-official websites. If anyone says that the information doesn't exist under oath, information exists outside NSA and American control showing they would have committed perjury. It's too early to talk to Ralston about immunity.

Summation

For the reasons above, we respectfully

Reject the NYT's call for a "focus" on e-mails;
Ask the media to broaden the call for a Congressional review of all collaborative tools EOP, OVP, GOP, DoJ, and outside contractors and legal counsel appear well positioned to use, and remain within the Ralston non-denial;
Call for understanding how this collaborative software program integrates with the Rove_K file format linked with Outlook, as disclosed in the DOJ data dump; and
Encourage a determination why Ralston's denial would not eliminate this means of "not discussing" an issue outside e-mail.
Printer Friendly | Permalink |  | Top
 
LearnedHand Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:41 PM
Response to Reply #159
161. Well, okay, but SharePoint is SERVER software
and is a SQL database under the hood. Any discussion taking place via SharePoint will exist in the SP content database. It is NOT synchronous discussion software (i.e., instant realtime messaging). This is to say that their discussions via SharePoint would not have been momentary vapor. They're stored in the database.
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:56 PM
Response to Reply #161
163. I'm a technical luddite so I forwarded to a friend.
I thought the depth of the info was way beyond me. This person suggested this might be "other" than relevant info meant to confuse. This is why I've attempted to follow it, forward to friends but not post it until now.

They seem to provide a lot of information but for all I know could be BIG or could be BS (pysch ops)

I interpreted as an outsourced TIA program with * cronies w off shore addresses providing the surveillance/data mining, so they can say they are not spying on Americand.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:24 PM
Response to Reply #161
173. Who would have access to purging such a database?
:shrug:
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:24 AM
Response to Reply #159
194. There's some major misinformation or disinformation there
The biggest red flag is the false assertion that NSA can't intercept on-line file sharing software, such as MS Outlook Sharepoint.

Any on-line communication that goes through an Internet Service Provider (ISP), either sent or received, will be intercepted by mandatory CALEA-compliant equipment. It is possible to use parts of the WWW fiber backbone to set up ad hoc networks that bypass the nodes where this NSA intercept equipment is installed. But, that would be exactly the sort of thing the NSA and private network security offices look for. Any microwave jumps or satellite uplinks would also likely be detected by NSA.

There's another reason to think this an elaborate hoax. The document retention orders and subpoenas issued to the WH require retention and disclosure of all electronic communications, which includes on-line collaboration messages. If someone wanted to withhold this material,I supposed they could try, but that would be in defiance of the order, and amount to Obstruction of Justice.

Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 06:05 AM
Response to Reply #194
204. Thank you.
I don't have the technical ability to evaluate but thought if surveillance was such why would they pinpoint this leak & stop it.
Printer Friendly | Permalink |  | Top
 
Duncan Donating Member (498 posts) Send PM | Profile | Ignore Wed Aug-01-07 12:03 PM
Response to Reply #194
268. Yes.
Mystery poster seems well informed, yet same of his/her suggested google searches I tried did not make sense to me.
Its too many acronyms and technical stuff for me to get a handle on.

Meanwhile, on a related note from EFF:

* Action Alert: Senate Intel. Committee Threatening to
Shelter Telcos for Illegal Spying!

With your help, we've made significant progress in
pressuring Congress to scrutinize the NSA spying program.
But the fight is far from over -- in fact, the Senate
Intelligence Committee is now quietly considering
legislation that could let telco giants like AT&T off the
hook for their role in the surveillance. Take action now
and help stop the illegal spying:
http://action.eff.org/fisa
-snip-

For more on EFF's class-action lawsuit against AT&T:
http://www.eff.org/legal/cases/att/


Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:19 PM
Response to Reply #268
318. If this a hoax, it's timed to House consideration of a couple related Bills
This is tieing up a lot of people in the midst of some important things going on the Hill:

1) the amendment to FISA
2) the Senate telco sheltering Bill

Thanks for pointing out the EFF action alert on the Senate Bill!
Printer Friendly | Permalink |  | Top
 
Gman Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:30 AM
Response to Reply #159
241. This guy has laid out the friggin' roadmap
to follow. My jaw has been on the table reading the thread at TPM. Everything that needs to be done seems to be in that thread.

Absolutely incredible. I've never seen anything like this in my life except for the movie "All The President's Men".
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:32 PM
Response to Reply #159
302. June 19 Post on CREW: RE: Ralston
IN ONE OF AN EARLIER POSTS ON MUCK ANONYMOUS SUGGESTS SAVING THESE SO I DID:

Berenson-Ralston Apparenty Agreed To Signaling System
Submitted by Anonymous on 19 June 2007 - 7:42pm.
Issue: DC Atty Standards of Conduct in re DOJ OPR, ongoing Congressional Review :

Is it a violation of the DC Bar Rules, Standards of Conduct for an attorney

A. to coach a witness before and during a disposition;

B. during a deposition pretend that a response was to assist the tribunal, but the intent of the counsel communication to the tribunal was to do the opposite and adjust a client's recollection during a deposition;

Would this attorney conduct amount to obstruction of justice as DoJ OPR is similarly investigating in re Gonzalez-Goodling prior meetings?

It appears as though Berenson coached Ralston how to respond to Berenson's reactions/comments. I noticed Berenson interrupted the questions when Ralston said "no" to one of the questions. The way Ralston revised her remark, it suggested she and Berenson had arranged some sort of signal if she should change her answer from, "I know nothing," to "I don't recall."

The issue on the table: If this Berenson-Ralston arrangement were real , would this amount to witness tampering; some sort of pre-meeting Between Ralston and Berenson with the intent to adjust recollections; and what kind of issues would this raise for Berenson in re candor before a tribunal and the Atty Standards of Conduct? :

Question: Karl Rove didn't discuss this claim with you?
: No.
Mr. Berenson . Do you want to clarify that last answer?
Ralston. I don't recall. I don't have a recollection of anyone discussing with me specifically that claim.

She's essentially repated the qualifying terms of the question, but broadened the response from just Rove to "anyone" but repeated the questions words: "this/that claim". All she had to do was answer, "No." This indicates that she's well aware of the words being used; shows ample evidence that shes able to track the precise language in the questions. Yet, contrast that later with her answers to other questions: "Can you repeat the question. Ralston appears to have played stupid, stalling for time when she appears to be able to repeat verbatim the qualifying words of a specific question despite being interrupted by her own counsel.

A witness to have a specific recollection of something, and answer "No" says one thing; but for counsel to know that the answer may not be correct; and interject with a comment; and get the witness to change her answer from a certain answer to the opposite, uncertain, is curious.

Notice this contrast:

A. Ralston changes her response from a certain "no" to "I don't recall."; yet
B. Notice the response Berenson provides -- that of seeking clarification -- doesn't track back to Ralston's response: She does not provide clarification, but does the opposite: Moves from a certain response of "No" to a less certain response: That is hardly a clarification, but the opposite.

Again look at her response:

I don't recall. I don't have a recollection of anyone discussing with me specifically that claim.

She's gone from "No" to "I have no recollection/don't recall." Yet, she's able to state with precision, as Goodling did, some things she is not recalling, but leaves open the question: What does she recall; what other claims that she may have not necessarily discussed, but have read, heard about, overhead, or been sent a blind copy via her RNC e-mail account sent from someone else?

Berenson And the RNC Blind Copy E-Mails

Yet, Ralson is not ordinary witness: She's an attorney, knowledgeable of the rules of the House Oversight Committee committee; in a position to rely on counsel; and knowledgeable of the DC Bar atty Standards of Conduct.
It appears the Berenson prompting of "clarification" was a signal to Ralston to do do the opposite: Provide ambiguity, this would amount to misleading the tribunal.

Arguably, Berenson public assertion of "requesting clarity" sounds like a good thing; but Ralston's response suggests the message Berenson was communicating was the opposite: To retract a statement, and provide ambiguity, arguably, in violation of the DC Bar rules which compel counsel to provide candor before the tribunal, not a double-meaning message with the intent to have the tribunal believe counsel was assisting the tribunal to get a precise answer. rather, Berenson's comment appears to do the opposite, hide the intent of his message, and induce Ralston to do the opposite of what the Tribunal thought Berenson was communicating.

Issues for Berenson in re Tribunal:

What kind of coaching did Berenson have with counsel to ensure that when he asked her the question she did above, that she would know to
understand her response needed to be changed; understand she needed to revise her remark; to stumble or argue with counsel; and seamlessly transition from a certain answer to one that asserts the obvious: Uncertainty.

Berenson had a duty to be impartial and a duty to disclose adverse information

The standard applies to legal counsel. Whether we're talking about Ralston to
Berenson, the same DC Bar rules apply:

(a) A lawyer shall not knowingly:
(1) make a false statement of fact or law to a tribunal or fail to correct a false statement of material fact or law previously made to the tribunal by the lawyer; Rule 3.3

Once it appeared as though Ralston and Berenson had coordinated their answers, and adjusted testimony, did Berenson appropriately disclose the scope of the coordination he and Ralston had? Arguably, once Berenson corrected Ralston, this raised the issue that there had been coordination; and that because Berenson publicly correct her on the record, the scope of his coordination with Ralston is admissible.

(b) A lawyer who represents a client in an adjudicative proceeding and who knows that a person intends to engage, is engaging or has engaged in criminal or fraudulent conduct related to the proceeding shall take reasonable remedial measures, including, if necessary, disclosure to the tribunal. Rule 3.3

Berenson did not disclose anything to the tribunal, as required by the DC Bar Rules, merely prompted Ralston; and it was not Ralston who provided the inconsistent statements to the DC Bar, but to the Congressional committee.
Once Ralston and Berenson have allegedly agreed to abide by unwritten terms, agreements -- apparently not disclosed to outside/opposing counsel -- how did that non-disclosed arrangement affect the proceeding?

Rule 3.4 Fairness to Opposing Party and Counsel A lawyer shall not: (a) unlawfully obstruct another party's access to evidence or unlawfully alter, destroy or conceal a document or other material having potential evidentiary value. A lawyer shall not counsel or assist another person to do any such act;

Did Berenson-Ralston's apparent prior meeting to adjust responses based on Berenson's prompting amount to legal counsel violating Rule 3.4, and did Berenson in violation of 3.4 "assist" Ralston to conceal the truth: That Ralston on her own was certain of something; but that counsel hoped to adjust her responses to interject ambiguity and uncertainty?

Arguably, Ralston-Berensons's interchange rise questions about alleged obstruction of justice, the scope of Berenson's pre-deposition coordination with Ralston, and the appropriateness of Berenson's comments in light of Ralston's initial assertion of certainty, then an an apparent prompting to adjust her response to be ambiguous.



What prompted Berenson to hope Ralston would adjust her testimony?


Why would Ralston agree to change from something that was a certain answer to one that was ambiguous?

The other problem Berenson-Ralston have, given the lack of disclosure on tall the ground rule and the agreements between Berenson-Ralston and the Congress, there is a reasonable basis to have doubts about Berenson's compliance with
(c) knowingly disobey an obligation under the rules of a tribunal except for an open refusal based on an assertion that no valid obligation exists;

What restrictions by the Govt Oversight Committee were there in place when Ralston was deposed prohibiting counsel from inducting witnesses to adjust their answers?

Is there a specific rule, regulation, or guideline unique to the Government Oversight Committee that expressly prohibits what Berenson and Ralston have appeared to have done: Have a signalling system; offer testimony that was adjusted based on non-disclosed agreements?

Let's consider the other clients and information Berenson and Sidley Austin have, which remain undisclosed. Was there something about at&T, Boeing, or another client involved with the RNC e-mail communications -- in a to-be-understood capacity -- that induced Berenson to get Ralston to retract her statement?

(f) request a person other than a client to refrain from voluntarily giving relevant information to another party unless:

If, as it appears, Berenson wanted to take Ralston's response ambiguous, and not certain, how might Ralston's "final answer" of ambiguity assist another Sidley Austin client; and in turn, what inducement, if any, has Berenson or anyone else made to others to not challenge, corroborate, but provide similarly ambiguous responses to answers they might, on their own, answer with certainty and precision?

Why would Congressional counsel be satisfied with Ralston's response -- which is vague, as less clear -- yet the prompting from counsel wanted the opposite: Clarification?

http://www.citizensforethics.org/node/29131#comment-6429
Printer Friendly | Permalink |  | Top
 
babylonsister Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:34 PM
Response to Original message
13. Sent to KO for the halibut.
:evilgrin:
Printer Friendly | Permalink |  | Top
 
Blue_In_AK Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:13 PM
Response to Reply #13
28. Mmm, halibut...
:rofl:
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:40 PM
Response to Reply #13
37. you sent it, good, this needs to be investigated, we may be on
to something very big here, don't you think?
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:25 PM
Response to Reply #13
87. Sent to Greg Palast and Democracy Now!
Printer Friendly | Permalink |  | Top
 
babylonsister Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:28 PM
Response to Reply #87
148. Excellent!
:thumbsup:
Printer Friendly | Permalink |  | Top
 
gilpo Donating Member (601 posts) Send PM | Profile | Ignore Wed Aug-01-07 01:50 PM
Response to Reply #13
305. Sent to Mike Papantonio
Edited on Wed Aug-01-07 01:50 PM by gilpo
edit spelling
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:59 PM
Response to Reply #305
308. GOOD ONE n/t
Printer Friendly | Permalink |  | Top
 
The Stranger Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:36 PM
Response to Original message
14. K&R -- fascinating.
Printer Friendly | Permalink |  | Top
 
librechik Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:38 PM
Response to Original message
15. here is a nibble:
NSC-RUN PROGRAM, LIKE IRAN-CONTRA, OUTSIDE CONGRESSIONAL-LEGAL OVERSIGHT

An "NSA/NSC" supporting function/unit does not necessarily mean intelligence gathering or intercepts. NSA-NSC-related units can be assigned anywhere; and their intelligence gathering is not isolated to electronic methods. It could involve civilian contractors assigned to commercial entities not obviously connected with the US government; and not obviously involved with verification of Signals intelligence. The personnel may or may not have any idea that they are assigned to a group that relies on NSA-collect information or that they are involved with verifying information the NSA/NSC has an interest.

. . . . .
"Why I suspect Darth Cheney involved in program origination? Comey Testimony. Philbin objected to legality of NSA program, and Addington had the biggest hand in ending Philbin's career. Payback for ruining Addington's pretty NSA operation. Comey dropped that name for a reason...."

Posted by: drational
Date: July 27, 2007 4:14 PM
- - - -

Recall, it's CIA that was sharing info with the EU on the rendition; and Plame was retaliated against by OVP: and the OVP blocking the archivist audit. Addington knew about the European Detention centers.Not getting info on the naval-based detention centers.

Recall, Iran-Contra was an NSC-run operation: Cheney was involved. Could be the same kid of thing -- something run out of NSC, not the DoJ or NSA. Not clear that the "NSA" vs "NSC" is a typo: Suspect its different: NSC, not NSA, appears to be running these things.

Recall DoJ met with the intelligence personnel at various sports facilitates in DC. Keep thinking Plame and Cheney were about sending a message to Cheney' private intelligence network -- likely linked through Halliburton -- to send a message: "Plame outing" is what will happen if you crosss the VP. Seems to simplistic to say this is only about oil, and retaliating against others who spill the beans. Libby's name was mentioned in the context of "basketball," another program -- that came up during the Grand Jury reviews; his counsel was worried Fitzgerald had access to NSA-GCHQ-intercepted information of legal counsel.
. . .

Philbin was former OLC, meaning he probably clashed with Addington on the legal aspects of Rendition/prisoner abuse as well. Philbin documented his concerns, which the Congress can ask for since those memoranda and their existence on this subject have been disclosed. Mentioning Philbin may have been merely a suggestion of which people/memoranda to specifically ask for.
Philbin was aware of the "security" issues of GTMO; and likely would have been involved with discussions in detaining prisoners in Eastern Europe.

1. Support Aspect: NSA resources supporting, or outsourced
"NSA" or "NSC" program doesn't necessarily have to mean just data interception, but _use_ and _support_ of other activities: Combat, intelligence analysis, interrogation, or direct support for the CIA. Problem NSA and DOJ have is when CIA -- possibly connected with this "other program" -- have talked to the EU. EU may have more information about this "other program" than the Congress has been directly told or understands.

2. Direct reporting to NSC, outside Congressional oversight
IF this is an NSA "program" it could be a support function for the NSC, or one of the combatant commanders; or made to _look_ that way to hide the real objective of the activity. They may have classified it as an "NSA Program" to bury its real objective as a domestic-CIA-cover action program, which is illegal, an "open secret" but explained away as a "training program" like Operation Falcon: Use of Federal resources at the local level for training, manning support, and domestic intelligence gathering in conjunction with CIFA.

3. Posse Comitatus
This could be a special access program within DoD that is a violation of the Posse Comitatus Act, hidden as an "NSA program" but a domestic security force backed by combat forces/special forces units which have the power to issue arrest warrants, detain people, and target those who oppose the illegal activities.

4. Individual Cells, untraceable, multi-agency
I haven't seen anything to suggest that the President could not, through DoD and CIFA, establish a Gestapo-like "NSA program" within the DoD community, and then outsource this to local law enforcement -- JTTF. They've got people that cross flow between the guard units, local law enforcement, FBI, and to civilian jobs all day. They could be creating individual cells within JTTF units that are comprised of NSC contractors, data analysis, and law enforcement whose sole goal is to act as a direct reporting entity to the NSC. They could very well be reporting directly to people working for Cheney, and Congress and JCS might never realize who or what was actually assigned, or relying on DoD assets.

5. DoD Entities With Personnel Assigned Stateside
DoD could ery well have created "foreign entities" in other countries, who then are in charge of these personnel stationed in the US. DoD was given this power to establish foreign intelligence and combat support entities overseas; however, if that's mutated, the NSC may have subcontracted to these DoD entities US-based personnel who directly support NSC: In effect, creating an NSC-NSA support function under DoD foreign entities, but basing their contractors in the US..

SUMMARY
Mueller appears to be referring to a sub-contracted effort which indirectly supports the NSC with a special domestic security unit. These units engage in direct engagement with state-side personnel and civilians. Contractors, law enforcement, and intelligence personnel are assigned under non-direct-NSC-NSA units, but are hidden inside commercial entities. The groups appear capable of moving quickly, with no direct supervision, but act as internal security forces, completely outside FISA oversight. They appear to be entities unrelated to FISA, but are front line units which verify information, gather intelligence domestically, and help NSC pinpoint targets which NSC contractors are assigned.

RECOMMENDATIONS
A. Congress examine the Operation Falcon; determine which NSA/NSC personnel were assigned to oversee.
B. Examine the budget lines inside the DOD foreign entities support accounts; and determine which banks are used to challenge those funds. Determine how the DOD funds are funnelled overseas through the NSC entities, then back to the US to these individual groups.
C. Review the "investigative leads" and ground rules JTTF and local law enforcement use to dissuade detection of the domestic intelligence gathering efforts.
D. Review the destruction logs of the CIFA; and determine who was supposed to keep the logs related to these classified documents.
Determine which signalling systems, monitoring, and other intelligence gathering the JTTF are using; and where this information is sent. Ultimately, it winds up somewhere: Which contractors, NSC staffers have access to these reports.
E. Examine with Congressional Counsel whether it is the intent that these domestic security services operate this way; and whether, as FISA is written, this type of activity would fall outside what the FISA Court can engage.
F. Review the DHS domestic interrogation facilities. Look at the gas mileage for the DHS pick up teams. Review the files they've had access to; and the basis for detaining someone. Review the complaints of citizens being forcibly removed from their cars, engines running, or being taken from their homes while school children are present in the early morning. Evidence includes car impound fees.
G. Discuss with POST and local LE efforts used to dissuade public awareness of intelligence gathering: Excuses given to hide pre-textual stops; and examine whether local officials do or do not keep adequate records related to officer complaints and requests for civilian oversight to examine officer misconduct.
H. Examine problems during audits: To what extent officers in LE, FBI, and DHS are concerned when reports of officer misconduct arise; and what methods auditors are aware to segregate complaints about officer misconduct from auditors:

1. Have they been asked to leave the room; were concerns explained away; were officers complaining they were "short manned" an unable to supervise; and how do these explanations square with the officer conduct.
2. How often are these units employed to provoke innocent civilians to respond to abuse?
3. To what extent are these domestic units used to harass civilians based on a "hunch"?
4. Would these units put the children of minors at risk to entrap a suspected target?
5. Is there no report of any of these personnel ever exposing a minor to a potentially unsafe situation to engage a target?
6. Has the FISA court, Congress, and Judiciary been fully apprised of how these units operate; their procedures; and oversight requirement to ensure 42 USC 1983 claims are minimized?
7. What insurance do these units have if they are engaged in liable action?
Posted by:
Date: July 27, 2007 5:37 PM


a BIG Nibble!
Printer Friendly | Permalink |  | Top
 
AntiFascist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:02 PM
Response to Reply #15
47. Hmmm, Project Falcon again...
2. Direct reporting to NSC, outside Congressional oversight
IF this is an NSA "program" it could be a support function for the NSC, or one of the combatant commanders; or made to _look_ that way to hide the real objective of the activity. They may have classified it as an "NSA Program" to bury its real objective as a domestic-CIA-cover action program, which is illegal, an "open secret" but explained away as a "training program" like Operation Falcon: Use of Federal resources at the local level for training, manning support, and domestic intelligence gathering in conjunction with CIFA.
Printer Friendly | Permalink |  | Top
 
librechik Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:30 PM
Response to Reply #47
57. I'm CERTAIN it had to do with spying on political domestic enemies
Edited on Tue Jul-31-07 03:30 PM by librechik
That's why they are so desperate to hide it. Otherwise, go through FISA for fuck sake. There is something MAJOR they are hiding. Spying on Kerry? Or worse?
Printer Friendly | Permalink |  | Top
 
jazzjunkysue Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:31 PM
Response to Reply #57
101. Exactly. This is what the house and senate are supposed to be for:
They're allowed to look at these "classified" materials for us, to make sure they're really kosher. That's the point. So, why hasn't the house insisted on seeing all of the NSA targets and material?

Because they already know it's illegal.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:05 PM
Response to Reply #57
165. Yep.
Geeze, this reads like a book.
Printer Friendly | Permalink |  | Top
 
Hissyspit Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:58 AM
Response to Reply #57
214. Watergate Redux n/t
Printer Friendly | Permalink |  | Top
 
Rosa Luxemburg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:11 PM
Response to Reply #15
85. the whole system of government and their agencies have to clean up their act!
The whole system needs sterilizing
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 04:19 AM
Response to Reply #15
199. This is fascinating speculation by someone who knows. But, speculation, nonetheless.
Keep the disclaimers issued elsewhere by this guy (yes, I think it's a guy) in mind. This isn't a disclosure of something he KNOWS is going on, but an elaborate thesis about what could happen if the elements and programs that he references were misused in the way he surmises they might.

This is a a fascinating scenario. He may be right that the Administration has been working on putting some sort of off-the-books domestic operational command together under the direction of NSC (very Iran-Contraesque, but why not run it directly out of OVP, like WHIG, using the WH communications hub?) employing elements of various alphabet agencies. The Operation Falcoln training pretext seems plausible. Also interesting is local/state law enforcement JTTF angle is an interesting suggestion. But, for the sake of simplicity, why not just use trusted elements within the Pentagon, such as MID or Naval Investigative Services or similar?

But, Anonymous really goes over the top with the suggestion that there's been actual child endangerment. What is he driving at,some sort of ultra stealthy blackmail and entrapment operation? Directed at whom? Is this a Bush-Cheney Praetorian Guard sort of thing, or Counter-terrorism gone off the deep end? About the purpose of the mission, he doesn't seem to have a clue.

While Anonymous shows a detailed background knowledge of inter-agency and legal operations at perhaps a managerial level, he doesn't betray a great deal of understanding of the politics of the subject. That's why I think he's primarily a technical guy, rather than someone with a background in political or psychological operations.

His comments are valuable and revealing, and certainly entertaining, but should be taken with a truckload of salt.
Printer Friendly | Permalink |  | Top
 
nebenaube Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:47 PM
Response to Reply #199
330. ...

that there's been actual child endangerment. What is he driving at,some sort of ultra stealthy blackmail and entrapment operation? Directed at whom?


Google references to "the family" in Madison County, VA.
Printer Friendly | Permalink |  | Top
 
Norquist Nemesis Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:49 AM
Response to Reply #15
224. Anyone else catch this "citizens being forcibly removed" ?????
Under Recommendations: "F. Review the DHS domestic interrogation facilities. Look at the gas mileage for the DHS pick up teams. Review the files they've had access to; and the basis for detaining someone. Review the complaints of citizens being forcibly removed from their cars, engines running, or being taken from their homes while school children are present in the early morning. Evidence includes car impound fees."

Has anyone heard/read/witnessed anything about "complaints of citizens being forcibly removed..." ?
Printer Friendly | Permalink |  | Top
 
Buzz Clik Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:41 PM
Response to Original message
16. Ok -- here are some "cut and paste" search lines to speed the process.
NSC-RUN PROGRAM, LIKE IRAN-CONTRA, OUTSIDE CONGRESSIONAL-LEGAL OVERSIGHT

LEARN LESSON OF OLC IN RE SUBPOENA RESPONSES

I don't personally think the fact that they are or are not referring

KNOW THE NATURE OF US GOVERNMENT LEGAL COUNSEL AND WHAT THEY ARE CAPABLE OF DOING

In my view the question of "are there one, two, or

1. There is the option to cut funding:

1. Google: <"attorneys sent each other congratulatory e-mails for keeping [br />
S1: Procedure check sheets: "there must be paper trails of procedures

Yes, and there's a rule about that as well: ORCON, it's illegal go classify

To those who are asking for views/comments/reactions, I would encourage

Your points about ICC are well taken; indeed, this is one of the concerns

FOCUSING ON VERIZON GC COMMENTS _BEFORE_ DOJ STAFF


=============================

Each line represents a different posting. Cut and paste into the CTRL-F dialog box.

READ THESE!! (But you'll need at least a couple of hours to digest it all)


This is amazing stuff. Mystery Poster isn't just guessing.
Printer Friendly | Permalink |  | Top
 
Lone_Star_Dem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:09 PM
Response to Reply #16
25. Thanks
This make it much easier for those of us without as much time to be searching. :)
Printer Friendly | Permalink |  | Top
 
Duncan Donating Member (498 posts) Send PM | Profile | Ignore Wed Aug-01-07 11:58 AM
Response to Reply #16
266. you can also just
just do find in this page and type: "posted by " with a blank space after by. Worked with firefox.
Printer Friendly | Permalink |  | Top
 
understandinglife Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:42 PM
Response to Original message
17. Just read the one from ...
Posted by:
Date: July 29, 2007 10:19 PM
http://www.tpmmuckraker.com/archives/003805.php

It'll give you a hint of just how deep whomever this person(s) is ...
Printer Friendly | Permalink |  | Top
 
KoKo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:38 PM
Response to Reply #17
60. and...."Exposing minors to potentially unsafe situtation."
Edited on Tue Jul-31-07 03:40 PM by KoKo01
(With all the emphasis the DOJ has put on Child Pornography...and Gonzo mentions it every time he testifies...is that some cover for them using "children" to ensnare people?) :shrug:

from poster _____ at TPM site:

-snip-
1. Have they been asked to leave the room; were concerns explained away; were officers complaining they were "short manned" an unable to supervise; and how do these explanations square with the officer conduct.
2. How often are these units employed to provoke innocent civilians to respond to abuse?
3. To what extent are these domestic units used to harass civilians based on a "hunch"?
4. Would these units put the children of minors at risk to entrap a suspected target?
5. Is there no report of any of these personnel ever exposing a minor to a potentially unsafe situation to engage a target?

6. Has the FISA court, Congress, and Judiciary been fully apprised of how these units operate; their procedures; and oversight requirement to ensure 42 USC 1983 claims are minimized?
7. What insurance do these units have if they are engaged in liable action?
Posted by:
Date: July 27, 2007 5:37 PM
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:13 PM
Response to Reply #60
158. Does that remind anyone of the Franklin Scandal? I remember reading about
it and watching a video on google wher they used drugged up orphans.
Printer Friendly | Permalink |  | Top
 
truth2power Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:13 PM
Response to Reply #158
294. That's what I thought as soon as I read it..
All this stuff about pedophiles involving Poppy etc. that's dismissed as tin-foil :tinfoilhat: I think years fdrom now we'll find it was true.
Printer Friendly | Permalink |  | Top
 
flyarm Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:02 PM
Response to Reply #60
164. absolutely!!!!!! that is what jumped out at me..and many here poo poo MKULTRA..
1. Have they been asked to leave the room; were concerns explained away; were officers complaining they were "short manned" an unable to supervise; and how do these explanations square with the officer conduct.
2. How often are these units employed to provoke innocent civilians to respond to abuse?
3. To what extent are these domestic units used to harass civilians based on a "hunch"?
4. Would these units put the children of minors at risk to entrap a suspected target?
5. Is there no report of any of these personnel ever exposing a minor to a potentially unsafe situation to engage a target?

6. Has the FISA court, Congress, and Judiciary been fully apprised of how these units operate; their procedures; and oversight requirement to ensure 42 USC 1983 claims are minimized?
7. What insurance do these units have if they are engaged in liable action?
Posted by:
Date: July 27, 2007 5:37 PM


that screamed out to me..MKULTRA..used to blackmail..and compromise congress members into silence..

wow this is scathing!!

and makes my blood boil!!

fly
Printer Friendly | Permalink |  | Top
 
fooj Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:20 AM
Response to Reply #164
192. Everytime Gonzo mentions "children" I get a chill down my spine.
:grr:
Printer Friendly | Permalink |  | Top
 
WinkyDink Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:07 AM
Response to Reply #192
210. Maybe he is sending a blackmail warning to Congressional criminals.
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:43 AM
Response to Reply #17
196. Anonymous obviously has worked for NSA , DIA , DHS or a contractor
But, ultimately, he's just ranting, and doesn't know anything more than the rest of us. This is no deep throat - I'd say, a disgruntled NSA contract employee who's worked on DoD programs in the past, but with no immediate knowledge of the "Program X" surveillance Gonzalez and Mueller are apparently referring to. This part convinces me of that:

There's another way of looking at this <"that program was not something that was legally controversial.">
D. "This program" is different from "that program" which has been hidden in another budget, unrelated to the NSA or NSC:
E. DoD _is_ allowed to do things overseas, and contractors have been assigned -- working for those _overseas_ entities -- in the US.
F. The data that is managed is channelled, but the contractors have no idea who it is they are monitoring: All they see is the raw data; someone else then recombines the data if there is a problem.
G. If we find a problem in the data, we then use the data we've collected to justify the warrant; if we can't get one, we self-issue one, and get the AG to certify it as being OK> Never mind that Qwest objected.
<"that program was not something that was legally controversial."> could also mean:
H. Legal counsel assigned to our units have been told to keep their comments to themselves
I. All contracts supporting this activity are -- by definition -- "legal contracts"; (just don't talk about whether they support a lawful or unlawful objective. Far too scary to contemplate!)

J. "not controversial" could mean all the legal views that opposed it were ignored; and the remaining opinions were in "full support".
K. The legal counsel who knew of the Constitutional violations were sent to Guantanamo, threatened with nasty things: "To the washroom, counsellor! No gloves for you."
L. Legal counsel who remained quiet were promised a "good rating" by "the decider" in their upcoming DOJ ranking list -- the names given to the Senate for Federal Benches.

"not legally controversial" could mean all case law showing it was illegal was ignored; or selectively rewritten, as Addington well did with the Iran-Contra minority report.

<"that program was not something that was legally controversial."> could mean: other programs were contentious; but since AG Gonzalez is on the pig-spit this week, we need to pretend we are concerned, even though we are not.
The people who said this was "no problem" and were not saying tat it was lawful, just that it wouldn't be a problem to find a judge who they could bribe to not take action.

"not legally controversial" does not mean that it was legal; only that the in "someone's mind" (God knows where) their idea of "controversial" is a different definition which does not use controversy. Maybe legal counsel who opposed were _not_ using spears with _poison_ tips, so the spin misters said, "See not controversial, if they ere really upset they would have had nasty poison, the kind that makes Ebola look like a fuzzy kitten." The infamy! How dare they!


Posted by:
Date: July 27, 2007 6:09 PM
--------------------------------------------------------------------------------
Printer Friendly | Permalink |  | Top
 
autorank Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:26 PM
Response to Reply #196
278. I tend to agree.
I spend about an hour last night reading through the contributions of anonymous on the main thread at TPM. There is a certain vagueness about the writing that makes you think there's going to be a big
payoff, but the writer never quite delivers. The business about the Republican break ins and so forth was fascinating but I wanted the hear what the deal was, just say it please. But that never happened. There's no reason to be Delphic at this point. Deliver the goods so we can get the job done.

It occurred to me that this might take up a lot of time from the TPM folks. That's not the end of the world for the Republic but it stymies their efforts. As long as Paul Kiel doesn't get involved, we're still going to get great stuff from them.

Could this be disinformation. Sure. Could it be someone with a serious illness who appears lucid, possibly, particularly due to the circumstantial speech? Possibly. Could it be a sincere insider who is just trying to help? Sure. This would not obviate the second option.

Remember 59Sunburst? This was a mystery user who showed up with truly specific information. That user may or may not be correct in the assessment of vote stealing but at least there was a methodology suggested that could be tested.

What bothers me about 'anonymous' is the lack of specifics.

PS. What will stop others from posting and just doing it anonymously?
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:24 PM
Response to Reply #278
300. The lack of specificity is an important issue, but there don't seem to be
specific claims being made (not that I've seen - I haven't yet read everything that's archived)

My initial assessment is that this is either: 1) a sophisticated hoax; or 2) a high-level rant by someone who has worked at some point within U.S. intelligence, but who doesn't have specific knowledge of any particular "Operation X" type surveillance operation.

If this is 1), it sure is good; and if it's 2) this could be very useful speculation. In any case, worth reading and talking about.

B-)
Printer Friendly | Permalink |  | Top
 
autorank Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 04:28 PM
Response to Reply #300
332. Text analysis
Edited on Wed Aug-01-07 04:30 PM by autorank
It's fascinating. I don't know how much more I'll read because the carrot is always just a bit
too far out of reach. If the person were an insider, then we'd be getting highly specific places
to look where we'd find the case or, alternatively (and this may be happening but I doubt it), the
person would be writing to the the TPM crew privately with the really hot stuff.

Here's the danger, imho. Just about anybody who wants to imitate that style of writing (we'll call
it cursed complexity, can post anonymously on any blog and get a good readership. If this is
some sort of psyops, then that's how they get everyone in a tizzy, multiplying themselves or through
imitators, the ubiquitous anonymous all over the net.

If one is looking for patterns to emerge, then looking at DU on a regular basis would be a better bet.
We have some great posters here who seem to ride the crest of what turn into real information waves.
Now that's of value!

:hi:

On edit: By "text analysis" I meant a formal analysis of the text by an expert in linking style to
intent because this is a distinctive style. Probably someone with an expertise in that type of
analysis and a good knowledge of mental health.
Printer Friendly | Permalink |  | Top
 
SutaUvaca Donating Member (472 posts) Send PM | Profile | Ignore Tue Jul-31-07 01:44 PM
Response to Original message
18. Went there, spent some time.
Thanks for the link Kpete.
This leaves me both scared and hopeful.
Somebody out there knows the big picture, and just maybe it will come to light in a timely manner.
Printer Friendly | Permalink |  | Top
 
myrna minx Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:46 PM
Response to Original message
19. Thanks for the link. This looks interesting. n/t
Printer Friendly | Permalink |  | Top
 
RainDog Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:56 PM
Response to Reply #19
110. kick & route six-six
want to read this, and kicking up.

just to say...Iran-Contra was the same group that is in power now, so that part isn't too difficult...Abrams, Poindexter, Negroponte, etc. and Iran-Contra was selling to Pete to give to Paul. so, who are the "freedom fighters" this time? maybe that's too simplistic. selling arms to ____ to fund ____. Did Plame work on tracking arms proliferation?

btw, Iran-Contra was not uncovered b/c of U.S. media (except for Robert Perry). The first info on that came from Lebanon. Don't expect the mainstream media to EVER be the first to break a story, or the first to ever speak out against the ptb.

and I have to tell you ms minx that that is the BEST picture evah. Jim Jarmusch is a gawd and Tom is a dawg. oh yeah. down by law.
Printer Friendly | Permalink |  | Top
 
myrna minx Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:33 AM
Response to Reply #110
219. Their criminal playbook is ripped from Mad Libs.
Shady neo-con characters in the (name of republican administration) administration sells (type of weapon systems) to (nefarious regime in room) to fund (name of guerrilla fighters in room).

Jarmusch and Waits look so young in that picture, don't they? I raise a toast of Jim Beam to the Raindog. :hi:

Printer Friendly | Permalink |  | Top
 
librechik Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 01:57 PM
Response to Original message
20. Another nibble
LEARN LESSON OF OLC IN RE SUBPOENA RESPONSES

Recall, OLC issued a "memo" saying that WH Counsel did not have to testify. This, according to the WH, was "gospel." Untrue, but that's another issue. OLC made a "rule" and then everyone said, "See, that's what they said."
Now, consider this, from TPMM quote, above: <"that program was not something that was legally controversial."> That could mean anything, anybody, and without reference to any legal standard.

"not legally controversial" . . . _according to whom_. . . ?...:
- OLC?
- Consensus within NSC?
- Consensus within NSA?
- Rove's determination?
- Gonzalez assessment after talking to Goodling about door mats for the Hoover Building?
. . .

What's their idea of "non legal controversy", as opposed to a "controversy that is real, but not based on a law, just the Constitution"?

What is someone like Darth Cheney said, "We need to justify this -- find a reason. Ignore words in the law if you need to. Just give me a memo. You get an appointment to the bench if you can figure this out." What if Roberts or Alito gave a really good opinion on this and made everyone -- in that room -- believe it was "not controversial", even though it was?

. . .

Again, saying <"that program was not something that was legally controversial."> could mean:
A. "other programs" were controversial;
B. "other groups" _are_ doing illegal things, but you haven't asked us about them, so we haven't made up a lie. . . yet;
C. OLC "determined" (using a feather, some fairy dust, and after gazing into GOodling's eyes) that anything the NSC wanted to do under Cheney was OK, just as long as nobody traced the money.
. . .

There's another way of looking at this <"that program was not something that was legally controversial.">
D. "This program" is different from "that program" which has been hidden in another budget, unrelated to the NSA or NSC:
E. DoD _is_ allowed to do things overseas, and contractors have been assigned -- working for those _overseas_ entities -- in the US.
F. The data that is managed is channelled, but the contractors have no idea who it is they are monitoring: All they see is the raw data; someone else then recombines the data if there is a problem.
G. If we find a problem in the data, we then use the data we've collected to justify the warrant; if we can't get one, we self-issue one, and get the AG to certify it as being OK> Never mind that Qwest objected.
<"that program was not something that was legally controversial."> could also mean:
H. Legal counsel assigned to our units have been told to keep their comments to themselves
I. All contracts supporting this activity are -- by definition -- "legal contracts"; (just don't talk about whether they support a lawful or unlawful objective. Far too scary to contemplate!)
J. "not controversial" could mean all the legal views that opposed it were ignored; and the remaining opinions were in "full support".
K. The legal counsel who knew of the Constitutional violations were sent to Guantanamo, threatened with nasty things: "To the washroom, counsellor! No gloves for you."
L. Legal counsel who remained quiet were promised a "good rating" by "the decider" in their upcoming DOJ ranking list -- the names given to the Senate for Federal Benches.

"not legally controversial" could mean all case law showing it was illegal was ignored; or selectively rewritten, as Addington well did with the Iran-Contra minority report.

<"that program was not something that was legally controversial."> could mean: other programs were contentious; but since AG Gonzalez is on the pig-spit this week, we need to pretend we are concerned, even though we are not.
The people who said this was "no problem" and were not saying tat it was lawful, just that it wouldn't be a problem to find a judge who they could bribe to not take action.

"not legally controversial" does not mean that it was legal; only that the in "someone's mind" (God knows where) their idea of "controversial" is a different definition which does not use controversy. Maybe legal counsel who opposed were _not_ using spears with _poison_ tips, so the spin misters said, "See not controversial, if they ere really upset they would have had nasty poison, the kind that makes Ebola look like a fuzzy kitten." The infamy! How dare they!
Posted by:
Date: July 27, 2007 6:09 PM
Printer Friendly | Permalink |  | Top
 
librechik Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:04 PM
Response to Original message
21. a couple more snippets
This is not necessarily true: <}Very obviously, the program Mueller referred to was the Terrorist Surveillance Program.">

The "other programs" could be things _far too scary_ to contempate. Recall, this Preident is linked with war crimes: It means nothing for him to set up camps, and make people disappear. "all for the cause. . ."

Put the burden on the President: Prove those internment camps you've built aren't being used; and that the prisoners aren't out "exercising" when the Auditors arrive.
Posted by:
Date: July 27, 2007 6:17 PM

I don't personally think the fact that they are or are not referring to "this" or "that" or "TSP" or "Not TSP" is the issue: The fact is that there isn't a consistent story, raising the question: What other activity is occurring that may be an NSA-related function, but has been organized to fall _outside_ FISA oversight, but is still illegal under the Constitution:
- Roving bands of contractors harassing US citizens;
- Temporary detention centers to detain US citizens without warrant or trial;
- Use of tax information by JTTF to compel US citizens to explain things that the agents are not able to determine through NSA intercepts
- Groups whose sole function is to fill in the gaps in the NSA intercepts, and provide some meat to explain what is going on with something that is unusual, but they don't want the court to know they're looking at . . . again.

Recall, the RNC has deleted/destroyed e-mail. If this "other program" were "OK," how does the RNC explain the failure to retain detain related to an ongoing "OK" activity?
The question goes back to DOJ, OLC, and outside counsel: < "When you learned of the "other programs" involved with this intelligence activity, did you fear that the information in the RNC accounts would be disclosed; or was there something you learned from the EU -- and CIA visits with the EU -- which prompted the evidence destruction related to rendition, FISA< prisoner abuse, and other things OLC apparently "all agreed" -- in a perverse Yoo-like fashion -- was "lawful". . . (never mind Geneva, FISA< or The Constitutional requirements)." >

Sounds like a law firm which was auditing a company related to various NSA programs and prisoner transfers should have detected this chance of fraud, and internal control problems. Or is a law firm saying, despite attestations to the SEC on those financial statements, that they had "no idea" what was going on, despite counsel's awareness of the activity -- as evidenced by their meeting with the DoD General Counsel's staff on these very issues?
Posted by:
Date: July 27, 2007 6:32 PM
Printer Friendly | Permalink |  | Top
 
Tandalayo_Scheisskopf Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:04 PM
Response to Original message
22. I think that it is safe to consider that series of posts...
In the same manner one might consider The Rosetta Stone. Remarkable in both content and courage.

I do hope the worthy was posting through some chained proxy servers.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:17 PM
Response to Reply #22
169. Sounds like this person knows enough to cover their tracks?
At least I hope so.
Printer Friendly | Permalink |  | Top
 
Oilwellian Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:07 PM
Response to Original message
23. One thing is for sure...
Anonymous is DoJ and there's more than one person working with him/her. On more than one occasion he/she slipped up and said "we" not "I." There is a LOT of information there and it ALL needs to be copied and kept by each and every one of us. Damn, the sleuthing to be done now. My head is spinning. :D
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:31 PM
Response to Reply #23
33. While it's not really clear whether they're DoJ, OLC, or IG ...
Edited on Tue Jul-31-07 02:36 PM by TahitiNut
... it's VERY clear that they understand the culture!! Very much so. Having worked in corporate internal audit and alongside corporate counsel, the attitudes and perspectives being portrayed are familiar to me, if not the particular organizations and their relationships in the Executive Branch and the variants of government insiders. Those comments are very clearly from the perspective of an insider ... and very aptly portray the culture of corruption.

I also find myself very much in agreement with this post ...
In my view the question of "are there one, two, or more programs" isn't relevant: The _known_ information shows there's been _illegal_ activity.

Whether there is _alot_ of illegal activity; or whether there is _multiple_ or _many_ program's merely confirms the foregone conclusion: There's illegal activity.

Time to stop digging for "confirmation" of what we know; and compel Congress to explain why -- despite the known illegalities -- they continue to fund what they know, or should know is illegal.

Murtha's cutting of the DoD COngressional liaision office budget shows that the budget tools are there: "Mr. President, cooeprate with our inquiry; or you get no money." The arugment that the GOP is 'blocking' the DNC is fiction: The DNC can cut the money and _make_ the GOP "pass" an Amemdnet to add money back.

Again, I appreciate there are people who want to spend time getting clues and "figuring things out" -- in my view, it would be more productive to take the information that we have, and give it to the DNC is a simple format: The FISA violations are known to be illegal; either cut the money, or we're going after you wtih prosecutions.

Posted by:
Date: July 29, 2007 2:04 PM
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:41 PM
Response to Reply #33
38. It just occured to me ... I have a guess about who it might be.
Edited on Tue Jul-31-07 02:54 PM by TahitiNut
Fascinating.

:rofl:



Printer Friendly | Permalink |  | Top
 
Nickster Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:00 PM
Response to Reply #38
82. That would make an awful lot of sense.
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:46 PM
Response to Reply #38
138. Indeed!
:thumbsup:
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:01 PM
Response to Reply #138
143. Based on some limited personal contact with one of those (senior) people ... and ....
... many years associating with the "breed" ... it's a really, really good fit. That's the way my mind worked once upon a time - when I was actively doing operational analysis. It's about seeing (and thinking in) patterns and forming the gestalt of the available facts. It's a mental exercise in 3-4 dimensions - a sort of visual/kinesthetic mental juggling act.

If it ain't the person I'm thinking of - or a close associate - then (s)he OUGHT to be. It's a valuable analytical talent/skill, imho.
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:42 AM
Response to Reply #143
245. I Know Them Well Myself
Call it an occupational hazard. I think you've nailed it or come very, very close.
Printer Friendly | Permalink |  | Top
 
glitch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:13 PM
Response to Reply #33
50. Woa. "The FISA violations are known to be illegal; either cut the money, or we're going after you.."
Crikey.
Printer Friendly | Permalink |  | Top
 
OzarkDem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:26 PM
Response to Reply #33
54. Are Dem leaders in Congress aware of this?
and if so, why aren't they acting, as this person suggests?

1 Why aren't they using the budget tools they have at their disposal and

2 Why they continuing to say they "need more confirmation"?

Are Dems in Congress trying to paper over this mess? I'd be very concerned if my party's leaders in Congress were doing such a thing. I hope not.
Printer Friendly | Permalink |  | Top
 
Ladyhawk Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:10 PM
Response to Reply #54
292. The government is thoroughly corrupt.
Are Dems in Congress trying to paper over this mess? I'd be very concerned if my party's leaders in Congress were doing such a thing. I hope not.


I don't have any evidence, just a gut feeling ever since the midterms, that the entire government is corrupt and that if we want to change anything we'll have to find a way to work outside the system. (Note: That does NOT mean violence.)
Printer Friendly | Permalink |  | Top
 
KoKo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:43 PM
Response to Reply #33
63. Conyers Website was asking for whistleblowers
and wouldn't this "anonymous" have called his office rather that putting this out on several internet sites? Or, does the person feel they need to spread the information farther so that they are covered. :shrug:
Printer Friendly | Permalink |  | Top
 
OzarkDem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:10 PM
Response to Reply #63
125. Interesting question
My guess would be "anonymous" felt he needed to spread the information further, possibly because he felt that Dems in the House wouldn't understand it or feel compelled to use it.

In one of his posts, "anonymous" criticized Dems saying they already had a strong case against Gonzo and that they should move on it. I'm really concerned about that.
Printer Friendly | Permalink |  | Top
 
defendandprotect Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:14 PM
Response to Reply #125
168. Or maybe he's already given the information to some Dems who have not moved on it -- ???
Printer Friendly | Permalink |  | Top
 
truedelphi Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:51 PM
Response to Reply #125
343. Jonathan Turley who is of course the chief legal analyst that KO
Consults whenever the Keith Olbermann show needs advice about Constitutional Law, he has also said that Gonzo has gone very far along. Turley has pretty much implied that Gonzo has already convicted himself - and then what can you say?

That the Dems are spineless co-enablers at best or bought out and paid for at worst (if not with money - then with assurances that some factoid of their past will not be broadcast)
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:19 PM
Response to Reply #63
170. I wonder if they fear being tracked via gov't server?
But WE could certainly alert the good Congressmen.

I was going to ask if anyone had. :hi:
Printer Friendly | Permalink |  | Top
 
flyarm Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:00 AM
Response to Reply #63
182. could be ..
some congress crtiers are compromised..especially if children are involved..extermely compromised
and
being blackmailed..and this person does not know who is compromised..


and this person trusts no one..

maybe this person has gone to a congress critter..and now realizes ..that is not where to turn..

this person is afraid of "suicide" or weird car wreck..or small plane crash!!

and feels the need to get this "out there" in case something happens..unexpected!!

could this person have talked to the NBC producer who just jumped?? and now is very vunerable ..and really wants this info out there??

wow..get me the tin foil!!

fly
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:44 AM
Response to Reply #63
222. if I were in "Deep Throat's" position
whether the Watergate one or this one -


I would do something like this too

throw all sorts of hints - strong hints - out there and get others to "discover" stuff.
There is safety in numbers. And anonymity.

If this "anonymous" were to call a congressman's office, or in some way make evident that he/she even might be a whistle-blower, he/she could expect to disappear pronto.

That is not wild-eyed spy thriller nonsense. There were assassination attempts on the guy who finally blew the whistle on the tobacco companies, after all.

Look, if we grant that the powers that be in at least some large corporations are willing to snuff those who threaten them to protect profits and cover malfeasance, and we all know that those large corporations are really calling the shots behind this entire cabal, well, then, of course citizens should fear that their government will act to shut them up. It is naieve to think otherwise. To say somehow that "oh, they aren't really that bad - the US government would not do that" is just plain foolish. The only reason I discount the 9/11 inside job theories is I don't think they could have pulled it off as a controlled demolition - requires too much prep that could not have been accomplished without exposure. And too much coordination that I don't think the shadow government was ready for - yet. But I don't doubt for one second that if they thought they could, they would
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:14 PM
Response to Reply #222
315. "requires too much prep" - since this isn't a 9/11 thread in the proper
forum, I'll just say "open source" information has maintenance going on in the buildings just before that day.

"Shadow gov't" ... if you only knew what was going on around you. Have you read Confessions of an Economic Hitman?
Printer Friendly | Permalink |  | Top
 
Ladyhawk Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:15 PM
Response to Reply #63
295. Good for Conyers.
Kucinich and Conyers are on a very short list of politicians I halfway trust. If this person is legitimate, he/she would probably want to get the information out in a number of ways. If it were me, I wouldn't trust Conyers completely. Considering the surveillance, Conyers could be compromised.

That doesn't mean the information or source is valid. (I'm as far outside the Beltway as could possibly be imagined.) It's just something to think about.
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:08 PM
Response to Reply #63
313. if you look at one of his posts, he/she may see Conyers as part of the
problem. I added that section of his/her writings to this thread.
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:44 PM
Response to Reply #33
137. Yup, He's The Real Deal
It's very obvious. It's all about the holes. The massive, glaring, irrefutable holes in the record. It's blatantly criminal.
Printer Friendly | Permalink |  | Top
 
KoKo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:00 PM
Response to Reply #137
155. Look for who was giving "earmarks?"
Printer Friendly | Permalink |  | Top
 
Joe Chi Minh Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:24 AM
Response to Reply #137
254. Aaah, don't disappoint, leveymg....
Edited on Wed Aug-01-07 11:25 AM by KCabotDullesMarxIII
Printer Friendly | Permalink |  | Top
 
riona Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:08 PM
Response to Original message
24. K&R
MSM - Hello-o-o-o... - are you there??
Printer Friendly | Permalink |  | Top
 
Lone_Star_Dem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:11 PM
Response to Original message
27. I'm only just getting started on reading all of this
Edited on Tue Jul-31-07 02:12 PM by Lone_Star_Dem
I wanted to stop and kick & recommend though so more eyes can see this.
Printer Friendly | Permalink |  | Top
 
AndyA Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:15 PM
Response to Original message
29. It would seem to me it's a done deal at this point, if the information provided is true.
So, let's GET THE SHOW ON THE ROAD!
Printer Friendly | Permalink |  | Top
 
RedEarth Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:22 PM
Response to Original message
30. Very interesting....... It would seem to me KO and David Shuster
would have an interest in this. Really fascinating posts.
Printer Friendly | Permalink |  | Top
 
UnyieldingHierophant Donating Member (249 posts) Send PM | Profile | Ignore Tue Jul-31-07 02:25 PM
Response to Original message
31. Move along...nothing to see here
Printer Friendly | Permalink |  | Top
 
Fridays Child Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:25 PM
Response to Original message
32. Marking, to read later.
Printer Friendly | Permalink |  | Top
 
jaxx Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:33 PM
Response to Original message
35. The answers are mostly there...does the congress know this stuff?
An amazing read through the many posts by the mystery person. The bush adm is like a bad company with two sets of books.....both of them cooked. This pisses me off to no end, knowing we are used as pawns.
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:37 PM
Response to Original message
36. WoW there is alot of information in those posts,
Edited on Tue Jul-31-07 02:44 PM by alyce douglas
just reading those posts, they are very in depth and factual don't you think? meaning this is no amateur posting this information. What do you guys think?
Printer Friendly | Permalink |  | Top
 
lovuian Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:44 PM
Response to Original message
39. So is there a NSAC like the poster said? and our they
taking info and funneling it from New Zealand Canada and Australia and funneling it into America

quite a little circuit they have thanks AT & T...

Amazing how they try to get around the law
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:45 PM
Response to Original message
40. keep this thread kicked
Printer Friendly | Permalink |  | Top
 
jaxx Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:45 PM
Response to Original message
41. The mystery poster is on several of the threads at TPM today.
Calling for cutting funding

<snip> Key idea: "Budgets are cut. If you want your money, cooperate, give us the information. Until you cooperate and gives us the information, you aren't getting money. The longer you delay, Mr. President and Mr. Attorney General, the longer you will have no money. This is your problem."

Posted by:
Date: July 31, 2007 2:43 PM

http://www.tpmmuckraker.com/archives/003820.php
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:51 PM
Response to Reply #41
176. It sounds like Verizon must have the info somewhere?
Can't we subpoena them?
Printer Friendly | Permalink |  | Top
 
The Stranger Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:46 PM
Response to Original message
42. Someone who is technically inclined should copy these posts somewhere.
For safe keeping and further review and investigation.

Any volunteers?
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:49 PM
Response to Reply #42
44. we would need a team to do that, and to compile each post
and dissect. now has this person/s posted anywhere else.
Printer Friendly | Permalink |  | Top
 
The Stranger Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:52 PM
Response to Reply #44
45. Where are Woodward and Bernstein when you need them?
If we weren't living in Orwell's 1984, I would say go to the media and have a reporter do it. But these days, the media and reporters seem to be the last people to trust with finding out the truth about the government.
Printer Friendly | Permalink |  | Top
 
smokey nj Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:39 PM
Response to Reply #42
61. I've copied the mystery posters posts to a Word file.
I don't know if that's what you meant, but I'm technically challenged so it's the best I could do. Send me a pm if you'd like me to send you the file.
Printer Friendly | Permalink |  | Top
 
The Stranger Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:10 PM
Response to Reply #61
67. Thanks, and I did the same thing. Another poster astutely suggested a DU Research Thread.
I think that would serve the Woodward/Bernstein purpose quite nicely, although I have never posted on the DU Research Board.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:55 PM
Response to Reply #61
178. Can you copy it from word and paste it here in a thread?
:shrug: Or send the word doc. on to Conyers? I've sent him a few snips, but the more info the merrier.
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 06:45 PM
Response to Reply #61
341. PDF is posted
Printer Friendly | Permalink |  | Top
 
aquart Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:01 PM
Response to Reply #42
111. Well, I've already pulled them from that one TPM thread.
It's in an email ready to go to my list. I don't know where the other posts are.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:58 PM
Response to Reply #111
179. Add Conyers to that list:
If he's not already on it. :hi:
Printer Friendly | Permalink |  | Top
 
Stephanie Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:08 PM
Response to Reply #42
122. here's the long one >
NSC-RUN PROGRAM, LIKE IRAN-CONTRA, OUTSIDE CONGRESSIONAL-LEGAL OVERSIGHT

An "NSA/NSC" supporting function/unit does not necessarily mean intelligence gathering or intercepts. NSA-NSC-related units can be assigned anywhere; and their intelligence gathering is not isolated to electronic methods. It could involve civilian contractors assigned to commercial entities not obviously connected with the US government; and not obviously involved with verification of Signals intelligence. The personnel may or may not have any idea that they are assigned to a group that relies on NSA-collect information or that they are involved with verifying information the NSA/NSC has an interest.

. . . . .
"Why I suspect Darth Cheney involved in program origination? Comey Testimony. Philbin objected to legality of NSA program, and Addington had the biggest hand in ending Philbin's career. Payback for ruining Addington's pretty NSA operation. Comey dropped that name for a reason...."

Posted by: drational
Date: July 27, 2007 4:14 PM
- - - -

Recall, it's CIA that was sharing info with the EU on the rendition; and Plame was retaliated against by OVP: and the OVP blocking the archivist audit. Addington knew about the European Detention centers.Not getting info on the naval-based detention centers.

Recall, Iran-Contra was an NSC-run operation: Cheney was involved. Could be the same kid of thing -- something run out of NSC, not the DoJ or NSA. Not clear that the "NSA" vs "NSC" is a typo: Suspect its different: NSC, not NSA, appears to be running these things.

Recall DoJ met with the intelligence personnel at various sports facilitates in DC. Keep thinking Plame and Cheney were about sending a message to Cheney' private intelligence network -- likely linked through Halliburton -- to send a message: "Plame outing" is what will happen if you crosss the VP. Seems to simplistic to say this is only about oil, and retaliating against others who spill the beans. Libby's name was mentioned in the context of "basketball," another program -- that came up during the Grand Jury reviews; his counsel was worried Fitzgerald had access to NSA-GCHQ-intercepted information of legal counsel.
. . .

Philbin was former OLC, meaning he probably clashed with Addington on the legal aspects of Rendition/prisoner abuse as well. Philbin documented his concerns, which the Congress can ask for since those memoranda and their existence on this subject have been disclosed. Mentioning Philbin may have been merely a suggestion of which people/memoranda to specifically ask for.
Philbin was aware of the "security" issues of GTMO; and likely would have been involved with discussions in detaining prisoners in Eastern Europe.

1. Support Aspect: NSA resources supporting, or outsourced
"NSA" or "NSC" program doesn't necessarily have to mean just data interception, but _use_ and _support_ of other activities: Combat, intelligence analysis, interrogation, or direct support for the CIA. Problem NSA and DOJ have is when CIA -- possibly connected with this "other program" -- have talked to the EU. EU may have more information about this "other program" than the Congress has been directly told or understands.

2. Direct reporting to NSC, outside Congressional oversight
IF this is an NSA "program" it could be a support function for the NSC, or one of the combatant commanders; or made to _look_ that way to hide the real objective of the activity. They may have classified it as an "NSA Program" to bury its real objective as a domestic-CIA-cover action program, which is illegal, an "open secret" but explained away as a "training program" like Operation Falcon: Use of Federal resources at the local level for training, manning support, and domestic intelligence gathering in conjunction with CIFA.

3. Posse Comitatus
This could be a special access program within DoD that is a violation of the Posse Comitatus Act, hidden as an "NSA program" but a domestic security force backed by combat forces/special forces units which have the power to issue arrest warrants, detain people, and target those who oppose the illegal activities.

4. Individual Cells, untraceable, multi-agency
I haven't seen anything to suggest that the President could not, through DoD and CIFA, establish a Gestapo-like "NSA program" within the DoD community, and then outsource this to local law enforcement -- JTTF. They've got people that cross flow between the guard units, local law enforcement, FBI, and to civilian jobs all day. They could be creating individual cells within JTTF units that are comprised of NSC contractors, data analysis, and law enforcement whose sole goal is to act as a direct reporting entity to the NSC. They could very well be reporting directly to people working for Cheney, and Congress and JCS might never realize who or what was actually assigned, or relying on DoD assets.

5. DoD Entities With Personnel Assigned Stateside
DoD could ery well have created "foreign entities" in other countries, who then are in charge of these personnel stationed in the US. DoD was given this power to establish foreign intelligence and combat support entities overseas; however, if that's mutated, the NSC may have subcontracted to these DoD entities US-based personnel who directly support NSC: In effect, creating an NSC-NSA support function under DoD foreign entities, but basing their contractors in the US..

SUMMARY
Mueller appears to be referring to a sub-contracted effort which indirectly supports the NSC with a special domestic security unit. These units engage in direct engagement with state-side personnel and civilians. Contractors, law enforcement, and intelligence personnel are assigned under non-direct-NSC-NSA units, but are hidden inside commercial entities. The groups appear capable of moving quickly, with no direct supervision, but act as internal security forces, completely outside FISA oversight. They appear to be entities unrelated to FISA, but are front line units which verify information, gather intelligence domestically, and help NSC pinpoint targets which NSC contractors are assigned.

RECOMMENDATIONS
A. Congress examine the Operation Falcon; determine which NSA/NSC personnel were assigned to oversee.
B. Examine the budget lines inside the DOD foreign entities support accounts; and determine which banks are used to challenge those funds. Determine how the DOD funds are funnelled overseas through the NSC entities, then back to the US to these individual groups.
C. Review the "investigative leads" and ground rules JTTF and local law enforcement use to dissuade detection of the domestic intelligence gathering efforts.
D. Review the destruction logs of the CIFA; and determine who was supposed to keep the logs related to these classified documents.
Determine which signalling systems, monitoring, and other intelligence gathering the JTTF are using; and where this information is sent. Ultimately, it winds up somewhere: Which contractors, NSC staffers have access to these reports.
E. Examine with Congressional Counsel whether it is the intent that these domestic security services operate this way; and whether, as FISA is written, this type of activity would fall outside what the FISA Court can engage.
F. Review the DHS domestic interrogation facilities. Look at the gas mileage for the DHS pick up teams. Review the files they've had access to; and the basis for detaining someone. Review the complaints of citizens being forcibly removed from their cars, engines running, or being taken from their homes while school children are present in the early morning. Evidence includes car impound fees.
G. Discuss with POST and local LE efforts used to dissuade public awareness of intelligence gathering: Excuses given to hide pre-textual stops; and examine whether local officials do or do not keep adequate records related to officer complaints and requests for civilian oversight to examine officer misconduct.
H. Examine problems during audits: To what extent officers in LE, FBI, and DHS are concerned when reports of officer misconduct arise; and what methods auditors are aware to segregate complaints about officer misconduct from auditors:

1. Have they been asked to leave the room; were concerns explained away; were officers complaining they were "short manned" an unable to supervise; and how do these explanations square with the officer conduct.
2. How often are these units employed to provoke innocent civilians to respond to abuse?
3. To what extent are these domestic units used to harass civilians based on a "hunch"?
4. Would these units put the children of minors at risk to entrap a suspected target?
5. Is there no report of any of these personnel ever exposing a minor to a potentially unsafe situation to engage a target?
6. Has the FISA court, Congress, and Judiciary been fully apprised of how these units operate; their procedures; and oversight requirement to ensure 42 USC 1983 claims are minimized?
7. What insurance do these units have if they are engaged in liable action?

Posted by:
Date: July 27, 2007 5:37 PM
Printer Friendly | Permalink |  | Top
 
Stephanie Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:09 PM
Response to Reply #122
123. and the next - these are comments, not copyrighted materials >
LEARN LESSON OF OLC IN RE SUBPOENA RESPONSES

Recall, OLC issued a "memo" saying that WH Counsel did not have to testify. This, according to the WH, was "gospel." Untrue, but that's another issue. OLC made a "rule" and then everyone said, "See, that's what they said."
Now, consider this, from TPMM quote, above: <"that program was not something that was legally controversial."> That could mean anything, anybody, and without reference to any legal standard.

"not legally controversial" . . . _according to whom_. . . ?...:
- OLC?
- Consensus within NSC?
- Consensus within NSA?
- Rove's determination?
- Gonzalez assessment after talking to Goodling about door mats for the Hoover Building?
. . .

What's their idea of "non legal controversy", as opposed to a "controversy that is real, but not based on a law, just the Constitution"?

What is someone like Darth Cheney said, "We need to justify this -- find a reason. Ignore words in the law if you need to. Just give me a memo. You get an appointment to the bench if you can figure this out." What if Roberts or Alito gave a really good opinion on this and made everyone -- in that room -- believe it was "not controversial", even though it was?

. . .

Again, saying <"that program was not something that was legally controversial."> could mean:
A. "other programs" were controversial;
B. "other groups" _are_ doing illegal things, but you haven't asked us about them, so we haven't made up a lie. . . yet;
C. OLC "determined" (using a feather, some fairy dust, and after gazing into GOodling's eyes) that anything the NSC wanted to do under Cheney was OK, just as long as nobody traced the money.
. . .

There's another way of looking at this <"that program was not something that was legally controversial.">
D. "This program" is different from "that program" which has been hidden in another budget, unrelated to the NSA or NSC:
E. DoD _is_ allowed to do things overseas, and contractors have been assigned -- working for those _overseas_ entities -- in the US.
F. The data that is managed is channelled, but the contractors have no idea who it is they are monitoring: All they see is the raw data; someone else then recombines the data if there is a problem.
G. If we find a problem in the data, we then use the data we've collected to justify the warrant; if we can't get one, we self-issue one, and get the AG to certify it as being OK> Never mind that Qwest objected.
<"that program was not something that was legally controversial."> could also mean:
H. Legal counsel assigned to our units have been told to keep their comments to themselves
I. All contracts supporting this activity are -- by definition -- "legal contracts"; (just don't talk about whether they support a lawful or unlawful objective. Far too scary to contemplate!)
J. "not controversial" could mean all the legal views that opposed it were ignored; and the remaining opinions were in "full support".
K. The legal counsel who knew of the Constitutional violations were sent to Guantanamo, threatened with nasty things: "To the washroom, counsellor! No gloves for you."
L. Legal counsel who remained quiet were promised a "good rating" by "the decider" in their upcoming DOJ ranking list -- the names given to the Senate for Federal Benches.

"not legally controversial" could mean all case law showing it was illegal was ignored; or selectively rewritten, as Addington well did with the Iran-Contra minority report.

<"that program was not something that was legally controversial."> could mean: other programs were contentious; but since AG Gonzalez is on the pig-spit this week, we need to pretend we are concerned, even though we are not.
The people who said this was "no problem" and were not saying tat it was lawful, just that it wouldn't be a problem to find a judge who they could bribe to not take action.

"not legally controversial" does not mean that it was legal; only that the in "someone's mind" (God knows where) their idea of "controversial" is a different definition which does not use controversy. Maybe legal counsel who opposed were _not_ using spears with _poison_ tips, so the spin misters said, "See not controversial, if they ere really upset they would have had nasty poison, the kind that makes Ebola look like a fuzzy kitten." The infamy! How dare they!


Posted by:
Date: July 27, 2007 6:09 PM
Printer Friendly | Permalink |  | Top
 
HeeBGBz Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:22 PM
Response to Reply #42
147. I've printed out pages 26-98 before I ran out of ink
Dammit.
Printer Friendly | Permalink |  | Top
 
Ghost in the Machine Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:19 PM
Response to Reply #42
171. I'll volunteer the site for it...
and I'll copy what I can to the site... and oh, what a fitting domain name... http://www.judicialoversight.org ... feel free to use it, I've got plenty of bandwidth available. Let me know, and I can give someone administrator or moderator status.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:52 PM
Response to Reply #42
177. If someone starts a thread, I'll volunteer to help tomorrow.
:hi:
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:07 AM
Response to Reply #42
226. actually the discussion thread format is awful for archiving
if you want to keep the posts for reference, putting them on a server as pdf or html files with a table of contents page to retrieve them would be more useful

I'll be happy to put stuff on my website and maintain a TOC page if anyone wants
It would be a document archive similar to Sharepoint - a list of docs, short description, link to open them, link to download pdf. Nothing pretty, but usable.

For that matter, there are other threads - like the Tillman one, that might merit such a "warehouse"

I can even provide a utility for uploading to the server directly. One would submit a document and an accompanying text file with the description, source, etc. I'd just run a utility to regenerate the TOC periodically.



Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:32 AM
Response to Reply #226
242. demo
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:18 PM
Response to Reply #42
317. kpete is doing that. see his post in this tread
Printer Friendly | Permalink |  | Top
 
npincus Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 02:46 PM
Response to Original message
43. can someone synopsize?
thanks.
Printer Friendly | Permalink |  | Top
 
kimpossible Donating Member (785 posts) Send PM | Profile | Ignore Tue Jul-31-07 03:01 PM
Response to Original message
46. Search string
To search for the no-name poster, just search for "by: " with 2 or more blank spaces after the colon.
Printer Friendly | Permalink |  | Top
 
kimpossible Donating Member (785 posts) Send PM | Profile | Ignore Tue Jul-31-07 03:06 PM
Response to Original message
48. Now here's a thought that never occurred to me before
A different perspective on what might have happened during Dubya's long summer vacation in 2001?


mo2: "Given that Bush/Rice were warned about al quaeda before Bush was sworn in in 2001, why is it thought that they did absolutely nothing before October 2001?"

Good point again.

mo2:" Because they say so is not good enough."

Right. Getting warmer.

-------------

mo2: Could it be that they did do something, but that something was illegal?

You are correct.

mo2: "And they feel it is better to be called do-nothings than criminals?"
Printer Friendly | Permalink |  | Top
 
truedelphi Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:34 PM
Response to Reply #48
102. The perspective needed to fully examine this is
Edited on Tue Jul-31-07 06:41 PM by truedelphi
This one: back when Condi Rice was first scrutinized by the media for the fact that on August 6th of 2001, President Bush and she received a Natinal Security Memo and that perhaps it was of significance??

No such thing happens, Condi answers. She assures the media by more or less saying that it was no big deal

Then the media continued to push her, and she said "Oh all right, it really was nothing" - and she then flashed the title of the memo to the camera and you had the media then explaining to the Public that the title of this memo was "Note to President: Osama to attack USA via planes hitting buildings."

That was all black flag - just to re-introduce the notion that Osama was involved.

Like mo2's quoted remarks above:
mo2: "And they feel it is better to be called do-nothings than criminals?"
Printer Friendly | Permalink |  | Top
 
Duer 157099 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:35 PM
Response to Reply #48
132. I'm thinking that this might be suggesting that
warnings about a pending attack were destroyed, and that someone knows this because they have found the "holes" in the data/document/electronic trails.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:59 PM
Response to Reply #48
181. Very interesting.
Edited on Wed Aug-01-07 12:05 AM by mzmolly
Love your user name BTW. My dd's favorite show. :hi:
Printer Friendly | Permalink |  | Top
 
NBachers Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:08 AM
Response to Reply #48
191. What about before 2000?
Here's what blew me away about this segment: If you paddle back to summer, 2001, (or "before Bush was sworn in in 2001,") what's to prevent you from paddling back to before the election?

George Bush Sr. helped put Reagan into office by negotiating with Iran to delay release of the hostages, to make Carter look bad, and throw the 1980 election. Reagan was inaugurated on January 20, 1981. Iran released the hostages on January 21, 1981. I remember watching the release on TV in the aftermath of Reagan's inauguration. It looked like more than coincidence to me.

We already are suspicious that data agencies were used to spy on the Democrats' election campaigns in 2004. That's one of the things the Bush Administration is trying to hide.

What if similar activities were in place during the 2000 election cycle?

"Could it be that they did do something, but that something was illegal?"

Can we apply this to the 2000 election? They had a pretty good system up and running in 2004. They used it again in 2006. Who's to say it didn't happen in 2000? They sure seemed to have their way paved for them ahead of time, didn't they?

Printer Friendly | Permalink |  | Top
 
JDPriestly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:11 PM
Response to Original message
49. There is a God! This person is smart, well-informed,
experienced in the inner workings of government, has an excellent grasp of legal research and appears to have a conscience. Thank you whoever you are.

I have bookmarked this for further review. The remarks raise a lot of questions. It is important to check the source links on information like this and I don't have time right now. The many, many footnotes and references are impressive, and it is unusual for someone to have such a broad understanding of the inner workings of the government, and computers and the personalities of the individuals involved and international relationships and the law. Is this Deep Throat or a student of these matters. This is just so weird.

The important thing to remember is that CONGRESS HAS THE POWER TO RIGHT THESE WRONGS but has not yet used it.

Impeachment and the purse are not the only powers that Congress can use to right the wrongs of the Bush administration and change the direction of our nation.

Article I, Section 8 (1) states that "Congress shall have Power to lay and collect Taxes, Duties, Imposts and Excises, to pay the Debts and provide for the common Defence and general Welfare . . . .

Article I, Section 8 (3) To regulate Commerce with foreign nations . . . .

Article I, Section 8 (9) To constitute Tribunals inferior to the Supreme Court; (

Article I, Section 8 (10) To define and punish Piracies and Felonies committed on the high Seas, and Offenses against the Law of Nations;

Article I, Section 8 (11) To declare War, grant Letters of marque and Reprisal, and make Rules concerning Captures on Land and Water;

Article I, Section 8 (12) To raise and support Armies, but no Appropriation of Money to that Use shall be for a longer Term than two Years.

Article I, Section 8 (13) To provide and maintain a Navy; (and here.)


Article I, Section 8 (14) TO MAKE RULES FOR THE GOVERNMENT AND REGULATION OF THE LAND AND NAVAL FORCES;

Article I, Section 8 (15) TO PROVIDE FOR CALLING FORTH THE MILITIA TO EXECUTE THE LAWS OF THE UNION, SUPPRESS INSURRECTIONS AND REPEL INVASION; (Congress regulates this, the President obeys Congress -- period. Congress should decide what happens in case of attack, not the president and his edicts. Congress needs to step up to the plate on this.)

Article I, Section 8 (16) To provide for organizing, arming, and disciplining, the Militia, and for governing such Part of them as may be employed in the Service of the United States, reserving to the States respectively, the Appointment of the Officers, and the Authority of training the Militia according to the discipline prescribed by Congress;

Article I, Section 9(2) admonishes Congress that "The privilege of the Writ of Habeas Corpus shall not be suspended, unless when in Cases of Rebellion or Invasion the public Safety may require it."

Article I Section 9(7) No money shall be drawn from the Treasury, but in Consequence of Appropriations made by Law; and a regular Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time. (What is Congress' excuse. How can Bush claim executive privilege regarding how public money is spent -- and thus on oversight. Let's see Bush account penny by penny for the money spent on surveillance and other illegal activities.)

Congress may control and audit the executive and regulate not only the expenditures on the military, but also every other department in the government. Congress is to make the rules regarding the handling of prisoners. The Republican Congress failed completely to discharge its duties in so many respects. It is time for the Democratic Congress to right the many wrongs that have taken place and are now occurring. Congress was intended to be the most powerful branch of government. The president's habit of disregarding Congress' laws and regulations based on signing statements contravenes these clear Constitutional mandates regarding Congress' powers.

Congress should not go on recess. It has been derelict in fulfilling its constitutional duties of regulating, auditing and controlling a run-away executive branch. As Anonymous points out, Congress has the means to fulfill all those duties.

And, as an aside, while it is at it, Congress has the duty and the power to restrict the activities of private militias. The Constitution speaks of "the Militia" "one Militia" and gives the power to organize, arm and discipline it to Congress -- not to the CEOs of Blackwater or Halliburton or any other privately controlled organization.

What are we paying our members of Congress to do? Eat hot dogs with us? They need to get to work.


Printer Friendly | Permalink |  | Top
 
joeunderdog Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:52 PM
Response to Reply #49
152. Agreed, but is s/he smart enough to avoid detection?
I would say that safety is a real concern for this individual. This, after all, is about illegal wiretapping. What's to say someone isn't getting an IP address and making a home visit?
Printer Friendly | Permalink |  | Top
 
Ghost in the Machine Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:30 PM
Response to Reply #152
175. Does firedoglake allow anonymous posters all the time, or are they making an exception
Edited on Tue Jul-31-07 11:33 PM by Ghost in the Machine
and covering for this person? I've only been there once or twice before..

Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:26 PM
Response to Reply #152
320. anyone this knowledgeable would have the sense to post from places like
internet cafe's. He/she would have different IP addresses -- none belonging to him/her.
Printer Friendly | Permalink |  | Top
 
IChing Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:16 PM
Response to Original message
51. Interesting and hopefully a real deep throat
but has he really said anything that profound?
It would only be profound if he was an insider.

Interesting none the least.
Printer Friendly | Permalink |  | Top
 
The Witch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:19 PM
Response to Original message
52. There needs to be a Research Forum post put together with Mystery Person's postings and QUICK.
If we stare at them long enough we may be able to put something together.
Printer Friendly | Permalink |  | Top
 
sojourner Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:35 AM
Response to Reply #52
195. yes, and --- as you said -- QUICK!
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:10 AM
Response to Reply #52
227. consider this
Printer Friendly | Permalink |  | Top
 
Exiled in America Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:26 PM
Response to Original message
53. The anonymous guy's posts were indeed fascinating reads.
I don't have much more to add than that. :)
Printer Friendly | Permalink |  | Top
 
dflprincess Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:09 PM
Response to Reply #53
124. I found his references to the internment camps chilling
I'm guessing a career DOJ employee who is fed up. I wish s/he'd go to the media with it - though it would probably be better to start with the foreign press.


Printer Friendly | Permalink |  | Top
 
KansDem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:27 PM
Response to Original message
55. The parking garage of the 1970s has become the Internet(s) of the 2000s (nt)
Printer Friendly | Permalink |  | Top
 
riderinthestorm Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:29 PM
Response to Original message
56. K & R!!! nt
Printer Friendly | Permalink |  | Top
 
Mr. Ected Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:33 PM
Response to Original message
58. Am I the Only DU'er That Doesn't Understand the Mystery Poster?
I've tried to read, digest and comprehend, but I guess my understanding of the inner workings of Washington and the endless use of acronyms prevents me from drawing any kind of conclusions.

PLEASE! I love reading kpete and babylonsister and a zillion other of you bloggers. You help me piece together the giant puzzle of Bushco malfeasances.

Throw me a bone over here.
Printer Friendly | Permalink |  | Top
 
Canuckistanian Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:41 PM
Response to Reply #58
135. I think everyone's a little overwhelmed by it
And yes, the poster has an odd, almost bureaucratic way of putting things.

I'm sure the real revelations will be coming out in the next few days.

This looks big, even from what I understand.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:14 AM
Response to Reply #58
183. Sounds to me like this person suggests looking to Verizon
for the so called missing emails? I've not spent a ton of time on it, but I found this interesting:

Bottom line: The RNC e-mails can be cross indexed with the holes within the Verizon e-mails system: And any of the US government e-mails sent to these Verizon addresses can be requested. We know there was coordination because the DOJ and Verizon openly confirmed their cooperation; but this isn't "provided" because it relates to an inconsistent statement by the Verizon counsel: Did NSA and Verizon have an agreement; and why did the first response of "may" have given access not match the later "refuse to comment"?

....

The key will be to find any verizon e-mails sent _oustide_ the US government, use those as a baseline; then look in teh verizon archives to see if any of those sent e-mails -- unrelated to the nSA-DoJ -- have also been destroyed/removed.

Printer Friendly | Permalink |  | Top
 
Babsbrain Donating Member (536 posts) Send PM | Profile | Ignore Tue Jul-31-07 03:41 PM
Response to Original message
62. Verizon is spying?
Edited on Tue Jul-31-07 03:43 PM by Babsbrain
That's one of the things I got from this. Verizon in cahoots with NSA, White House.
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 03:49 PM
Response to Reply #62
64. All the telecom companies are rquired to comply with NSL's.
That's just ONE of the predations.
Printer Friendly | Permalink |  | Top
 
tnlurker Donating Member (698 posts) Send PM | Profile | Ignore Tue Jul-31-07 04:01 PM
Response to Original message
65. for later
Printer Friendly | Permalink |  | Top
 
Subdivisions Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:03 PM
Response to Original message
66. There was never really any question in my mind that
they were using the TSP to spy on their corporate and political enemies. In fact I've said as much on this board.

Which explains why Congress is so neutered.
Printer Friendly | Permalink |  | Top
 
BadgerKid Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:09 PM
Response to Reply #66
166. Re:
...which suggests that somebody *knows* Congress could really rip that somebody a new one. If only we knew what Congress was waiting for....
Printer Friendly | Permalink |  | Top
 
AzDar Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:11 PM
Response to Original message
68. Kick....
:kick:
Printer Friendly | Permalink |  | Top
 
Turn CO Blue Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:11 PM
Response to Original message
69. totally K, B & R
Printer Friendly | Permalink |  | Top
 
DemReadingDU Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:11 PM
Response to Original message
70. double check this comment #188
looseheadprop says #188
Uh guys, I don’t want to burst anybody’s bubble but,

How the hell are you gonna do this famous comparison looking for the holes, when the WH has refused to turn over a complete set of anything?

Not fo r nuthin’ but when I was a prosecutor doing white collar cases, we did these kinds of forensic accounting investigations all the time.

It works well, if you raid the target’s home or office and seize their records.

It works well if you issue a GJ subpeona b/c any missing records are on the target’s head (in other words count against him).

But when the target is in the otherwise unlikely position of simply refusing to give a complete set of his records (or in Deadeye’s case any reocrds at all) How are you going to do the comparison?

Also, anonymous poster mixes apples and oranges using the standards applied under the Sarbanes- Oxley act for certifications done outside law firms hired bythe sudit and compliance committees of publicly traded companies, with standards set by administrative rule within the government.

I assure you that the President can overrule an administrative rule set by his own underling, and you don’t need John Yoo for that.

http://www.firedoglake.com/2007/07/31/choose-not-to-hate
Printer Friendly | Permalink |  | Top
 
The Stranger Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:20 PM
Response to Reply #70
72. I agree that it is wise to proceed with caution, both with regard to whether
the mystery poster is truthful and indeed knowledgeable, as well as to make sure it isn't an intentional deception or distraction from something else, especially given its nature.

For example, if Congress had indeed set a trap for the Executive -- one that seems fairly elegant in design, involving dummy agencies --, and this poster is disclosing such a trap, wouldn't that serve to warn the Executive and undermine the artifice?

My sense is that from the volume and type of information being posted, it is unlikely that it is fabricated. There is too much technical information to be so. Which leads the other danger, which is far more tantalizing.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:16 AM
Response to Reply #70
184. I wondered if we can subpoena verizon for info?
:shrug:
Printer Friendly | Permalink |  | Top
 
Subdivisions Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:17 PM
Response to Original message
71. WE BETTER GET TO THE BOTTOM OF THIS FAST!!! SPECTER
Edited on Tue Jul-31-07 04:19 PM by Texas Explorer
just said on CNN that he's not as worried about getting to the bottom of Gonzalez's crap because the head of national intelligence is asking for changes to FISA so that they can more easily track terrorist inside the US. He feels that is what Congress should be working on and not a Gonzalez witch hunt.

If they are allowed to make changes to FISA, those changes could insulate bushco from crimes they have already committed.

This is bad. They have NOTHING TO LOSE!
Printer Friendly | Permalink |  | Top
 
Champion Jack Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:24 PM
Response to Reply #71
74. KICKED
Printer Friendly | Permalink |  | Top
 
loudsue Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:23 PM
Response to Original message
73. Whew!
....still digesting
Printer Friendly | Permalink |  | Top
 
defendandprotect Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:32 PM
Response to Original message
75. How many locations is the "mystery poster" posting in???? And is it ONE person????
Printer Friendly | Permalink |  | Top
 
iamthebandfanman Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:35 PM
Response to Original message
76. well one things for sure
Edited on Tue Jul-31-07 04:40 PM by iamthebandfanman
they arent a mystery to the webmaster of that site ;)

everytime someone posts something u leave ur IP address. wouldnt be hard for them to track where shes/hes been accessing the site from.
Printer Friendly | Permalink |  | Top
 
tkmorris Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:53 PM
Response to Reply #76
81. If the poster has any sense at all
The IP address visible to the webmaster will lead to the first of several layers of internet proxies, preferably in countries where records are hard to acquire/not kept at all.
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:39 PM
Response to Original message
77. kick
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:45 PM
Response to Reply #77
79. kick
Specter that SOB
Printer Friendly | Permalink |  | Top
 
caligirl Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:40 PM
Response to Original message
78. DC Madam link to this guy here >see item number 2 ARENA
FOCUSING ON VERIZON GC COMMENTS _BEFORE_ DOJ STAFF COORDINATED ON FISA RESPONSES

1. Sample file

When you look at the MPUC file, you'll want to go to the first records, at the end of the file. The date you want to look for is May 2006. Currently, this file is at the _end_ on page 9; if the future, as more documents are added at the beginning, this last page will increase.

Today, the last page is page 9 of the file. Look for this file, and open it: which has this information on the line :
- Col_2: Date: 05/08/2006
- Col_4: DocTYpe: Initial Filing
- Col_12: Name: Cowie

You'll see two files, click on the one that is 58 pages, the top row; pdf file is on the left. Click that icon. The file we're focusing on is 58 pages long.

- - - - -

2. Arena

Scroll to the end, page 58: You'll see a name: The Verizon GC name listed is "Arena", the one who isn't the primary Verizon GC: Here's your first connection with the FISA: "Arena" is a former DoJ Type; and has been linked with the intermediaries; and his name is linked with the same AT&T-conference attendees in re NSA-JTTF-FISA intermediaries for processing warrants.

- Play with the phone numbers in the DC Madam list. Just for fun.

- - - - -

3. Verizon Internal E-mail Format Disclosed

Go to page 56 of 58: This is the funny part: Look at the e-mails: That is a unique Verizon internal e-mail format that can be cross indexed within the RNC and WH e-mail systems to get some hits; as well as with DoJ, DoD, NSA, and outside legal counsel. This is the third party data transfer system we've been talking about. . . someone said it was "impossible" -- sorry, there it is. That e-mail is linked with an IP number; which is then cross indexed with various US government computers in other databases. Ooops! Funny, weren't those DOJ Staff supposed to be processing warrants not using their computers for unofficial things?

The format also includes the CITY where the Particular verizon emloyee is assigned. YOu'll have to review how the employee transfers related to changes or no changes in designations.

Here's the neat thing: Verizon in that e-mail on page 56 has an EMPL format: That means "employee": Verizon General counsel has foolish in disclosing their e-mail outside their office; also Verizon _contractors_ have another formatted code. If you play with this format, you're going to see the open records, and you can eventually find which Verizon employees have been sharing information with the FISA intermediaries.

- - - -

4. Out of court Inconsistent statements

YOu want to comare what Arena first said to Cowie with all subsequent Verizon-Gonzalez statements. The short version: What Arena said doesn't later match with the DoJ "version" of spin, subsequent sent through the Verizon GC.

- - - - -

5. Subpoenas of Verizon E-mail senders/recivers

Page 54 has an e-mail, and you can find others. The point is that, as with the RNC e-mails in the DOJ Staff dump to the Congress, Verizon has disclosed that there is a _contractor_ e-mail system which -- with their own records -- links them to the FISA intermediaries. This means that those working with the JTTF, NSLs, and the DoJ FISA processing warrants' system have to explain why their computers and e-mails include the Verizon notes in them. Congress needs to go to the DOJ and say, "OK, we know about these e-mails; and can link them to the FISA; let's see the DOJ, NSA, DOJ, and WH/OVP e-mails sent to coordinate the Verizon responses which _contradict_ Arena's first statements.

- Why did the DOJ's later responses adjust what Arena first said?

DoJ, OVP, EOP, RNC, and Verizon are stuck: The e-mails have been disclosed; and the link between Verizon and the NSA fiber optic testing center matches the NSA budgeting documents at the JROC, which are disclosed through an executive order. No wonder they OVP said they didn't apply: "We don't want you to look there."

- - - - - -

6. COnnections to FISA, NSA, and White House

Bottom line: The RNC e-mails can be cross indexed with the holes within the Verizon e-mails system: And any of the US government e-mails sent to these Verizon addresses can be requested. We know there was coordination because the DOJ and Verizon openly confirmed their cooperation; but this isn't "provided" because it relates to an inconsistent statement by the Verizon counsel: Did NSA and Verizon have an agreement; and why did the first response of "may" have given access not match the later "refuse to comment"?

The answer is the same as what Berenson was saying about Rendition: First he commented on PBS; then it went to "can nether conform nor deny.," IT appears WH Counsel, DoJ Staff, OLC and Sidley Austin-Verizon changed their position. That is admissible: There would have been a meeting, agreement, or communication to go from the original position to the second one. Where documents have been destroyed, or not provided, adverse inferences may be made.

- - - - -

7. Where to find the baseilne data to check for RNC and Verizon Email Destruction/Holes

The key will be to find any verizon e-mails sent _oustide_ the US government, use those as a baseline; then look in teh verizon archives to see if any of those sent e-mails -- unrelated to the nSA-DoJ -- have also been destroyed/removed. Verizon has no clue where else these are being stored right now. Yes, the files were sent; but who knows about those files; and who has forwarded them to the Grand Jury, TPM, and Congress?
Posted by:
Date: July 30, 2007 7:08 PM
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:28 AM
Response to Reply #78
255. HA!
I misread your handle as "callgirl" and thought you must BE the DC Madam...:rofl:
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 04:53 PM
Response to Original message
80. kick
this thread needs to be.
Printer Friendly | Permalink |  | Top
 
panader0 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:07 PM
Response to Original message
83. Wow!! Incredible stuff. An insider for sure. K&R
Printer Friendly | Permalink |  | Top
 
truedelphi Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:18 PM
Response to Original message
86. So here's the end scenario - Deepthroat goes
To the New York Times - this time not just as some random blogger.

But as someone who is ready and willing at last to step forward. He is introduced in the media with his real name, and his real rank and title at whatever agency he works at.

He brings tapes, transcripts, emails, copies of every offense that BushCo has
devellopped and used to prop up operation upon illegal operation.

It is a story that rivals the Ellsberg release decades ago.

The Nation is outraged.

but Congress says <yawn?> "It sure would be a lot of work to do something about all this; after all, there will be an election in November of '08. Let's just wait it out. That way we can adjourn for our long awaited summer vacation."

back to your regular programming
Printer Friendly | Permalink |  | Top
 
The Stranger Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:30 PM
Response to Reply #86
89. You got that right.
1. Nancy still says it would be too "divisive" to do anything about it, and that she wants to focus on her own agenda.

2. Said whistleblower gets attacked by the MSM criminally complicit corporate media night and day, eventually becoming today's Hans Blix, Scott Ritter, Cindy Sheehan or Valerie Plame.

3. The whole thing will eventually blow over and be forgotten.
Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:50 PM
Response to Reply #86
92. Bump...up
Thanks kpete
Printer Friendly | Permalink |  | Top
 
mmonk Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:27 PM
Response to Original message
88. Ah, let em go.
We have an election in 08.
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:35 PM
Response to Original message
90. kick
Printer Friendly | Permalink |  | Top
 
Innoma Donating Member (224 posts) Send PM | Profile | Ignore Tue Jul-31-07 05:47 PM
Response to Original message
91. Worth a kick...
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:51 PM
Response to Original message
93. thanks kpete for bringing this to our attention.
Edited on Tue Jul-31-07 05:54 PM by alyce douglas
is it credible or not? but it needs looking into. and you never know there could be another deep throat out there, and just waiting for us to run with this.
Printer Friendly | Permalink |  | Top
 
Duer 157099 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 05:55 PM
Response to Original message
94. This poster posts regularly at TPM
I have followed his posts in a number of threads, and one common theme he always comes back to is "war crimes" (amongst others).

He had very detailed posts about the retained/lost emails, and many TPM posters were practically disregarding him or saying he was nuts. Hard to tell who is the shill and who is the deep throat, but clearly this poster has alot to say.

His style is fairly easy to recognize in the various threads. But it makes my head hurt sometimes to read his posts, they are either chockful of BS or useful info. And again, hard to tell which.
Printer Friendly | Permalink |  | Top
 
DisgustedTX Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:04 PM
Response to Original message
95. It could be
LEOPOLD!

:rofl:
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:04 PM
Response to Original message
96. Cannonfire has caught on to this story and has mystery blogger's posts
Edited on Tue Jul-31-07 06:06 PM by kpete
From Cannonfire:

Mystery Blogger's Posts - In one Place



But a more complicated scenario has appeared on TPM Muckraker. The person behind this theory is not one of Josh Marshall's investigators but an anonymous "mystery poster." After writing long and detailed pieces, this individual refuses to sign his or her name -- not even with a nick, not even with "Anon." The same person may have presented his case ten days ago on the CREW site http://72.14.253.104/search?q=cache:gQ5T0wQt0rEJ:www.citizensforethics.org/node/29149+%22Ralston+needs+to+get+called+back+without+any+promise+of+immunity.%22&hl=en&ct=clnk&cd=1&gl=us.

Some folks think that the mystery poster is a Bush administration insider gone blabby.

Since these comments can be a little difficult to find on the original page, I have decided to reprint them here:
http://cannonfire.blogspot.com/2007/07/mystery-poster-on-gonzales-rnc-emails.html
Printer Friendly | Permalink |  | Top
 
KoKo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:42 PM
Response to Reply #96
150. well...that's interesting...thanks for posting.
I was just over at Cannonfire this a.m. so this must be new. Have seen "anonymous" stuff at TPM and wondered why Josh's investigators didn't pick up on it. Josh has on his site that you can send him "tips." I wonder why that person didn't just write it all up and send it to Josh...

But..maybe they prefer to dole it out a little at a time to cover themselves. Maybe posting from different ISP addresses in locations not easily traced for short posts. :shrug: Or, maybe they are just disinfo or loopy, too.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:17 AM
Response to Reply #96
185. Cool,
thanks!
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:04 PM
Response to Original message
97. this goes to the fragging of Tillman. You know he was silenced. It's been
reported there was no activity going on when he was killed.

from reviewing the close-range gun shot wounds to Tillman, leading some to believe that he was executed to silence him for his anti-war stances he was apparently going to advance outside the military. Tillman is reported to have been frustrated <a> there were too many shows going on in Afghanistan; <b> they were really not going after AlQueda; and the staged engagements were just a dog and pony show, not really serious about defeating an enemy.

Printer Friendly | Permalink |  | Top
 
Canuckistanian Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:38 PM
Response to Reply #97
134. Yes! I thought that was particularly interesting
This guy is no amateur or even reporter.

He MUST be an insider, with all the in-depth military/intelligence/DOJ information that he rattles off.

I DO wish he would come in from the cold, so to speak.
Printer Friendly | Permalink |  | Top
 
OmmmSweetOmmm Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:05 PM
Response to Original message
98. Here's the whole thing. It isn't copyrighted so it should be available to copy & paste.
Recall, it's CIA that was sharing info with the EU on the rendition; and Plame was retaliated against by OVP: and the OVP blocking the archivist audit. Addington knew about the European Detention centers.Not getting info on the naval-based detention centers.

Recall, Iran-Contra was an NSC-run operation: Cheney was involved. Could be the same kid of thing -- something run out of NSC, not the DoJ or NSA. Not clear that the "NSA" vs "NSC" is a typo: Suspect its different: NSC, not NSA, appears to be running these things.

Recall DoJ met with the intelligence personnel at various sports facilitates in DC. Keep thinking Plame and Cheney were about sending a message to Cheney' private intelligence network -- likely linked through Halliburton -- to send a message: "Plame outing" is what will happen if you crosss the VP. Seems to simplistic to say this is only about oil, and retaliating against others who spill the beans. Libby's name was mentioned in the context of "basketball," another program -- that came up during the Grand Jury reviews; his counsel was worried Fitzgerald had access to NSA-GCHQ-intercepted information of legal counsel.
. . .

Philbin was former OLC, meaning he probably clashed with Addington on the legal aspects of Rendition/prisoner abuse as well. Philbin documented his concerns, which the Congress can ask for since those memoranda and their existence on this subject have been disclosed. Mentioning Philbin may have been merely a suggestion of which people/memoranda to specifically ask for.
Philbin was aware of the "security" issues of GTMO; and likely would have been involved with discussions in detaining prisoners in Eastern Europe.

1. Support Aspect: NSA resources supporting, or outsourced
"NSA" or "NSC" program doesn't necessarily have to mean just data interception, but _use_ and _support_ of other activities: Combat, intelligence analysis, interrogation, or direct support for the CIA. Problem NSA and DOJ have is when CIA -- possibly connected with this "other program" -- have talked to the EU. EU may have more information about this "other program" than the Congress has been directly told or understands.

2. Direct reporting to NSC, outside Congressional oversight
IF this is an NSA "program" it could be a support function for the NSC, or one of the combatant commanders; or made to _look_ that way to hide the real objective of the activity. They may have classified it as an "NSA Program" to bury its real objective as a domestic-CIA-cover action program, which is illegal, an "open secret" but explained away as a "training program" like Operation Falcon: Use of Federal resources at the local level for training, manning support, and domestic intelligence gathering in conjunction with CIFA.

3. Posse Comitatus
This could be a special access program within DoD that is a violation of the Posse Comitatus Act, hidden as an "NSA program" but a domestic security force backed by combat forces/special forces units which have the power to issue arrest warrants, detain people, and target those who oppose the illegal activities.

4. Individual Cells, untraceable, multi-agency
I haven't seen anything to suggest that the President could not, through DoD and CIFA, establish a Gestapo-like "NSA program" within the DoD community, and then outsource this to local law enforcement -- JTTF. They've got people that cross flow between the guard units, local law enforcement, FBI, and to civilian jobs all day. They could be creating individual cells within JTTF units that are comprised of NSC contractors, data analysis, and law enforcement whose sole goal is to act as a direct reporting entity to the NSC. They could very well be reporting directly to people working for Cheney, and Congress and JCS might never realize who or what was actually assigned, or relying on DoD assets.

5. DoD Entities With Personnel Assigned Stateside
DoD could ery well have created "foreign entities" in other countries, who then are in charge of these personnel stationed in the US. DoD was given this power to establish foreign intelligence and combat support entities overseas; however, if that's mutated, the NSC may have subcontracted to these DoD entities US-based personnel who directly support NSC: In effect, creating an NSC-NSA support function under DoD foreign entities, but basing their contractors in the US..

SUMMARY
Mueller appears to be referring to a sub-contracted effort which indirectly supports the NSC with a special domestic security unit. These units engage in direct engagement with state-side personnel and civilians. Contractors, law enforcement, and intelligence personnel are assigned under non-direct-NSC-NSA units, but are hidden inside commercial entities. The groups appear capable of moving quickly, with no direct supervision, but act as internal security forces, completely outside FISA oversight. They appear to be entities unrelated to FISA, but are front line units which verify information, gather intelligence domestically, and help NSC pinpoint targets which NSC contractors are assigned.

RECOMMENDATIONS
A. Congress examine the Operation Falcon; determine which NSA/NSC personnel were assigned to oversee.
B. Examine the budget lines inside the DOD foreign entities support accounts; and determine which banks are used to challenge those funds. Determine how the DOD funds are funnelled overseas through the NSC entities, then back to the US to these individual groups.
C. Review the "investigative leads" and ground rules JTTF and local law enforcement use to dissuade detection of the domestic intelligence gathering efforts.
D. Review the destruction logs of the CIFA; and determine who was supposed to keep the logs related to these classified documents.
Determine which signalling systems, monitoring, and other intelligence gathering the JTTF are using; and where this information is sent. Ultimately, it winds up somewhere: Which contractors, NSC staffers have access to these reports.
E. Examine with Congressional Counsel whether it is the intent that these domestic security services operate this way; and whether, as FISA is written, this type of activity would fall outside what the FISA Court can engage.
F. Review the DHS domestic interrogation facilities. Look at the gas mileage for the DHS pick up teams. Review the files they've had access to; and the basis for detaining someone. Review the complaints of citizens being forcibly removed from their cars, engines running, or being taken from their homes while school children are present in the early morning. Evidence includes car impound fees.
G. Discuss with POST and local LE efforts used to dissuade public awareness of intelligence gathering: Excuses given to hide pre-textual stops; and examine whether local officials do or do not keep adequate records related to officer complaints and requests for civilian oversight to examine officer misconduct.
H. Examine problems during audits: To what extent officers in LE, FBI, and DHS are concerned when reports of officer misconduct arise; and what methods auditors are aware to segregate complaints about officer misconduct from auditors:

1. Have they been asked to leave the room; were concerns explained away; were officers complaining they were "short manned" an unable to supervise; and how do these explanations square with the officer conduct.
2. How often are these units employed to provoke innocent civilians to respond to abuse?
3. To what extent are these domestic units used to harass civilians based on a "hunch"?
4. Would these units put the children of minors at risk to entrap a suspected target?
5. Is there no report of any of these personnel ever exposing a minor to a potentially unsafe situation to engage a target?
6. Has the FISA court, Congress, and Judiciary been fully apprised of how these units operate; their procedures; and oversight requirement to ensure 42 USC 1983 claims are minimized?
7. What insurance do these units have if they are engaged in liable action?
Posted by:
Date: July 27, 2007 5:37 PM
Printer Friendly | Permalink |  | Top
 
Oilwellian Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:38 PM
Response to Reply #98
105. That's only the first one
There's much much more. Perhaps we should post it all here for preservation's sake.
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:40 PM
Response to Reply #105
106. all of them posted here (as of this p.m.):
Printer Friendly | Permalink |  | Top
 
kineneb Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:29 PM
Response to Reply #106
130. anyone know how to contact Greg Palast fast? nt
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:59 PM
Response to Reply #130
142. Randi can get in touch with him. Post a link on her site for her to read
this thread and the one we are commenting on.

I sent email at http://gregpalast.com and sent email to Democracy Now! at mailto:mail@democracynow.org. Amy can get in touch with him too.

Malloy can reach him, too. He's still sick. Mike, are you reading DU know? We need to get in touch with Palast.
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:46 PM
Response to Reply #106
162. These are NOT all of them. I have been following this for ~ a week on Muckraker
Edited on Tue Jul-31-07 10:49 PM by mod mom
and the posts have been appearing for ~ a month, not only on muckraker but also on CREW. Someone asked Anonymous poster if he/she also posted at CREW and the gave the link in my post above which is from June. There was talk there (Muck comments) of this Frontline episode:



Although the president told the nation that his NSA eavesdropping program was limited to known Al Qaeda agents or supporters abroad making calls into the U.S., comments of other administration officials and intelligence veterans indicate that the NSA cast its net far more widely. AT&T technician Mark Klein inadvertently discovered that the whole flow of Internet traffic in several AT&T operations centers was being regularly diverted to the NSA, a charge indirectly substantiated by John Yoo, the Justice Department lawyer who wrote the official legal memos legitimizing the president's warrantless wiretapping program. Yoo told FRONTLINE: "The government needs to have access to international communications so that it can try to find communications that are coming into the country where Al Qaeda's trying to send messages to cell members in the country. In order to do that, it does have to have access to communication networks."

Spying on the Home Front also looks at a massive FBI data sweep in December 2003. On a tip that Al Qaeda "might have an interest in Las Vegas" around New Year's 2004, the FBI demanded records from all hotels, airlines, rental car agencies, casinos and other businesses on every person who visited Las Vegas in the run-up to the holiday. Stephen Sprouse and Kristin Douglas of Kansas City, Mo., object to being caught in the FBI dragnet in Las Vegas just because they happened to get married there at the wrong moment. Says Douglas, "I'm sure that the government does a lot of things that I don't know about, and I've always been OK with that -- until I found out that I was included."

A check of all 250,000 Las Vegas visitors against terrorist watch lists turned up no known terrorist suspects or associates of suspects. The FBI told FRONTLINE that the records had been kept for more than two years, but have now all been destroyed.

In the broad reach of NSA eavesdropping, the massive FBI data sweep in Las Vegas, access to records gathered by private database companies that allows government agencies to avoid the limitations provided by the Privacy Act, and nearly 200 other government data-mining programs identified by the Government Accounting Office, experienced national security officials and government attorneys see a troubling and potentially dangerous collision between the strategy of pre-emption and the Fourth Amendment's protections against unreasonable search and seizure.

Peter Swire, a law professor and former White House privacy adviser to President Clinton, tells FRONTLINE that since 9/11 the government has been moving away from the traditional legal standard of investigations based on individual suspicion to generalized suspicion. The new standard, Swire says, is: "Check everybody. Everybody is a suspect."

http://www.pbs.org/wgbh/pages/frontline/homefront/etc/synopsis.html

Printer Friendly | Permalink |  | Top
 
OmmmSweetOmmm Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:40 PM
Response to Reply #105
107. I have to find the other and keeping it in one place is a great idea. We can then log it into our
journals.
Printer Friendly | Permalink |  | Top
 
Oilwellian Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:53 PM
Response to Reply #98
109. More....holy moly...it's a lot when it's all together
STUDY MUELLER'S HESITATION

I would encourage a "fresh look" at not just the transcript, but the _audio_:

<"Mueller: The discussion was on a National -- uh, NSA program that has been much discussed, yes.">

It appears he _almost_ mentioned "national security council" program. . . NSC is not the same as NSA. Another way to read between the lines . . ."National security program": Something that is _outside_ FISA; and _outside_ what the FISA current covers. . .although it was intended to cover _all_ things.

Listen closely to the pauses, spacing, and hemming and hawing. Mueller is dancing around something that -- it appears -- President and AG have said falls "outside" the FISA-coverage: This might be a Canadian-Australian-NZ-UK data transfer program: Whereby non-US interception methods are used, but the data is forwarded to the NSA through non-direct US means.

. . . .

Also, if the Senate's Leahy/Specter do not trust Gonzalez, why would they trust him on this AG-certifications under FISA? If he's been lying to the Senate, then his AG-certifications on "OK to do this without a warrant" are also in doubt. He could define anything -- rightly or wrongly -- as being under that umbrella.
Question becomes: What certification has the AG made on things that not even the Gang of 8 was told about; and how was the NSC (not NSA) involved with the oversight of this, outside FISA-Gang of 8 review?
"National security" could mean: "Maintaining morale" or "maintaining confidence": That could mean providing false information to the public; or, based on data mining, issuing public news releases to justify public support for illegal activity; or maintain confidence in something that was an illegal contract. This would involve capture through NSA of meta-language; then stripping out identifying information;; then transferring that data to a firm like Flieshman Hilliard which would examine it, and issue public news releases on various government "public oversight" and "media messaging issues": Smith Act issues in re domestic propaganda: Possibly a "public service" announcement to maintain loyalty in non-sense. Something for AT&T to discuss.

_______________________________________

LEARN LESSON OF OLC IN RE SUBPOENA RESPONSES

Recall, OLC issued a "memo" saying that WH Counsel did not have to testify. This, according to the WH, was "gospel." Untrue, but that's another issue. OLC made a "rule" and then everyone said, "See, that's what they said."
Now, consider this, from TPMM quote, above: <"that program was not something that was legally controversial."> That could mean anything, anybody, and without reference to any legal standard.

"not legally controversial" . . . _according to whom_. . . ?...:
- OLC?
- Consensus within NSC?
- Consensus within NSA?
- Rove's determination?
- Gonzalez assessment after talking to Goodling about door mats for the Hoover Building?
. . .

What's their idea of "non legal controversy", as opposed to a "controversy that is real, but not based on a law, just the Constitution"?

What is someone like Darth Cheney said, "We need to justify this -- find a reason. Ignore words in the law if you need to. Just give me a memo. You get an appointment to the bench if you can figure this out." What if Roberts or Alito gave a really good opinion on this and made everyone -- in that room -- believe it was "not controversial", even though it was?

. . .

Again, saying <"that program was not something that was legally controversial."> could mean:
A. "other programs" were controversial;
B. "other groups" _are_ doing illegal things, but you haven't asked us about them, so we haven't made up a lie. . . yet;
C. OLC "determined" (using a feather, some fairy dust, and after gazing into GOodling's eyes) that anything the NSC wanted to do under Cheney was OK, just as long as nobody traced the money.
. . .

There's another way of looking at this <"that program was not something that was legally controversial.">
D. "This program" is different from "that program" which has been hidden in another budget, unrelated to the NSA or NSC:
E. DoD _is_ allowed to do things overseas, and contractors have been assigned -- working for those _overseas_ entities -- in the US.
F. The data that is managed is channelled, but the contractors have no idea who it is they are monitoring: All they see is the raw data; someone else then recombines the data if there is a problem.
G. If we find a problem in the data, we then use the data we've collected to justify the warrant; if we can't get one, we self-issue one, and get the AG to certify it as being OK> Never mind that Qwest objected.
<"that program was not something that was legally controversial."> could also mean:
H. Legal counsel assigned to our units have been told to keep their comments to themselves
I. All contracts supporting this activity are -- by definition -- "legal contracts"; (just don't talk about whether they support a lawful or unlawful objective. Far too scary to contemplate!)
J. "not controversial" could mean all the legal views that opposed it were ignored; and the remaining opinions were in "full support".
K. The legal counsel who knew of the Constitutional violations were sent to Guantanamo, threatened with nasty things: "To the washroom, counsellor! No gloves for you."
L. Legal counsel who remained quiet were promised a "good rating" by "the decider" in their upcoming DOJ ranking list -- the names given to the Senate for Federal Benches.

"not legally controversial" could mean all case law showing it was illegal was ignored; or selectively rewritten, as Addington well did with the Iran-Contra minority report.

<"that program was not something that was legally controversial."> could mean: other programs were contentious; but since AG Gonzalez is on the pig-spit this week, we need to pretend we are concerned, even though we are not.
The people who said this was "no problem" and were not saying tat it was lawful, just that it wouldn't be a problem to find a judge who they could bribe to not take action.

"not legally controversial" does not mean that it was legal; only that the in "someone's mind" (God knows where) their idea of "controversial" is a different definition which does not use controversy. Maybe legal counsel who opposed were _not_ using spears with _poison_ tips, so the spin misters said, "See not controversial, if they ere really upset they would have had nasty poison, the kind that makes Ebola look like a fuzzy kitten." The infamy! How dare they!

______________________________________

don't personally think the fact that they are or are not referring to "this" or "that" or "TSP" or "Not TSP" is the issue: The fact is that there isn't a consistent story, raising the question: What other activity is occurring that may be an NSA-related function, but has been organized to fall _outside_ FISA oversight, but is still illegal under the Constitution:
- Roving bands of contractors harassing US citizens;
- Temporary detention centers to detain US citizens without warrant or trial;
- Use of tax information by JTTF to compel US citizens to explain things that the agents are not able to determine through NSA intercepts
- Groups whose sole function is to fill in the gaps in the NSA intercepts, and provide some meat to explain what is going on with something that is unusual, but they don't want the court to know they're looking at . . . again.

Recall, the RNC has deleted/destroyed e-mail. If this "other program" were "OK," how does the RNC explain the failure to retain detain related to an ongoing "OK" activity?
The question goes back to DOJ, OLC, and outside counsel: < "When you learned of the "other programs" involved with this intelligence activity, did you fear that the information in the RNC accounts would be disclosed; or was there something you learned from the EU -- and CIA visits with the EU -- which prompted the evidence destruction related to rendition, FISA< prisoner abuse, and other things OLC apparently "all agreed" -- in a perverse Yoo-like fashion -- was "lawful". . . (never mind Geneva, FISA< or The Constitutional requirements)." >

Sounds like a law firm which was auditing a company related to various NSA programs and prisoner transfers should have detected this chance of fraud, and internal control problems. Or is a law firm saying, despite attestations to the SEC on those financial statements, that they had "no idea" what was going on, despite counsel's awareness of the activity -- as evidenced by their meeting with the DoD General Counsel's staff on these very issues?

_____________________________________________

My question is:

mo2" How do we know October 2001 was the beginning of the illegal spying program?"

Excellent point: We don't; allegations are that the _illegal_ surveillance started _before_ Sept 2001.

-------------

mo2: "Given that Bush/Rice were warned about al quaeda before Bush was sworn in in 2001, why is it thought that they did absolutely nothing before October 2001?"

Good point again.

mo2:" Because they say so is not good enough."

Right. Getting warmer.

-------------

mo2: Could it be that they did do something, but that something was illegal?

You are correct.

mo2: "And they feel it is better to be called do-nothings than criminals?"

Also, they like the idea people are focusing on the wrong surveillance, wrong time period: The confusion menas they can blame Congress for "not asking teh right questions."

mo2: "Can somebody please provide the link to the testimony that says the TSP started on October 1, 2001?"

Someone said that, you're correct; but TSP isn't necessarily what's being talked about.

- - - - -

THe point is: If the GOP will not convice Gonzalez for lying, then Gonzalez needs to explain why his comments are _true_:
- What programs could exist under both the inconsenst statementes of Gonzalez; and also the disparity between what Gonzalez and Mueller are saying.

The GOP Senators canot have it both ways: Sayhing, "AG is telling the truth; but not having any information to support _that_ conclusion.

___________________________________

Posted by: mo2
Date: July 27, 2007 7:50 PM

The problem they have: Not only were they doign illegal things _before_ Sept 2001; those illegal things did _not_ work.

There's no basis for the President to say, "We need to do more of this illegal stuff" as it didn't work before Sept 2001; rather, what's needed is the opposite: "Given we tried ilegal things, and _that_ didn't work, who has some other ideas?"

They can't ask _that_ question because they'll admit:
1. They screwed up
2. They have no clue
3. They're not able to hire someone to help them out

The only option they have is to pretend the problem is one thing; and then solve that "new problem" in a way that appears to solve it. Forget the fact that the problem they may be "sovling" is illusory. They may have defined the program in terms of what _appears_ to be a solveable problem.

IN other words, if they've realized that they can't win, they<'ll [a> redefine the enemy in terms of what Congress can be led to believe is a credilbe threat; and redefine the solution in terms of not solvinga real problem, but in terms of what appers to solve what they've created the impression is the problem.

Problems, solutions, reality, and the illusion may or may not be matching: This may explain why things are not appearing all that straightforward: They're still tring to figure out how they're in power despite their stupidity.

_____________________________________

KNOW THE NATURE OF US GOVERNMENT LEGAL COUNSEL AND WHAT THEY ARE CAPABLE OF DOING

I read this, and thought of the attorneys in DOJ who were saying gum this to death; and what Gonzalez has been saying/doing -- Lying, obstruction: <"Army attorneys sent each other congratulatory e-mails for keeping criminal investigators at bay">

The quote and subject are not as important as the point: US Government legal counsel will obstruct justice, and stupidly document that obstruction: How many of the RNC e-mails would WH-EOP-OVP-DoJ staff counsel have sent back and forth on their progress in blocking review of FISA, Geneva, and other illegal activity; then delete these e-mails when they learned it was on the Libby/Abramoff Grand Jury subpoena list?

Know who you're up against: People who have no remorse over engaging in illegal conduct, and (apparently) hiding evidence related to executions of people who opposite reckless conduct. These are lawyers who are doing this: The very people who supposedly are the "best" and "brightest" in the legal profession: The same people who are put on the Federal Benches. Congress needs to take a wider view of the DOJ Staff misconduct in re FISA, Geneva, rendition, and prisoner abuse.

Doesn't look as through Congress has really woken up to the recklessness in the legal community. Let's get some state level disbarment investigations going; and forward the results to the public so we can throw it back at them during future confirmation hearings.

The lawyers were behind the Watergate break-ins, and the Holocaust. We can't let this happen again, and the lawyers need to be put on a tight leash. They've defied their oath, putting their party and President before the Constitution. That which is not lawfully opposed, will continue; the legal profession, left unleashed, will do what is least expected: Turn the law inside out to justify genocide, war crimes, prisoner abuse, and defiance of their oath and Constitution.

A president does not do this on their own; nor does a Congress -- with lawful options to end it -- have much of a defense when they have powers to investigate, block funding, and compel oversight. The Ranking Members of the Committees have had this power to compel reviews since day one. Doesn't matter that the GOP "controlled" Congress: The DNC has the power to filibuster bills; and could have issued letters to the DoJ-NSA-CIA-DoD IG requesting assistance. There's no merit to any assertion that "nobody was going to do anything" -- how do the Members of Congress explain the effort to _do_ something: Pass proclamations calling for Congress to impeach _despite_ the GOP "controlling" the US Government.

One answer: There is a way to lawfully oppose. There is no merit to any assertion that there is no opting; or that were are stuck with this abuse. There is a way: If Congress will not oppose this abuse; and Congress will not end funding, then there is _someone else_ who can be trusted to assert their oath, and defend the Constitution. Assent to DNC-GOP joint assent to this despotism is unacceptable. It doesn't matter if its unwillingness to impeach, refusal to investigate, inaction on subpoenas, or stupid assent to DoJ-US Atty decisions to do nothing to enforce the law. _Someone else_ can be found who _will_ do their job. Stop listening to excuses of why this "cannot" be done;and _find_ a way to make those who have an oath to _do_ their job: Defend the Constitution, even it means prosecuting the President, VP, Speaker, and House Judiciary Chairman for violating Geneva; and refusing to enforce the Constitution using all lawful options. It is reckless -- this many years after 9-11 and the disclosures of the prisoner abuse and illegal NSA -- for Congress to be still rubber stamping legislation/funding: There are options to end the funding, which the DNC refuses; and there are options to lawfully target legal counsel complicit with this illegal activity.

This isn't about DoJ, FISA, or RNC e-mails, but whether legal counsel -- with that "special position of trust before the court" -- can really be trusted; or whether they need to be overseen, audited, and intruded upon as if they were a branch of government. America's legal counsel have expected too much deference for reckless service; and this many years after the illegal activity has surfaced it is absurd for the American legal community to flaunt "how great it is" or ask anyone to embrace the "American model" when the lawyers have their disastrous results on _their_ hand. Their only solution appears to be to laugh at what they've done to gum things up; never realizing We the People have the option to get them disbarred, and make _them_ the lawful target of war crimes prosecutions. America's lawyers, indeed, did learn the lesson of the Holocaust: How to commit illegal warfare and not get caught. We the People have something to say about that. This is far from over. These are issues of international criminal law with one large defense pool: American legal counsel inside DoJ, OVP, DoD, and outside counsel

They wished this.

- - - -

there were too many shows going on in Afghanistan; they were really not going after AlQueda; and the staged engagements were just a dog and pony show, not really serious about defeating an enemy.]

___________________________________________

Posted by: TheraP
Date: July 29, 2007 4:21 PM

TheraP" And ask why the illegal activity is being funded."

TheraP: "And that is a very good question. Why have things been reauthorized over and over?"

- - - -

TheraP: "And what blackmail or bribery or whatever is being used to keep people in line?"

TheraP: "And, where is the paper trail for that?"

- - -

1. There is the option to cut funding:
http://rawstory.com/news/2007/Murtha_says_Pentagon_frustrates_Congressional_oversight_0727.html

2. People who have been complicit with Geneva violations -- malfeasance in failing to cut budgets -- like to change the subject.

3. Google: < descriptive summaries NSA 614113 R-2 >

4. Google < JROC NSA >

5. Google < " Under any civilized judicial system he could have been impeached and removed from office or convicted of malfeasance in office on account of the scheming malevolence with which he administered injustice. ">

6. Google <5 USC 3331 malfeasance >

7. Google <32 CFR 2800 Ad Hoc Committees >

8. Google < Statement Accounting standard 74 compliance >

9. Before Sept 2001, NSA had program funding for a lawful NSA surveillance method which fully complied with FISA. JROC is the DoD group which oversees the funding/program authorization; they make decisions: "Is there a _cheaper_ way to do this?" They decided that they had to spend money. Then it was cancelled. Someone made the decision to _cancel_ what is _lawful_; but Congress is making a decision to _keep funding_ what is _illegal_.

10. Evidence is not only what exists; but the _absense_ what what should exist: The Ranking Members of the Committees 2001-2006 had the _option_ to document their concerns; and forward that concern to the DOD-NSA-CIA-DOJ IG.

11. Compliance audits of OVP would have detected the documentation of whether OVP, Addington, and others aware of rendition, NSA survilance were or were not retaining records. The auditors have been blocked.

- - - -

_Q&A_

TP1: See 2, then 11.

TP2: See 1, then 10.

TP3: See 5, then 2.

TP4: See 3, then revisit 2, then 1; then reconsider 7, then link with 8; then reconsider 10.

___________________________________

"But now it makes me wonder if there are any events in the US related to the London bombings?"
Posted by: TheraP
Date: July 29, 2007 3:11 PM

- - - -
1. Google: <"attorneys sent each other congratulatory e-mails for keeping criminal investigators at bay">

2. Google: < Procurement Guidance Documents Software PGD >

- - - -

3. Consider: RNC offices were attacked in the run up to the 2006 elections.

4. Compare the following
A. Location of attacks on RNC offices before the election;
B. Point spread of RNC going into the election in those districts.

5. Consider: RNC wrote a note/letter to the unions "complaining" about "unions" attacking the RNC offices.

6. If you could convince someone "your opponent' was engaged in "dirty tricks" would that not convince some of the opposition to rejoin you and denounce "the opposition"?

7. Then consider: Supposedly the RNC 'knew" enough to write a letter to "who was involved"? Why didn't the US Atty's bring prosecutions:

8. The information in the RNC/DoJ offices will show you:
A. What basis there was to conclude "the unions" were behind the attacks ;
B. The subsequent discussion on prosecutions, or non-prosecutions;
C. Which DoJ staff liaison were involved with the campaigns;
D. The IP Numbers for the DOJ Staff not involved on processing FISA warrants, but engaged in discussions/non-official business using official government resources.

9. Evidence isn't just what exists, but what is _absent_ but what _should exist_

- - - - - - -
_Q&A_

A. Funding, records: What physical evidence was retained of the RNC office destruction; who was assigned; and how was the investigation closed out: Either there is a report, and that report was given to the RNC as the basis for their "letter about the unions"; or there is no evidence, and no basis for the letter.

B. These are issues of criminal law, not just e-mail or voting. That State AG would have to get information from the JTTF to understand what basis there was to conclude that terrorism was _not_ an issue; and who should have been involved with the preliminary review _before_ the RNC issued their letter to the DNC.

C. Link to FISA warrants: The same DoJ Staff computers that were "supposed" to be working with the FISA warrants, are linked with non-official business. How did the RNC get the "fast answer" on what was 'going on' with these attacks; but the AG says that he's "undermanned" and "can't process FISA warrants"?

D. Where is the US Atty review of the evidence related to these attacks on the RNC offices; and how did the US atty go through the process to decline prosecution: Which FBI agents were involved; which State officials were assigned to which fusion center; and how was CIFA involved; were there no NSLs issued to determine who was involved?

E. What is the explanation of the FBI director, and those assigned to the FBI support staff: Do they have no OPR experience; or is there a supervising problem within the FBI; is there any record of any of the FBI agents "involved" with this "investigation" not fully reviewing anything, ever while they were a SAC, ASAC, or assigned to DOJ OPR; what review per SAS74/99 was done of the DOJ OPR/IG/FBI budgets in light of these fraud indicators?

F. When the reports within the FBI of leadership not doing what they should, how was this addressed?

G. Issue: Voting fraud, absent/incomplete investigation files; property destruction. No JTTF concern or prosecutors?

H. JCS and CIFA are also involved with domestic surveillance. What was the DoD General Counsel's involvement with the notifications related to these domestic issues: Was terrorism not on the notification list; was the DOD General counsel not consulted; was DoD General counsel never in receipt of, connected to any briefing given to anyone at the White House related to DoD domestic intelligence gathering efforts?

Someone was briefed: No other explanation for the RNC letter. The question is whether the _appropriate_ investigations, notifications were or were not made: These calls, reports are logged in the correspondence logs; and they are tracked with various messages, workflows, and other assignments. Within Microsoft Outlook, there is a scheduling function: That information is familiar to you via the US Atty e-mail disclosures. Rove's link to Microsoft Outlook is clear; the question is whether the DOJ Staff IP numbers -- commonly linked to outside sites in other states -- were or were not reviewed by the Grand Jury when they examined the third-party-data transfer systems. Recall how quickly legal counsel coordinated on the Libby defense memoranda: They have a file sharing capability; however, Goodlings notifications of "delete this file" means that the auto-notification feature was turned off; or the file sharing system was not being used.

Questions:

A. Which DoJ Small Business Contract personnel were involved with the computer/IT/SW updates related to the DOJ-RNC file transfer systems;

B. Where is a copy of the computer utilization meeting minutes where the pro/con of a file transfer system was discussed; who approved the budget profile within DoJ; and how was this decision coordinated with the RNC;

C. If the file transfer system was in place -- and not subject to any "recent" review (Since 2001), why did Goodling not rely on the auto-notify feature when forwarding the updates to the readers?

D. Where are the e-mail notifications to the DoJ staff related to authorization for them to use, access, and transfer data using this file transfer system; when were the authorizations sent; who ensured the continued use and access to this system was proper; how were non-official uses of this system monitored; were there any efforts by non-DoJ personnel to use this system to transfer non-official records?

______________________________________________

S1: Procedure check sheets: "there must be paper trails of procedures."
S2: Investigations: "Procedures for everything! And whether it is investigations that took place (or didn't)"
S3: Evidence: "what kinds of paper trails may exist"
S4: Storage: "what form they might be stored"
S5: Indicators: "what the data suggest was happening"
- - - -
"Just a tiny example of how one strange event can lead to another - and more evidence of something really strange - and probably illegal going on."
- - -- -

Yes. It's all connected: The open source will dance around the illegal information that has been illegally classified.

Google < GAGAS > These are some of the procedures to audit.
Google < CFR > These are things that are standards that are audited. Note, an

EO may or may not apply; and a CFR may or may not apply.

Google <38 CFR 2800 > These are the Security classification _procedures_ that the VP must comply related to _classified information_.

Google < Statement Accounting Standard 74 Compliance > This is the standard used to review entities receiving Federal Funds: To review their internal controls.

Google < SAS 99 > These are the fraud indicators used to assess whether auditors should increase or decrease audit scope. More indicators of fraud, trigger more sampling. If there are audit risks, but the auditor does _not_ increase audit scope, that is a problem for the _auditor_ not juts the original _audit target_.
- - - -

Recent discussions about whether the President's EO "do or do not apply to OVP" are irrelevant: 38 CFR 2800 _does_.
- - - -
Google < Manual of Administrative Operations and Procedures > and/or < Manual of Investigative Operations and Guidelines > -- These are the FBI standards.

Google < USAM >

These guidelines show how the prosecutors and investigators find evidence, comply with internal procedures, and do things to enforce the law.

Google < CONGRESSIONAL AND COMMITTEE PROCEDURE; INVESTIGATIONS > These are the guidelines for _Congress_ to meet.

Google < PART 160 DEFENSE ACQUISITION REGULATORY SYSTEM > -- These are some example guidelines of what people are supposed to follow. Auditors are supposed to review these requirements; then do audit/samples to test whether the procedures are or are not being followed.

Once the auditor completes their review, they provide an audit report. The report is sometimes called a report of an "audit engagement". Either the audit report exists or it does not; either management met the requirements, or it did not; either the management developed a plan to correct their problems, or they did not. Once an audit is done, there is required _follow-up to test whether the implemented solutions solve the _original_ problem identified. Either the program/solution is _solving_ the problem or it is not.
- - - -

There's also problem the President has: There are mandatory audits which _he_ has to oversee, but the audit target is _outside his control_ This means, that we can test whether the _president's auditors_ were or were not doing their job.

Google < PART 266 AUDITS OF STATE AND LOCAL GOVERNMENTS, INSTITUTIONS OF HIGHER EDUCATION, AND OTHER NONPROFIT INSTITUTIONS >

That is the trap that Congress has laid. By funding these "non-US government entities", what Congress has created are entities which can _observe_ whether the President is or is not overseeing his auditors; and how competent the audits are.

Don't miss the point: Congress is allowed to set up dummy entities not to waste money, but to create _bait_ that the President is _required_ to engage, target, and put under surveillance. The Presidents' problem is that he doesn't know which of the companies are real; or which ones are bait that are direct reporting units to the Congressional staffers.

Anything that the bait detects is then back challenged to Congress: Has the team from the President's office attempted to do something inappropriate; have the audit rules been followed; or have there been unusual interactions suggesting that the President and RNC have attempted to deploy "people not related to the President".

The problem: Once Congress creates this dummy entity, from that point on, all interactions with that entity are from a specific _time_. Congress can then use the President's efforts to interact -- directly or indirectly -- and test:

A. What are the President's method to share information about the upcoming target;
B. Who is coordinating;
C. And are the President's personnel able to professional respond to unusual situations.

These are part of the _designed_ problems the President is forced to confront. Then, going backwards from the audit, we can examine

1. Which data fields did the President's auditors use, access, and adjust when _preparing_ for the audit;
2. Which records _only related to this dummy audit_ were created; and how were those records updated; and how was the information sent/transmitted/stored
3. Once we let this data sit for a while, and then create the impression that there ha has been illegal activity, what effort do legal counsel, the President, DOJ staff, and others make to destroy that audit data that was _only_ connected to that bogus entity.

This is what has happened with the President right now. He and his auditors have been set up; the records that they've destroyed were based on discrete communications on specific dates and times. Before that information was received, the records were fine; after the data was received, the records were destroyed.

SO we can pinpoint:

1. What the President, DoJ Staff, legal counsel, OVP, EOP, and others were told; how they were told; and the means that the records were stored;
2. The time that the triggering event occurred;
3. Then trace the record holes -- knowing that a credible search would trigger responses related to the known target.

Once those known targets are missing, then we broaden the line of inquiry:
A. When did legal counsel review the information, procedures, and conduct an audit;
B. Who last had access;
C. Who had the responsibility to establish this baseline.

It can't be changed. Either its there; or its not. The President's problem is he doesn't know which of the data sets have been planted; and that doesn't matter: There are known holes that were once linked with information that outside personnel put there _knowing_ they would be removed.

There is a second set of data that can be compared to the existing data set. That second data set is a clean version of all the data. Had the auditors done their job, and the records not been destroyed, the clean/secure version would match the President's version. Again, we don't need t to see any details of how they do things: We only need to plant the data, and let the President put that information where it is supposed to go; then let him destroy it. Then the second/secure data set is presented to the Grand Jury, and the Grand Jury can see the holes; and the _time_ that the holes were created.

That is his problem with the FISA, Prisoner abuse, and the Geneva violations. Discrete information was transmitted; and on specific dates the NSA, NSC, and President were _known_ to believe something that was orchestrated. They've reacted to something they thought was real. Whether it was or was not real is irrelevant. The point is that the data existed; then its missing; and the missing holes are linked with specific lines of data and evidence that only specific people were told.

Those people are linked with specific offices, budgets, computers. It's all been stored, secure, and even if they destroy the records, they have no idea what other things are happening. This has been done using methods the NSA cannot detect. There are Trojan horses inside the NSA systems, WH computers, and other things: They are not viruses, but they are discrete information packages that are organized in unique ways. They're either there, as they're supposed to be; or they've been destroyed.

Part of the answer to this is the Congressional Correspond log. These are the records that show when Members of Congress were notified by letter of certain things. JCS, NSA, WH, and all other departments have the same type of tracking systems. If you noticed on the DOJ e-mails, you may have come across something called a "work flow": These are discrete tasks. Once a person is assigned a task, that is logged; either the log is OK, and has the information; or the log has been tampered with.

Again, once NSC and NSA have been triggered with a known event that will catch their attention, that package of information will get stored. Either it is still there as it should be, and the auditors can locate it; or its not there, because its been tampered with. Once the auditors know which information they're looking for, but that information is gone, then they can tell something about the entities responsiveness; procedural compliance. If its there, fine; but if its missing, then they do a flow charge of the procedures from data collection to data storage. They can tell who accessed it; which personnel had which authorities; and when the information -- known to have been stored -- was removed.
That removal is linked with pre-destruction e-mails, guidance, and other memoranda linked with the legal counsel. The problem is when legal counsel also has missing gaps at the same time as the data is missing.

Here's the problem for the President and Congress and outside legal counsel: Once the dummy entity is created, it can be determined who was aware of that information; and the means by which Congress, the President, outside counsel and others coordinated their efforts to retaliate, identify, and discredit those who are involved.

Once the President and/or Congress and/or legal counsel issue a subpoena for something that is _false_; and has been created with the intent to _identify_ the methods the President is using to support illegal activity, that court action is linked to that discrete task. The problem is the legal counsel, Congress, and President have rushed without thinking, and have generated evidence, memoranda, notes, and communications.

The issue isn't what _is_ going one, but is the _line of evidence_ that should be in the Congressional computers, Presidents' files, and the legal counsel records be there? Their problem is they cannot control the records _of their responses, messages, communications, and documentation_ which have been stored _outside their control_. Again, we have two sets of data: The data that should be there if things were going as required; and the remaining data that will have holes.

Once we align the two timelines, the holes will then be traceable to legal counsel communications, presidential notes, conversations, and Member of Congress communications. Don't miss the point: Congress and the President, not just legal counsel, have a problem. There are required stops that all three have taken; and then not acted on. They're stuck. This goes back to 2001. They can't prevent the comparison between what should have happened; vs what their records say happened. The holes are things they can't go back and fill. They're not sure exactly what they were dealing with.

REVIEW

The first line of evidence is in the Congressional correspond logs. These are the notification dates to Congress on FISA violations, illegal activity, prisoner abuse, and other things.

The second lines of evidence is the IG memoranda they get from the ranking Members related to problems.

The third line of evidence is the audit engagement and workflow.

The fourth line of evidence is the audit report of compliance related to that audit engagement.

The fifth line of evidence is the safeguarded information which the President, Congress, and legal counsel have been exposed to and either: Ignored, reacted to, panicked, or did what they were supposed to do.

This information relates to the safeguarded information provided to outside personnel at the EU; and has been transmitted by the CIA to foreign entities.

Then we go down the oath of office, list of malfeasance standards, and start our prosecutions of Members of Congress, the President, VP, legal counsel, DoJ-EOP-OVP legal staff. They're stuck. This isn't just a data retention problem, this is related to allegations of war crimes, malfeasance.

Small tiny problem: It's July 2007, sixteen <16> months before the 2008 election. Congress, the President, and legal counsel know they are stuck. Normally, they have the advantage on their side: They can find a scapegoat, and agree to pin the problem on them; this time -- they are the problem, and they can't bury this.

All the notifications to Congress are documented; legislative immunity falls apart; and their defenses fall away when we look at what they did; then compare it with what they should have done per 5 USC 3331, their oath of office. We need only look at the FISA violations -- as reported publicly -- then compare that with the open information -- of that illegal activity -- and contrast that with the votes: They, knowing there was a problem with illegal activity, continued to fund and spend money on things that violated the Constitution. Nobody made them. they freely chose to do this; despite knowing of that illegal activity, they did not -- as they had the power to do -- either document their concerns with the IGS or US Atty; nor did they remove themselves from the votes to pay for what they should have known was not lawful.

_Your Points_

S1: Procedure check sheets: "there must be paper trails of procedures." -- Yes, and these are not classified. They are open records. Auditors' compliance testing is also public evidence.

S2: Investigations: < "Procedures for everything! And whether it is investigations that took place (or didn't)" > Indeed.

S3: Evidence: < "what kinds of paper trails may exist" > Right again. Not complicated.

S4: Storage: < "what form they might be stored" > Right, and there are standards not only for the way the data is stored; but also the physical infrastructure used: Not just information, but security of that IT hardware that comes up with a 32 CFR 2800 audit.

S5: Indicators: < "what the data suggest was happening" > Right, all we have to do is ook at the holes. The bigger the hole, the bigger the problem _they_ have. The key is the timeline: What happened; what was their _known_ response; and then what is missing _despite_ their procedures to follow when notified of that event/information.

Evidence is not needed proving that they didn't do their job; the fact that there are holes this big, and no correction, but continued funding is enough. Take your pick: This is all over the place. You have to decide your deadline to make this decision; and when you want to stop. _That's_ the concern: It appears people are spending so much time digging through this evidence, that they're missing the big picture: Each line of evidence isn't telling us new information: It's part of the same kettle of fish: Malfeasance in re FISA violations, prisoner abuse, rendition, war crimes, and oath of office.

Time to engage with the State AGs. All fifty <50> of them, and bring in the Certified Fraud Examiners, Auditors, and some people who have some inclination of the prosecution possible against the Members of Congress, president, VP, and legal counsel in OVP, DoJ, EOP, and outside legal counsel. We don't need more evidence; we need some public trials, indictments, prosecutions, legal counsel disbarments, and jail time. The oath wasn't enough to inspire them.

_______________________________________

Posted by: The Oracle
Date: July 29, 2007 9:59 PM

You are correct. They use a system of intermediaries who process the FISA warrants. They're also located overseas.

Also, think broadly when you See the word "data mining" What could someone be induced to believe was "lawful"? If a "computer" does the "mining" does that mean a "person" isn't violating the Constitution? Someone's argued that.

The problem is fiduciary duty; and responsibility. Someone had to write the software; and that software was written with the intent it do something; then someone has to audit that software to ensure it meets the requirements. That auditor is supposed to review:

A. What are the legal requirements, restrictions;
B. What is this software doing;
C. Are there any problems
D. Has the certification of that legal compliance been tested independently?

Oversight means overseeing, not pointing to confusion, and hoping it remains hidden behind a secret briefing. Either it's explained in plain English; or it is not. The problem is when FISA violations are rubber stamped on the basis of gobbly goop.

The Constitution is very simple and clear. All that is required is that you comply with it. When you ignore it, then you have a problem: The "excuses to ignore" these simple rules, then become the same excuse to ignore planning, leadership, oversight, backups, training, and audits. Then we have Katrina, botched operations in Afghanistan, and a President that has to be fed lines because he can't think on his feet. We need real leadership, not what we have.

____________________________________________

So that's why they had to classify everything!!!"
Posted by: TheraP
Date: July 29, 2007 10:52 PM
- - - -
Google < ORCON Executive Order corruption >
- - -
Yes, and there's a rule about that as well: ORCON, it's illegal go classify evidence of illegal activity.

Which takes us back to the dispute over Cheney's assertion that "that" EO "didn't apply." The "EO that did or didn't apply" contains the rules on ORCON.
It doesn't matter whether the "_EO_" did or didn't apply, the _32 CFR 2800_ does apply: It has OVP name on it. It can be enforced through prosecutions; and that CFR _does_ list EOs which _do_ apply.

Whether the _standards listed_ does or does not apply is meaningless; the issue is whether the _requirement_ regardless which standard is used, ignored, or explained away is _legally enforceable_. Arguing over which EO does or doesn't apply is a distraction from the ORCON requirements which prohibit classification of that data; and the data which _must_ be protected per the applicable CFR: 38 CFR 2800.
- - - -
This takes us back to the RNC e-mails. Recall, the White Hose legal counsel did something very stupid:
1. Determined that the information would be protected by privilege
2. Created an illegal backup database
3. Destroyed that database

Here's the problem, and why we know legal counsel was involved: Once someone assumes a database will "never" see the light of day; they have a choice: Do they talk candidly; or do they use that "to be forever hidden" database to hide illegal activity?

Here's how we know something very important: Once the evidence of illegal activity was _known_ to be revealed; and that _claims_ of executive privilege would _fail_, then they had a problem: The backup e-mail could be detected; and the _existence_ and content of that backup e-mail could be breached.
In other words, one does not destroy evidence in the RNC e-mails unless they believe that privilege would fail; but then contradict themselves and say, "But we have executive privilege". That defies reason. Again, if the _expectation_ of privilege -- going forward from time of creation -- were real, then there would have been
no reason to have a backup systems; no reason to have an e-mail system that violated the law; and no reason to _destroy_ the very thing that would "forever" enjoy a shield of privilege.
- - -

Rule: Privilege isn't a power: It's a _claim_ that the _court_ doe snot have to recognize. If a claim of privilege has been abused; or adverse inferences _about missing data_ suggest that the evidence was _illegally destroyed_, the claim of privilege is one that the court is _not required_ to recognize. A defendant can do things that will make the claim meaningless, without effect, or irrelevant: By disclosing that information in an e-mail, as Miers did with the DoJ e-mail.
Executive privilege isn't something the _court_ is required to recognize. It can be claimed, asserted, and demanded as a "right" but that's meaningless: It is a _court recognized_ claim that the court -- for whatever reason it chooses -- can refuse.

The key is for the Grand Jury to know: It can decide that the _claim_ of privilege was not real; and that it was _not_ reasonable for legal counsel to believe that the claim of privilege was bonafide. In other words, going forward from the time that the e-mail was created, and the fact that that "supposedly privileged e-mail was destroyed" wold _undermine_ confidence that counsel _really_ believed that the evidence was privileged or protected. Again, it makes no sense for counsel to argue "but it's privilege" _while_ that supposed "stuff which would never see the light of day" is destroyed.

This then translates into whether legal counsel's _assertions_ to the grand jury about what they _believed_ was privileged are true; or whether the legal counsel has _retroactively_ asserted something which is not supported by the subsequent actions. Namely, once legal counsel says -- in hindsight -- we "believed' our actions were lawful, they key point is: That is a _dubious belief_ and a _dubious assertion of what was a belief_ because of the subsequent destruction of information that was supposedly going to be shielded.

In so many words, the problem legal counsel has is that their "assertion of a belief" about that evidence and legality of that data archiving method gets called into question: And forms _for the Grand Jury_ a reasonable basis to impeach that legal counsel as a witness. This means that the Grand Jury says, "We do not believe this witness"; whether they want to investigate that legal counsel further over that dubious claim is what the Libby Grand Jury did.
- - -

In other words, going back to our discrete events, RNC legal counsel and WH Counsel established that illegal database and e-mail system; but _then_ were alerted to
questions about that content; but then worried that their _claim_ of executive privilege would fail.

This is linked to the Grand Jury subpoenas in re Libby and Ashcroft. Once the evidence destruction _time_ is known, we can pinpoint _what_ they were responding to. Again, if the privilege claims were bonafide -- that the WH counsel "believed" the documents were privileged -- they wold not have a reason to set up any backup system; or destroy the very thing that was supposed to be shielded.

The key is subtle: _When_ did WH counsel suddenly get religion and realize, "Our dubious belief that this claim of privilege would prevail isn't going to work; someones told them what is here; we can't hide this behind privilege; we have to destroy this."

The only people who cold understand
what data there was; where it was located; how it was crated; and the assumptions they had relative to executive privilege were the people who made the rules, did the vetting for the documents, and knew the rules of privilege.

At some point _after_ the Grand Jury subpoena landed, WH counsel had two paths they attempted to go down at the same time: First, their legal/public position of asserting privileged; but second, the private path of comparing which documents would most likely be admissible, and not survive the claim of privilege, and had to be destroyed.

Someone did a comparison _after_ the Subpoena landed, but moved quickly enough to sort through the data, and get rid of the things that had _previously_ been retained. In other words, someone convinced themselves -- after a first look -- that the documents would be protected; but then something changed.
- - - - - - - - - - - - - - - - - -

Timeline: (Time from left to right)

There are seven milestones: < A-G >
< > --<1> -- X ---<2> ---- 0 -----<3> ------- D
A. < > Origination of data
B.
C. X First visit/review
D.
E. 0 Subpoenas land
F.
G. D Destruction
- - - - - - - - - - - - - - - - ---

The time line is simple: After first creation point < >, A , there is a timeline of data; that was not tampered with _for some time_ , B; then, they had a problem, looked at the data , but decided to do nothing , D; then they had a real problem : Ooops, we aren't going to be able to hide this , F; then the destruction orders went out .

Each of those points is discrete; and things were kept; and other things were not kept; things were reviewed; and there were discussions inside the RNC and WH Counsel's office.

Again, we're not talking about conversations that are privilege, but the WH Counsel's office discussions about the _problematic data_: That discussion is different, and not protected. That's what the outside legal counsel has a problem with right now: They were the ones who knew the standards; did the audit; and came back with certifications.

Either they found problems and documented them; or they didn't find the problems and left them alone. Their problem: They don't know which data was deliberately placed in the WH Datasets, and sent through the RNC e-mails with the intent that it be _destroyed_: It would create a hole for the auditors to ask: "Why isn't this here?" RNC doesn't know what was test data; and which was real data. They can't tell the difference. Someone else does. Not them.

The problem they have is that they didn't realize what was happening _while_ it happened. Again, this isn't just in the WH, but all over the place. and not just in the President's office, but OSC, DoJ, EOP, OVP, NSA, NSC, and Congress.
They have no control over the baseline data which has been captured, and remains secure outside their control. They're being led to believe the data -- including all backups -- has been totally destroyed. Now they realize they have a problem.

But it's worse than they imagined. CIA transferred data to the EU: This is connected with the NSA intercepts of the war crimes; confirming the timing of the notifications to the White House; and explaining the timelines of the destruction actions. Add in the Libby and Abramoff investigations and destruction, and the President has another problem: Too many discrete events that the RNC is _responding to_; and too many holes that are only linked with concerns about _discrete events_.

The destruction wasn't random, but related to awareness by WH counsel that their original delusions weren't going to prevail. That's the key: It only takes one link between notification, and subsequent destruction for the WH Counsel to hang themselves. It's already happened. Multiple Times. Take your pick:

A. Conversations over whether to transfer prisoners after disclosure of Eastern European prisoner abuses;
B. Whether to, after the Supreme Court ruled against them, to move the prisoners;
C. Coordination with members of Congress to start investigation of the _leaks_, despite the President knowing for one year that the NYT had been looking at things. Surely if the President was "concerned" about leaks, he wouldn't talk tot he NYT to confirm or Deny anything,b but would have -- without talking to the NYT -- order an investigation.

But the silly President got it backwards: Ordered the investigation _publicly_ _after_ the NYT disclosed what was a "big secret".

The key is simple: hat should have been happening; and what _did_ happen; what should counsel have been doing, but what _were_ they doing. They want us to believe X, but reality best supports something other than X.

The timelines don't match. The GOP-Rove, and RNC have attempted to create a separate timeline that does not match what the CIA and EU know to be true about rendition, notification, and prisoner abuse. These are war crimes; and that evidence destruction relates to _war crimes prosecution obstruction_. This isn't about RNC e-mails, but about _war crimes evidence_.

The FISA violations aren't about the law, they're about _transferring_ data for illegal objectives, including the support of illegal war crimes, prisoner abuse, and other breaches of Geneva. AG Gonzalez doesn't care about FISA violations because his _real_ concern are the war crimes which the CIA has confirmed to the EU.

Keep in mind who you're dealing with: Legal counsel who believe they are generals, but have failed in military campaigns. Their idea of "winning" is to block enforcement of the law and hiding evidence of _their complicity_ with war crimes. The think they are above the law. They're not. The holes tell us something else.

____________________________________

To those who are asking for views/comments/reactions, I would encourage you to take a large perspective on this Gonzalez situation. I'm going to point you to something that may not seem related, but with time you'll see there is something to this.
1 Enter at URL <
http://mpuc.informe.org/easyfile/easyweb.php?func=easyweb_query >

2. At the second block, "Case ID" -- Enter this number < 2006274 >

The case file you are looking at is the backup information and messages related to the Maine Power Utility Lawsuit against Verizon. This relates to the recent ruling that the state AG's of Vermont, Maine, Missouri, and New Jersey can proceed with the litigation on re NSA at the _state_ level. Recall DoJ threatened to sue the state AGs to dissuade them from taking action, in re Honorable Vaughn R. Walker.

There are some important things to notice in the casefile: If you go through the records, as you have with the DOJ E-mail dumps you're going to see some interesting things.

* Disclosed Verizon E-mail Addresses Link To NSA, FISA Intermediaries

Recall, one of the problems has been the missing RNC e-mails. There's an answer to the missing holes. Inside the Maine PUC file for the Verizon, are their e-mail addresses for their internal e-mails. These were not supposed to have been disclosed; but one of the counsel's memoranda lists an e-mail for the internal system. To make a long story short, once you index the e-mails for the Verizon internal e-mail system, you can then use open source information to cross-index with the outside NSA-FISA intermediaries: One of them is AMDOCS. Within the Verizon e-mail is also open disclosure of the Verizon General Counsel request for and receipt of information related to specific legal questions related to various litigation issues of interest to the FISA-NSA surveillance.

In court, once something has been disclosed, that cannot be hidden.
In light of the Gonzalez testimony on FISA, and the Verizon GC disclosures, plus the knowledge that Verizon does have this internal e-mail system, I would encourage a broad view: There is an overlap between the WH, RNC, Verizon, DoJ on the FISA through the AMDCOS-intermediary link within the Verizon e-mail.

ALso, you will notice that the Verizon GC initially _failed to deny_ (very important) something that they later _changed their position_ (also important) on whether the NSA did or did not have "access" to their systems/facilities.
Verizon is also linked through the NSA with one of its certified fiber optic test centers; and this NSA contractor appears on the JROC funding/operational documents within the pentagon; and is also listed on classified documents related to testing, performance, and other things.

The point is simple: The MAINE PUC data set on this case -- like the DOJ Staff e-mails -- is a gold mine of information related to the very things the DOJ and President are refusing to provide to Congress on the ground of privilege.
As a heads up to the Verizon e-mails in the PUC data, they're somewhat clunky to link to. I would encourage you to reference them not by links, but by the _date_ of the file.

Here are my suggestions:

1. In light of the FISA-DoJ-US Atty-DoJ Staff e-mail lessons (thinks that are surfacing, or disclosures by the General counsel), look through the documents.

2. Make a records of any Verizon e-mail reference; and then do a cross index with all NSA contractors, intermediaries, and RNC business units linked with the White House IT department. You will be able to see that the White House-RNC e-mail connection on the RNC e0-mails is also something that traces from the WH to the RNC IT then into the Verizon e-mail system: The common link will be the companies names listed on the Verizon BCC copies.

3. Note closely the comments of the Verizon General Counsel immediately after they were asked questions: They have said some things about NSA access.

4. Then, you want to compare the nature, and terms of the Verizon contract with the various media-messaging firms within the GOP-WH-DOJ that are linked with AT&T. One of the names that may appear is Fleishman Hilliard. This firm's name is one that has been linked with AT&T, and could very well have a contract that permits it to get the stripped down versions of the NSA intercept data; and which they use to develop some sort of media messages. The speculation is that the Gonzalez testimony about "this program" or "that program" relates to the method by which NSA data is stripped of identifying information; and how this non-specific information is then transferred possibly through an Intermediary to a firm associated with DoJ and DoD. As you dig into the Fleishman Hilliard Contracts, you Will find a common contract number that crosses multiple Presidential programs and appropriations -- DoJ, DHS, DoD. The contract numbers are essentially the same.

Your job should be to consider the Gonzalez testimony and WH efforts to claim privilege as a _subset_ effort to shield attention from the open source information that can be back doored into the WH, DoJ, and DOD. IN other words, the WH, DoJ, and AG are screaming, "You can't come in this door," and apparently hoping you don't realize that the stuff they're hiding, and the WH connection, isn't noticed through the Maine PUC data. I'll leave it up to you to independently conclude whether the link is real; or whether the data supports something else.

To review, the Maine PUC data affirmatively links Verizon e-mail with a FISA intermediary; Verizon General counsel disclosures outside the firm; and to WH IT entities that have been liked with the NSA Fiber optic testing facilities and NSA budgeting documents held at the JROC level. Also within the data set is information suggesting that the DOJ Staff counsel -- after the Verizon GC commented in writing -- did intervene behind the scenes to provide a copy of WH EOP/OVP/OLC legal positions on issues of privilege.

It would appear, given the disclosures, change in position, and the link between Verizon and the NSA -- through their openly available documents -- that the Congress has the basis to subpoena those who are familiar with the DoJ OLC-Verizon GC coordination related to the media inquiry. Because the Verizon GC has changed their position, this forms the basis to ask about what they have disclosed. Further, once the Walker Court ruled the State AGs could proceed with the litigation, we need to look at the DoJ Staff counsel "threats" against State AGs and determine whether this was an improper use of DOJ resources, an illegal threat of prosecution, or other actionable conduct per DC Bar Rules.

Also consider the Vaughn Court finding: That the States are not required to assent to the Federal law; and that the states are not behold to follow the lead of Congress, DoJ, or the President when the Federal Government is not protecting the state citizens' rights. This is important when planning the State AG prosecutions of the President, VP, and Members of congress: State AGs do have standing, and the inaction of Congress on these matters does not mean the State AGs are forced into inaction.

The point is simple: If the Congress and DoJ-WH Counsel_President get into a tug of war, and protracted litigation over the RNC e0-mails, remember there are NSA contractors who, with the right financial leverage applied to them, can be inducted to disclose more of what they've already disclosed. Congress has the power of the purse: The Congress can say to the President, AG, and NSA contractors: WE know about your internal e-mails; we've got open records linking the WH with the NSA contractors on this n arrow issue of FISA warrants; and we also have the contract numbers of the Media messaging firm. Either you give us the documents we are asking for, or we in Congress -- like Murtha did -- will zero-out the budgets for those contractor facilities, test ranges, system program offices, and other activities which the NSA contractors are currently working under. If you want your money, give us the information; no information means no money -- but the litigation will continue.

In other words, don't let the WH-President make you believe that you have to play nice "while the RNC-WH Counsel" waste your time in court arguing over privilege. You have leverage _right now_ to go to the Joint staff and say: We want the information by Close of business today; if you don't get it, your budgets are going to get zeroed out, just like Murtha did with the congressional liaison. Then the NSA contractors will have to decide whether they're going to want to go through termination negotiations, and lose funding; or whether they're going to turn over the evidence linked with these disclosed Verizon documents. Don't wait for congress and the DOJ to agree: Press now for the Congress to cut the budget first; then tell the WH to provide the information, or the litigation will continue, and he has no prospect of getting that money returned. Time to remind the President: If he refuses to cooperate, hes' going to get no money; and the Congress is fully prepared to litigate. The money gets taken first.

All information you glean is then then admissible to the State AGs as the prepare to prosecute the Members of Congress, contractors, President, VP, and legal counsel for their alleged complicity with, and refusal to prevent FISA violations, war crimes, prisoner abuse, rendition, and other illegal activity. As you collect the responses, keep in mind you'll want to organize it so the Grand Jury can understand what happened first; and they can see the inconsistent statements between the contracts; the e-mail responses before DOJ intervened; the e-mails after DoJ intervened; and the subsequent response to you, Congress, or the media on this subject. As stated above, the problem the President, DOJ, and the NSA have is that they're stuck with the original lines of evidence that have been captured, retained, and stored outside their control.

______________________________________

Posted by: Anna S.
Date: July 30, 2007 1:57 AM

Your points about ICC are well taken; indeed, this is one of the concerns I have: That the apparent "lack of US interest" in a legal issues is "precedent" to do nothing, as Pelosi has done with impeachment.
However, there appear to be at least six <6> reasons why war crimes appeared to be a real concern inside the White House:

1. Language
In the MCA language was specific language authorizing US govt funds to defend US personnel before any tribunal. It appears someone in DoJ OLC worked with the WH-EOP-OVP to insert this language into the MCA. They appear to be concerned.

2. Absurd: Destroying "Privileged" Information
Further, given the disconnected between
claiming that they "believed" the information would be privileged; yet destruction of that supposed "p
3. Change in Position
War crimes appears to have been a _concern_ as evidenced by the movement of personnel from Eastern Europe to Guantanamo. Previously, one of the reasons to "not move" the prisoners was Addington's positions that if they _did_ change position, that would be an admission the original treatment was illegal.

4. US Code
The US is a signatory to Geneva, and the laws of war do apply. Regardless the US involvement with the ICC, the US itself must enforce Geneva. It appears _despite_ the US non involvement with ICC, someone introduced the language, and moved the prisoners.

5. Supreme Court Rules Against Bush
Despite Roberts and Alito on the high court, they decided to agree that Geneva was a "good" thing to follow. Even a Bush loyalists refused to defy Geneva, openly the way to prisoner of war status; and litigation against the US government for abuses.

6. EU and CIA Conversations, Litigation
CIA personnel have disclosed information to the EU, prompting the President and Congress to not go after the war crimes, but to "target the lakers". It also appears the US Grand Jury, legal counsel, and others have taken a particular concern with the war crimes issues. Italy and Germany are litigating these issues on rendition.

________________________________

FOCUSING ON VERIZON GC COMMENTS _BEFORE_ DOJ STAFF COORDINATED ON FISA RESPONSES

1. Sample file

When you look at the MPUC file, you'll want to go to the first records, at the end of the file. The date you want to look for is May 2006. Currently, this file is at the _end_ on page 9; if the future, as more documents are added at the beginning, this last page will increase.

Today, the last page is page 9 of the file. Look for this file, and open it: which has this information on the line :
- Col_2: Date: 05/08/2006
- Col_4: DocTYpe: Initial Filing
- Col_12: Name: Cowie

You'll see two files, click on the one that is 58 pages, the top row; pdf file is on the left. Click that icon. The file we're focusing on is 58 pages long.

- - - - -

2. Arena

Scroll to the end, page 58: You'll see a name: The Verizon GC name listed is "Arena", the one who isn't the primary Verizon GC: Here's your first connection with the FISA: "Arena" is a former DoJ Type; and has been linked with the intermediaries; and his name is linked with the same AT&T-conference attendees in re NSA-JTTF-FISA intermediaries for processing warrants.

- Play with the phone numbers in the DC Madam list. Just for fun.

- - - - -

3. Verizon Internal E-mail Format Disclosed

Go to page 56 of 58: This is the funny part: Look at the e-mails: That is a unique Verizon internal e-mail format that can be cross indexed within the RNC and WH e-mail systems to get some hits; as well as with DoJ, DoD, NSA, and outside legal counsel. This is the third party data transfer system we've been talking about. . . someone said it was "impossible" -- sorry, there it is. That e-mail is linked with an IP number; which is then cross indexed with various US government computers in other databases. Ooops! Funny, weren't those DOJ Staff supposed to be processing warrants not using their computers for unofficial things?

The format also includes the CITY where the Particular verizon emloyee is assigned. YOu'll have to review how the employee transfers related to changes or no changes in designations.

Here's the neat thing: Verizon in that e-mail on page 56 has an EMPL format: That means "employee": Verizon General counsel has foolish in disclosing their e-mail outside their office; also Verizon _contractors_ have another formatted code. If you play with this format, you're going to see the open records, and you can eventually find which Verizon employees have been sharing information with the FISA intermediaries.

- - - -

4. Out of court Inconsistent statements

YOu want to comare what Arena first said to Cowie with all subsequent Verizon-Gonzalez statements. The short version: What Arena said doesn't later match with the DoJ "version" of spin, subsequent sent through the Verizon GC.

- - - - -

5. Subpoenas of Verizon E-mail senders/recivers

Page 54 has an e-mail, and you can find others. The point is that, as with the RNC e-mails in the DOJ Staff dump to the Congress, Verizon has disclosed that there is a _contractor_ e-mail system which -- with their own records -- links them to the FISA intermediaries. This means that those working with the JTTF, NSLs, and the DoJ FISA processing warrants' system have to explain why their computers and e-mails include the Verizon notes in them. Congress needs to go to the DOJ and say, "OK, we know about these e-mails; and can link them to the FISA; let's see the DOJ, NSA, DOJ, and WH/OVP e-mails sent to coordinate the Verizon responses which _contradict_ Arena's first statements.

- Why did the DOJ's later responses adjust what Arena first said?

DoJ, OVP, EOP, RNC, and Verizon are stuck: The e-mails have been disclosed; and the link between Verizon and the NSA fiber optic testing center matches the NSA budgeting documents at the JROC, which are disclosed through an executive order. No wonder they OVP said they didn't apply: "We don't want you to look there."

- - - - - -

6. COnnections to FISA, NSA, and White House

Bottom line: The RNC e-mails can be cross indexed with the holes within the Verizon e-mails system: And any of the US government e-mails sent to these Verizon addresses can be requested. We know there was coordination because the DOJ and Verizon openly confirmed their cooperation; but this isn't "provided" because it relates to an inconsistent statement by the Verizon counsel: Did NSA and Verizon have an agreement; and why did the first response of "may" have given access not match the later "refuse to comment"?

The answer is the same as what Berenson was saying about Rendition: First he commented on PBS; then it went to "can nether conform nor deny.," IT appears WH Counsel, DoJ Staff, OLC and Sidley Austin-Verizon changed their position. That is admissible: There would have been a meeting, agreement, or communication to go from the original position to the second one. Where documents have been destroyed, or not provided, adverse inferences may be made.

- - - - -

7. Where to find the baseilne data to check for RNC and Verizon Email Destruction/Holes

The key will be to find any verizon e-mails sent _oustide_ the US government, use those as a baseline; then look in teh verizon archives to see if any of those sent e-mails -- unrelated to the nSA-DoJ -- have also been destroyed/removed. Verizon has no clue where else these are being stored right now. Yes, the files were sent; but who knows about those files; and who has forwarded them to the Grand Jury, TPM, and Congress?

_____________________________________

Wow! He/she responded to my post:

Anon, I think I love you. Your posts are a thing of beauty. :D
Posted by: Oilwellian
Date: July 31, 2007 2:50 PM

Posted by: Oilwellian
Date: July 31, 2007 2:50 PM

Remember, this information is open. Anyone can do this. The key is to notice the leverage We the People have on Congress, the President, and US government.

Time for them to join We the People with the Constitution. Now, not "next election". Today. Need actions and results; not excuses or hand waving.

Without action and results, We the People can discuss alternatives: State AG prosecutions of the VP, and President oustide Congress and outside impeachment; and methods to ensure the oath of office means something and is asserted by all Members of Congress, US government officials and legal counsel.

There is a way.

_____________________________
Whew!
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:41 PM
Response to Reply #109
136. Yup, IT'S ALL ABOUT THE HOLES
The massive, irrefutable holes in the records and paper trails that by law were required to be kept. It's very, very illegal and in and of itself is enough for indictment, prosecution and incarceration of the whole lot.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:23 PM
Response to Reply #98
172. Thanks! I'm alerting Conyers office about this.
:hi:
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:18 PM
Response to Original message
99. Good advice from the mystery man/woman
Stop listening to excuses of why this "cannot" be done;and _find_ a way to make those who have an oath to _do_ their job: Defend the Constitution, even it means prosecuting the President, VP, Speaker, and House Judiciary Chairman for <a> violating Geneva; and <b> refusing to enforce the Constitution using all lawful options. It is reckless -- this many years after 9-11 and the disclosures of the prisoner abuse and illegal NSA -- for Congress to be still rubber stamping legislation/funding: There are options to end the funding, which the DNC refuses; and there are options to lawfully target legal counsel complicit with this illegal activity.


(*) I think he means more than challenging Pelosi's seat and slamming Cindy Sheehan for doing so. I put in bold, too, his inclusion of the Judiciary Chairman, who when in power, shows he really is a babbling idiot.
Printer Friendly | Permalink |  | Top
 
Imagevision Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:04 PM
Response to Reply #99
157. Gotta kick this till Olberman does a piece on it...
Printer Friendly | Permalink |  | Top
 
G_Leo_Criley Donating Member (553 posts) Send PM | Profile | Ignore Tue Jul-31-07 06:19 PM
Response to Original message
100. wow... k & r
:kick:

glc
Printer Friendly | Permalink |  | Top
 
fed-up Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:35 PM
Response to Original message
104. thanks mystery poster!!! BIG BROTHER exists-time is now to hold * accountable for these crimes nt
Printer Friendly | Permalink |  | Top
 
shadowknows69 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 06:45 PM
Response to Original message
108. 43. Forget Bushco for a moment and try Slusho!
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:05 PM
Response to Original message
112. kick
Printer Friendly | Permalink |  | Top
 
Richard Steele Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:11 PM
Response to Original message
113. K&R
Printer Friendly | Permalink |  | Top
 
Duer 157099 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:18 PM
Response to Original message
114. Just for reference, here's another thread with the same poster
Edited on Tue Jul-31-07 07:20 PM by dotcosm
It's a long thread, but his posts are pretty easy to recognize. FYI.

I'm glad this is finally getting some attention -- I have wondered who this person is, and how they know what they know.

http://www.tpmmuckraker.com/archives/003235.php

http://www.tpmmuckraker.com/archives/003268.php

edit to add more links as I find them
Printer Friendly | Permalink |  | Top
 
veness Donating Member (251 posts) Send PM | Profile | Ignore Tue Jul-31-07 07:28 PM
Response to Original message
115. k & r. n/t
Printer Friendly | Permalink |  | Top
 
bear425 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:42 PM
Response to Original message
116. k/r n/t
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:48 PM
Response to Original message
117. The Congressional blackmail is their complicity?
All the notifications to Congress are documented; legislative immunity falls apart; and their defenses fall away when we look at what they did; then compare it with what they should have done per 5 USC 3331, their oath of office. We need only look at the FISA violations -- as reported publicly -- then compare that with the open information -- of that illegal activity -- and contrast that with the votes: They, knowing there was a problem with illegal activity, continued to fund and spend money on things that violated the Constitution. Nobody made them. they freely chose to do this; despite knowing of that illegal activity, they did not -- as they had the power to do -- either document their concerns with the IGS or US Atty; nor did they remove themselves from the votes to pay for what they should have known was not lawful.


In the postings of anonymous, he is giving an overview of all the checks and balances within the communications of the government. He is arguing that Congress had to know of the violations and by doing NOTHING, became liable for the same things * has done.

He then gives the link to http://en.wikipedia.org/wiki/Judges'_Trial">the Judges Trial and http://www.law.umkc.edu/faculty/projects/ftrials/nuremberg/Alstoetter.htm">another link from the google. Here's two summaries from the second link:

The Justice Trial is one of the most interesting of the Nuremberg trials. The trial of sixteen defendants, members of the Reich Ministry of Justice or People's and Special Courts, raised the issue of what responsibility judges might have for enforcing grossly unjust (...) laws. The trial was the inspiration for the movie Judgment at Nuremberg.


No one contends, of course, that German judges and prosecutors destroyed as many lives as did the SS, Gestapo, or other agencies of the Nazi machine. Their victims number in the thousands, not the millions. A judge who knowingly sentenced even one innocent Jew or Pole to death was, however, guilty in the eyes of the prosecutors and judges at the Justice Trial in Nuremberg. There would be no "only a couple of atrocities" defense.

The anonymous poster continues to emphasize that Congress had to know what was happening due to the checks, but continues to fund the illegal activity and by doing so, condones it. Just like the judges convicted in this trial sentenced the innocent to death, Congress is also responsible by their continuing to fund it. Congress is like the judges in the above trial, guilty of the same war crimes, etc.

So, is the blackmail: If I go down (*/Darth), you (members of Congress) will go with me?
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:18 PM
Response to Reply #117
128. Bingo!
So, is the blackmail: If I go down (*/Darth), you (members of Congress) will go with me?
Printer Friendly | Permalink |  | Top
 
OzarkDem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:22 PM
Response to Reply #117
146. Disturbing
Dems shouldn't fall for any threat from Bushco, but sometimes I fear they've done just that.

Printer Friendly | Permalink |  | Top
 
WinkyDink Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:01 AM
Response to Reply #146
208. Maybe it's as simple as wanting to stay in office. With the perks.
Edited on Wed Aug-01-07 07:02 AM by WinkyDink
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:51 PM
Response to Original message
118. No lie, man!
Time to engage with the State AGs. All fifty <50> of them, and bring in the Certified Fraud Examiners, Auditors, and some people who have some inclination of the prosecution possible against the Members of Congress, president, VP, and legal counsel in OVP, DoJ, EOP, and outside legal counsel. We don't need more evidence; we need some public trials, indictments, prosecutions, legal counsel disbarments, and jail time. The oath wasn't enough to inspire them.
Printer Friendly | Permalink |  | Top
 
seafan Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:52 PM
Response to Original message
119. Here are more stunning entries from TPM Muckraker on the Gonzales/WH/illegal NSA wiretapping
Words are inadequate to describe what is contained in these posts by an anonymous contributor at TPMMuckraker.
And there are many more.

(Bold type added.)





From July 29, 2007 11:56 PM

The timelines don't match. The GOP-Rove, and RNC have attempted to create a separate timeline that does not match what the CIA and EU know to be true about rendition, notification, and prisoner abuse. These are war crimes; and that evidence destruction relates to _war crimes prosecution obstruction_. This isn't about RNC e-mails, but about _war crimes evidence_.

The FISA violations aren't about the law, they're about _transferring_ data for illegal objectives, including the support of illegal war crimes, prisoner abuse, and other breaches of Geneva. AG Gonzalez doesn't care about FISA violations because his _real_ concern are the war crimes which the CIA has confirmed to the EU.

Keep in mind who you're dealing with: Legal counsel who believe they are generals, but have failed in military campaigns. Their idea of "winning" is to block enforcement of the law and hiding evidence of _their complicity_ with war crimes. The think they are above the law. They're not. The holes tell us something else.




From July 30, 2007 5:58 PM

The point is simple: If the Congress and DoJ-WH Counsel_President get into a tug of war, and protracted litigation over the RNC e0-mails, remember there are NSA contractors who, with the right financial leverage applied to them, can be inducted to disclose more of what they've already disclosed. Congress has the power of the purse: The Congress can say to the President, AG, and NSA contractors: WE know about your internal e-mails; we've got open records linking the WH with the NSA contractors on this n arrow issue of FISA warrants; and we also have the contract numbers of the Media messaging firm. Either you give us the documents we are asking for, or we in Congress -- like Murtha did -- will zero-out the budgets for those contractor facilities, test ranges, system program offices, and other activities which the NSA contractors are currently working under. If you want your money, give us the information; no information means no money -- but the litigation will continue.

In other words, don't let the WH-President make you believe that you have to play nice "while the RNC-WH Counsel" waste your time in court arguing over privilege. You have leverage _right now_ to go to the Joint staff and say: We want the information by Close of business today; if you don't get it, your budgets are going to get zeroed out, just like Murtha did with the congressional liaison. Then the NSA contractors will have to decide whether they're going to want to go through termination negotiations, and lose funding; or whether they're going to turn over the evidence linked with these disclosed Verizon documents. Don't wait for congress and the DOJ to agree: Press now for the Congress to cut the budget first; then tell the WH to provide the information, or the litigation will continue, and he has no prospect of getting that money returned. Time to remind the President: If he refuses to cooperate, hes' going to get no money; and the Congress is fully prepared to litigate. The money gets taken first.

All information you glean is then then admissible to the State AGs as the prepare to prosecute the Members of Congress, contractors, President, VP, and legal counsel for their alleged complicity with, and refusal to prevent FISA violations, war crimes, prisoner abuse, rendition, and other illegal activity. As you collect the responses, keep in mind you'll want to organize it so the Grand Jury can understand what happened first; and they can see the inconsistent statements between the contracts; the e-mail responses before DOJ intervened; the e-mails after DoJ intervened; and the subsequent response to you, Congress, or the media on this subject. As stated above, the problem the President, DOJ, and the NSA have is that they're stuck with the original lines of evidence that have been captured, retained, and stored outside their control.


Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 07:55 PM
Response to Original message
120. Sing it!
The Constitution is very simple and clear. All that is required is that you comply with it. When you ignore it, then you have a problem: The "excuses to ignore" these simple rules, then become the same excuse to ignore planning, leadership, oversight, backups, training, and audits. Then we have Katrina, botched operations in Afghanistan, and a President that has to be fed lines because he can't think on his feet. We need real leadership, not what we have.
Printer Friendly | Permalink |  | Top
 
jimshoes Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:14 PM
Response to Original message
126. Holy cow!
Edited on Tue Jul-31-07 08:15 PM by jimshoes
If the admin is not shitting their pants, they should be.
Oh, and recommended.
Printer Friendly | Permalink |  | Top
 
JTG of the PRB Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:17 PM
Response to Original message
127. Holy wow... K&R
Fascinating stuff... This "mystery poster" is beyond knowledgeable in regards to what could be going on - dropping hints, suggesting investigation, connecting the dots...

Wow. That's really all I can say right now. Wow.
Printer Friendly | Permalink |  | Top
 
complain jane Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:31 PM
Response to Original message
131. I'd like to think this will amount to something
but these days I'm pretty cynical about anybody in this WH ever getting anything they deserve, while they've been the most blatant criminals imaginable.
Printer Friendly | Permalink |  | Top
 
Babsbrain Donating Member (536 posts) Send PM | Profile | Ignore Tue Jul-31-07 08:35 PM
Response to Reply #131
133. I'm pretty cynical too...
That's why I feel like a mouse being batted around by a cat.

If this person has something to say, SAY IT!! This isn't the time for games.

Printer Friendly | Permalink |  | Top
 
Duer 157099 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:47 PM
Response to Original message
139. Here's my take-home message; am I reading this correctly?
Anon is claiming that _someone_ has planted bait for the WH/DOJ, to see if they were destroying communications, and the test was positive.

Anon has repeatedly talked about _3rd party_ data intercepts that are not only completely legal, but that render any possible claim of EP moot. I gather that Anon might be referring to the WH/DOJ etc use of various non-email forms of communication (blogs? sharepoint? other?) It seems that Anon is not just guessing, but knows something that he cannot directly relate, but which he can allude to for, perhaps, others to discover.

Anon's use of _this_ form of emphasis tells me that it's someone who has been working with computers for longer than most people online have been alive. And thus, probably knows what he is talking about when it comes to data processing. Using old school tools and strategies.

Any other salient points to add?
Printer Friendly | Permalink |  | Top
 
Subdivisions Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 08:51 PM
Response to Reply #139
141. I wondered about
the_use_those underscores. What's the background on this?
Printer Friendly | Permalink |  | Top
 
Duer 157099 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:03 PM
Response to Reply #141
144. If I'm recalling correctly
Edited on Tue Jul-31-07 09:07 PM by dotcosm
it has to do with not using keyboard characters that are commonly used within code (or something such).

Like how the use of ** has replaced "" because the quotation marks are often code.

I think that's it, anyway.

edit to add:

from http://en.wikipedia.org/wiki/Underscore

(the underscore) "It is also conventionally used in this fashion on Usenet to indicate emphasis, and can be used in other ASCII-only media (E-mail, IRC, Instant Messaging) for this purpose. When the underscore is used for emphasis in this fashion, it is usually interpreted as indicating that the enclosed text is underlined or italicised, as opposed to bold."
Printer Friendly | Permalink |  | Top
 
RainDog Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:56 PM
Response to Reply #141
153. text-based web - till mid-1990s
before graphic interface, underscores were used for emphasis and titles, etc.
Printer Friendly | Permalink |  | Top
 
KoKo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:35 PM
Response to Reply #153
160. Also used by typists before IBM Selectric machines allowed some bold characters
or the Person didn't want to use "full caps." So this could also be someone older who was used to typying old style and still does it on a computer. Just a thought. :shrug:
Printer Friendly | Permalink |  | Top
 
Nordic65 Donating Member (276 posts) Send PM | Profile | Ignore Tue Jul-31-07 08:49 PM
Response to Original message
140. GAO is thy name...
Stunning!!! Absolutely freaking STUNNING.

My impression, after having read all the info from "Mystery poster" is that he/she is essentially describing how this was as much a political as a national security operation. A very illegal one, and that the they have been caught by the GAO.

Printer Friendly | Permalink |  | Top
 
Timbuk3 Donating Member (727 posts) Send PM | Profile | Ignore Tue Jul-31-07 09:06 PM
Response to Original message
145. Thanks for the links
I read through most of the posts by "the mystery poster", and this guy is no "insider". He asks good questions, though.

It got me to thinking. When talking to a Bushie, I've noticed that they often take a lackadaisical attitude toward lawbreaking, as long as it's a fellow Bushie breaking the law. "I don't care if the government breaks the law is searching people without a warrant because I have nothing to hide."

Bush, or more likely Cheney, is obviously running a criminal enterprise. Don't expect a Bushie to admit it, or care. They're too cowed, too intimidated, to ready to bow down to authority. (Bushie's disgust me.)

So, what will the next President do if he or she uncovers proof of criminal activity by the Bush/Cheney administration?

That's a question no one is asking.

I'd really like to see them face charges in a court of law.

Who will hold them accountable?
Printer Friendly | Permalink |  | Top
 
Knightly_Knews Donating Member (153 posts) Send PM | Profile | Ignore Wed Aug-01-07 05:42 AM
Response to Reply #145
203. I beg to differ...
This person knows what Karl Rove's PC Format is, whether he has a C:Drive or F:Drive.. Unless they are an elite hacker of some sort. Which may be the case. What they are telling us is that the lost emails are online somewhere.
Question is, when will he/she find them?
Ohh and hopefully this person is using a modem jammer or something of that nature. If they find this person, they will have a field day with them..

Anonymous, do not fly in small planes, and do travel in groups. And keep up the great Investigations.
Printer Friendly | Permalink |  | Top
 
kineneb Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:35 PM
Response to Original message
149. funding question: DHS created to hide money trail?
I was reading some of the info to Hubby, who asked the above question. He thinks this may have a connection, somehow.
Printer Friendly | Permalink |  | Top
 
stillcool Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:45 PM
Response to Original message
151. Is this a call to...
arms of a legal sort? Sounds like it! I'm off to google land. Thanks Kpete...you're awesome!!
Printer Friendly | Permalink |  | Top
 
Mister Ed Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 09:59 PM
Response to Original message
154. kpete: Have we told you lately that we love you?
Ahhh....Van Morrison...
Printer Friendly | Permalink |  | Top
 
Patsy Stone Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 10:01 PM
Response to Original message
156. I like the GAO theory
But he/she/they could be a crackpot too. My tin foil detector went off a few times in the middle of the rants when the same themes kept appearing. At several points I half expected them to drag the Kennedy assasination and Area 51 into it. Also, the thing about the kids and their experience with DHS seemed a bit like a personal ax to grind, but maybe that's just me.

They started off with nothing more than an assumption that Mueller really started to say NSC, not NSA, and off we went into everything under the sun.

Whatever or whoever they are, however, in all of that muck, they make some salient points and offer many avenues to search for tidbits of criminality. If you have the patience.

I don't.

I'll admit it, by the end of the thread (and I searched for the string "Date:" and looked for the ones with the blank name above it) I began to hate the long-winded posts which often ended up with the one paragraph written in English which made any logical sense. Why didn't they just post that one summary paragraph to start with? Jeez.

Finally, though, in the 936th post, in the 4,000,567 paragraph, a laugh in the form of a typo: "doe snot"
Printer Friendly | Permalink |  | Top
 
Tandalayo_Scheisskopf Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:26 PM
Response to Reply #156
174. The reason for the writing style...
Is that the writer is immersed in Beltway Bureaucrat-ese.
Printer Friendly | Permalink |  | Top
 
caligirl Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:25 AM
Response to Reply #156
186. mine too, an IT type who thinks this can all be solved by IT methods_got me to call DIFI _ intrigued
Printer Friendly | Permalink |  | Top
 
Patsy Stone Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:44 AM
Response to Reply #186
263. _there was a bunch_of information there, huh?
I'm just not sure it was written by someone_who has left_the basement. :)
Printer Friendly | Permalink |  | Top
 
Cetacea Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:50 AM
Response to Reply #156
247. Grouping JFK assassination and area 51 ?
Grouping the two together ala tinfoil is a bit insulting to a majority of Americans who feel the JFK assassination was a conspiracy. Not to mention some people here who have spent decades researching the matter.
Printer Friendly | Permalink |  | Top
 
Patsy Stone Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:41 AM
Response to Reply #247
261. My point
was that what started out as an assumption on that poster's part as to what Mueller meant to say ended up including their theories on life, the universe, and everything. The whole thing had overtones of a guy in the corner of the cafe scribbling furiously into a spiral notebook and muttering.

The inclusion of JFK and Area 51, just two of the unexplained mysteries of the world, was for the funny, not to disparage those with said theories (tin foil or not) on those subjects. Even if you saw no humor in life, you would have to agree that there are as many theories as to what happened in either of those cases as there are stars in the sky, right?

Printer Friendly | Permalink |  | Top
 
Cetacea Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:11 PM
Response to Reply #261
271. Point taken. Thanks.
I must admit I am skeptical about nearly anything hopeful these daze.
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:12 PM
Response to Original message
167. Wow Kpete, awesome find!!!
I'm going to come back tomorrow and do some digging.

:bounce:
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-31-07 11:58 PM
Response to Original message
180. Kpete, what' this firm mentioned by anonymous all about ?
Edited on Wed Aug-01-07 12:00 AM by EVDebs
""...transferring that data to a firm like Flieshman Hilliard which would examine it, and issue public news releases on various government "public oversight" and "media messaging issues": Smith Act issues in re domestic propaganda: Possibly a "public service" announcement to maintain loyalty in non-sense. Something for AT&T to discuss.""

http://www.fleishman.com/

Reminds me of the Watergate Mullen & Co. front company stuff.
Printer Friendly | Permalink |  | Top
 
flyarm Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:32 AM
Response to Reply #180
187. Flieshman Hilliard who are they?? here...
Public Relations, Public Affairs and Marketing Communications That Deliver Results


Fleishman-Hillard delivers successful communications campaigns for its clients. That was true in the 1940s, when the company was founded, and continues today in the complex media landscape you face. Throughout our history, we have focused on making ourselves as valuable to our clients as they are to us. Here are a few examples of what we’ve helped our clients accomplish:

Increased UPS' supply chain management business by $25 million

We provided critical support to a key UPS customer outreach initiative through successful third-party programming and media outreach


Reduced U.S. teen drug use by 23 percent*

We manage one of the largest social marketing programs in the United States through our work with the White House Office of National Drug Control Policy (ONDCP). We integrated an extensive array of communications, outreach and Web activities with ONDCP's advertising to deliver targeted messages to millions of teens and parents to achieve these results. *According to the 2006 Monitoring the Future study from the University of Michigan.



Helped SBC become "the new AT&T"

We built a corporate reputation management plan for the $16 billion merger between SBC Communications and AT&T. The merger forced SBC to shed its regional status, become a new kind of company and re-brand the enterprise as "the new AT&T."



Headquartered in St. Louis, Fleishman-Hillard is part of Omnicom Group Inc., a leading global marketing and corporate communications company. Omnicom's 200-plus family of companies allows us to collaborate with advertising and specialty companies to solve client issues.



worked with the WHITE HOUSE ON TEEN DRUG CONTROL POLICY..I BET THEY DID !!./.AGAIN THINK MKULTRA !!

1. Have they been asked to leave the room; were concerns explained away; were officers complaining they were "short manned" an unable to supervise; and how do these explanations square with the officer conduct.
2. How often are these units employed to provoke innocent civilians to respond to abuse?
3. To what extent are these domestic units used to harass civilians based on a "hunch"?
4. Would these units put the children of minors at risk to entrap a suspected target?
5. Is there no report of any of these personnel ever exposing a minor to a potentially unsafe situation to engage a target?

6. Has the FISA court, Congress, and Judiciary been fully apprised of how these units operate; their procedures; and oversight requirement to ensure 42 USC 1983 claims are minimized?
7. What insurance do these units have if they are engaged in liable action?
Posted by:
Date: July 27, 2007 5:37 PM


FLY



Printer Friendly | Permalink |  | Top
 
bleever Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:12 AM
Response to Reply #187
188. "Throughout our history, we have focused on making ourselves as valuable to our clients
as they are to us."

If someone walked into my business and said that, I'd be feeling like the mob was sinking its hooks into me.

Printer Friendly | Permalink |  | Top
 
RainDog Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:45 AM
Response to Reply #180
190. Fleishman Hillard
from the Center for Media and Democracy's Source Watch

http://www.sourcewatch.org/index.php?title=Fleishman-Hillard

some interesting connections...they fit the description of the "media massaging" to make things like data-mining and operation falcon and a "general" rather than specific surveillance possible:


In June 2005, Kevin Bell from the UK arm of Fleishman-Hillard spoke at a one-day conference in London called ID Cards: Towards Procurement and Implementation. The title of his talk was "Achieving public acceptance". <29>

they represented ESS (and of course, the issue of hackable voting machines also leads to Ohio in 2004, not to mention other forms of voter caging and intimidation that Republicans have used to gut the 14th amendment.

In August 2006, one day after the Associated Press reported that the electronic voting machine company Election Systems & Software (ES&S) "agreed to a $750,000 settlement that resolves complaints filed after its software caused delays for some Indiana voters and election officials during the state's May primary," O'Dwyer's PR Daily reported that Fleishman-Hillard was representing ES&S. <26><27>

Clients also include:

Saudi Arabia's King Abdullah University of Science and Technology, a "post-graduate, research-focused university ... scheduled to open in 2009," according to PR Week <23>

...hmmm, extraordinary rendition and payments for that might be done in such a way that they appear legal. just speculating.

they've also done work for the DoD.

and in the just speculating dept. in response to some of what "deep modem" mentioned - wonder if they (FH) had any role in getting Limbaugh, etc. on message to equate torture with frat pranks? and it's strange that, as Sy Hersh noted, their are pictures of children being raped among the Abu Ghraib photos, and allegations that children were used to try to get parents to talk in Gitmo.

Video news releases Fleishman-Hillard (and its subcontractors Gourvitz Communications and Harbour Media) produced for ONDCP were found to be in violation of the ban on covert government propaganda.

http://www.sourcewatch.org/index.php?title=Video_news_releases

in other words, faux news... but all news outlets use them, it seems.

deep modem's reference to an educational program and Tennessee might make this worth reading--

In March 2000, Candace White, marketing professor at the University of Tennessee at Knoxville, co-authored a report with Mark D. Harmon for the Public Relations Society of America titled "How video news releases are used in television broadcasts." On the panel with Moscowitz and Potter, White said that the same self-interest that encourages news directors to use VNRs dictates that the material is used responsibly. "I trust news producers to be able to weed out true news value; I give them credit for being able to recognize blatant sales pitches. Our study found that the corporate videos were used the least, and the ones about health and safety were used the most," she said. (more media massaging)

and VNRs (video news releases) brings up a couple of "reporters" in my mind-- armstrong williams and jeff gannon. and williams was all about the Bush education crap.

could "deep modem," when talking about a broader view, mean data-mining that related to the 2000 election...getting information on democratic strategy, voter lists, whatever else?

remember the CIA people who got arrested in Italy, and remember the fake WMD "evidence" on stolen Niger embassy stationary in Italy? and then Ghorbanifar meeting with Ledeen and Franklin and the spy scandal? Hadley, who meets with Bush in the NSC, was forced to make this "back channel" of fake evidence for wmds stop, according to the washington monthly article.

http://www.washingtonmonthly.com/features/2004/0410.marshallrozen.html

the lack of trying to get bin Laden etc. in Afghanistan relates to wanting to have a fake reason to invade Iraq (bin Laden still on the loose), and Afghanistan, since the fall of the Taliban, has become a huge source of heroin again, iirc, and irrc, Iran-Contra had to do with also using drugs to fund covert activities...

anyway, just some things the posts from deep modem make me think about...again, just speculation on my part, but maybe it's one of those "gut instinct" moments.

oh, and deep modem says that Bushco was involved in tracking terrorists, etc. before 9-11 but didn't/couldn't admit because what they did was illegal and seemed to have some negative blowback... wonder about the reports of the "art school" guys. it would be illegal to allow other nations to knowingly operate in the U.S., wouldn't it? And what if the spies from somewhere else didn't actually stop the attack? or maybe that's not it, but the bulk of Bush's administration has ties either to Israel or Iran (via Iran-Contra).

maybe someone else knows more about this and can tell me if any of this might have something to do with the issues deep modem mentions that are there for us to see.

but I also wonder - if deep modem can pass these things along, why can't this person go to someone like Sy Hersh or Russ Feingold? (Feingold is about the only person in Congress that I would trust with this considering he was one of the few who did not give a blank check for the Iraq invasion.

Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:59 AM
Response to Reply #190
251. Thanks Raindog ! nt
Printer Friendly | Permalink |  | Top
 
RainDog Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:06 PM
Response to Reply #190
323. Rendon Group
I posted this at tpm muck, but I'm cross-posting here. also a link to the GAO (pdf file)

http://oversight.house.gov/Documents/20060213110539-14835.pdf

and the blogger below mentions the Justice Dept. Office of Legal Council has authority over the GAO. (and is able to block them.)

Here's something interesting from this blogger's site (media citizen)-
---
http://mediacitizen.blogspot.com/2006/02/fleecing-and-flogging-of-americans.html

The GAO report carefully itemizes this administration’s preference for pre-packaged reporting at the expense of real news and information – in a scheme to make U.S. taxpayers pay for their own deception.

The report found that White House public relations spending goes well beyond the practices of any prior administration. The contracts included $2.5 million to present the Army's strategy in the global war on terrorism; $86 million to explain the new Medicare prescription drug benefit in a bilingual ad campaign; and a $6.3 million agreement to help the Department of Homeland Security educate Americans about how to respond to terrorist attacks.

Fixing the Facts

This is not the first we’ve heard about this. Last September, GAO auditors scolded the White House for squandering American tax dollars to hire fake news reporters and unleash a pre-packaged news blitz in advance of the 2004 elections. That GAO report found the White House violated the law by hiring pundit Armstrong Williams to appear before the cameras and tout Bush’s education initiative, the No Child Left Behind Act, while interviewing administration officials on the air.

----

so they're using fake news to sell Bush's domestic programs...propaganda for U.S. citizens. And they used this same planted news story (VNR) tactic to sell the war in Iraq.

---

more from that blogger-

The Smith-Mundt Act of 1948 forbids the domestic dissemination of government-authored propaganda or "official news" deliberately designed to influence public opinion or policy. The law singles out materials that serve "a solely partisan purpose." The GAO has already found at least four separate occasions that Bush administration agencies violated this and other federal restrictions.

another link-
----
http://www.freepress.net/propaganda/=pentagon

According to Sheldon Rampton and John Stauber, in the run-up to the War in Iraq the Pentagon handed “global strategic communications consultancy” the Rendon Group a multi-million-dollar contract to sell Americans on a preemptive war in Iraq. Both Rendon and the Pentagon have kept steadfastly quiet on exactly what this involved. Seymour Hersh has since reported that Rendon had been hired by the Pentagon’s now-defunct Office of Strategic Influence, to plant news stories – including false ones – in the media. We have yet to uncover which American “journalists” worked with the OSI while it existed, and how much they were paid.
-----

Source info on Rendon here-

http://www.sourcewatch.org/index.php?title=Rendon_Group

seems Kuwait hired him to help create support for the Iraq invasion during Bush I. (Did the lies about incubator babies come from his work, I wonder?)

from the link above-

The New York Times reported in February 2002 that the U.S. Pentagon was using the Rendon Group to assist its new propaganda agency, the Office of Strategic Influence (OSI). However, the OSI was publicly disbanded following a backlash when Pentagon officials said the new office would engage in "black" propaganda (disinformation).<6><7>
---

also involved with OSP (stovepiping, Hersh's New Yorker reporting) and the creation of the Iraqi National Congress (remember the plan to put Chalabi in as a puppet? Remember the staged for U.S. consumption show of the Saddam statue coming down?)

here's a link to a bigger picture-

http://www.informationclearinghouse.info/article2842.htm

okay, I have to stop now, but all this just makes me have more questions and no answers. however, the issue is not just that the Bush junta has broken the law. the issue is also that the Democrats have failed to slam them against the wall over these things. Which leads me to wonder how much Bush, etc. has used extra FISA internal spying to blackmail key dems. again, just speculating.
Printer Friendly | Permalink |  | Top
 
Vektor Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:37 AM
Response to Original message
189. As one poster on muckraker's blog stated...
"This is damn exciting!"
Printer Friendly | Permalink |  | Top
 
sojourner Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:19 AM
Response to Original message
193. this is amazing stuff.........and DU has the "staff" to dig through it, too!
go DU researchers GO!!
Printer Friendly | Permalink |  | Top
 
Vyan Donating Member (990 posts) Send PM | Profile | Ignore Wed Aug-01-07 04:04 AM
Response to Original message
197. I'm thinking it's Wayne Madsen...
not that I have proof, just a hunch (and a similarity to some of his claims I've seen in the past).

Vyan
Printer Friendly | Permalink |  | Top
 
AntiFascist Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 04:28 AM
Response to Reply #197
200. My thoughts too. I haven't been on his site lately since it turned into a pay site...

Generally speaking, what's he been talking about lately?
Printer Friendly | Permalink |  | Top
 
broadcaster Donating Member (105 posts) Send PM | Profile | Ignore Wed Aug-01-07 04:10 AM
Response to Original message
198. anon's comment about internment camps.. wish he'd said more n/t


Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 05:14 AM
Response to Reply #198
201. Good Mornin`
:donut:
Printer Friendly | Permalink |  | Top
 
democrank Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 05:16 AM
Response to Original message
202. Stunning indeed, kpete.
I`m trying to digest it all. Thanks for posting this.
Printer Friendly | Permalink |  | Top
 
Champion Jack Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 06:14 AM
Response to Original message
205. kicked in the morning
Printer Friendly | Permalink |  | Top
 
Hepburn Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 06:17 AM
Response to Original message
206. Method to search for the "no name" posts that might help
Edited on Wed Aug-01-07 06:27 AM by Hepburn
Some of you may do this already to search for certain words on a page, but others may not know about this:

Go to "Edit" and click open and then go to "Find on this page..."

If you insert the words "posted by", and start clicking on "next", you will get the section that names each poster on a post without having to scroll and keep looking. It is much easier IMO to spot the blank (or "no name") posts on such a long string of posts.

Hope this helps...:hi:

Edit: To fix typo
Printer Friendly | Permalink |  | Top
 
bonito Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 06:54 AM
Response to Reply #206
207.  I didn't, Thanks!
:)
Printer Friendly | Permalink |  | Top
 
WinkyDink Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:05 AM
Response to Original message
209. "Where are woodward and Bernstein"? WHERE ARE THE YOUNG? Where are the
potential DRAFTEES?

I guess I'm stuck in the 60's-70's.
Printer Friendly | Permalink |  | Top
 
seafan Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:11 AM
Response to Original message
211. Much more on Fleishman-Hillard:
Edited on Wed Aug-01-07 07:19 AM by seafan
This is what Anonymous Poster alluded to with Fleishman-Hill(i)ard on July 30, 2007 5:58 PM


4. Then, you want to compare the nature, and terms of the Verizon contract with the various media-messaging firms within the GOP-WH-DOJ that are linked with AT&T. One of the names that may appear is Fleishman Hilliard. This firm's name is one that has been linked with AT&T, and could very well have a contract that permits it to get the stripped down versions of the NSA intercept data; and which they use to develop some sort of media messages. The speculation is that the Gonzalez testimony about "this program" or "that program" relates to the method by which NSA data is stripped of identifying information; and how this non-specific information is then transferred possibly through an Intermediary to a firm associated with DoJ and DoD. As you dig into the Fleishman Hilliard Contracts, you Will find a common contract number that crosses multiple Presidential programs and appropriations -- DoJ, DHS, DoD. The contract numbers are essentially the same.





From http://www.sourcewatch.org/index.php?title=Fleishman-Hillard">Source Watch:


(I have bolded info that jumped out at me up front.)



Fleishman-Hillard is one of the largest public relations companies in the world with a global network of offices as well as offices in 22 cities in the United States. It is owned by Omnicom.


.....

In a listing on its website of PR companies with a crisis management capability, the American Meat Institute described F-H in the US as having "managed crises for the oil, railroad, airline, meat, poultry, produce and high-tech communications industries. Fleishman currently is on retainer for the Partnership for Food Safety Education." <1>

According to the F-H firm's website: "In 1946, in St. Louis, Missouri, Fleishman-Hillard founders Al Fleishman and Bob Hillard tapped out the beginnings of a business on the keyboards of their manual typewriters... For the next twenty-some years, the firm served a mainly regional client base, until 1974 when John Graham was named president.


.....


This is important in light of the "front companies" alluded to by Anonymous Poster (see below):

---Employees of Company A posing as employees of Company B---



In May 2004, San Francisco Chronicle reporter David Lazarus questioned whether codes of conduct were broken when Marc Bien, who he interviewed with the understanding that Bien was Vice-President of Corporate Communications for the telecommunications giant SBC Communications, was actually found to be an employee of F-H.<3>

Lazarus wrote, in a follow-up article on a possible strike at SBC: "I quoted an SBC spokesman the other day defending the company's use of hundreds of outside contractors -- a contentious issue in the contract talks with union members. Turns out, according to internal SBC documents, that the spokesman, Marc Bien, himself is a 'nonemployee' who is actually on the payroll of public- relations powerhouse Fleishman-Hillard. He is, in other words, an outside contractor, as are dozens of other Fleishman employees who assist with SBC's corporate spin. What makes the case unusual, though, is that Bien, who has appeared in this column many times representing SBC's position on a variety of matters, bears the title of SBC vice president of corporate communications. His business cards say as much, and he works in the firm's San Francisco office. Internal documents show that about a half-dozen SBC vice presidents are in reality Fleishman employees. Yet they present themselves as SBC executives."<4>




U.S. Government PR Contracts

According to the U.S. House Committee on Government Reform Minority Office, Fleishman-Hillard received the following amounts per year, for federal PR contracts: <5>

* $39,000 in 1998
* $33,589,000 in 1999
* $2,344,000 in 2000
* $5,011,996 in 2001
* $23,903,419 in 2002
* $3,433,690 in 2003
* $8,686,529 in 2004


The firm's federal work has included the Social Security Administration, on the “Ticket to Work” program for disabled and blind Social Security recipients; Library of Congress; Environmental Protection Agency; Department of Defense, to introduce “managed care” to 8.3 million current and former employees, at a time of “rising medical costs” and “decreasing resources”; and Office of National Drug Control Policy, to “debunk the misconception that marijuana was harmless."

Video news releases Fleishman-Hillard (and its subcontractors Gourvitz Communications and Harbour Media) produced for ONDCP were found to be in violation of the ban on covert government propaganda.




Fleishman-Hillard Government Relations

F-H's Government Relations practice "has offices in Washington, D.C., New York City, Albany, and Minneapolis," according to the Holmes Report ("Former Congressman Joins Fleishman Government Relations," March 19, 2007). The practice is "led by co-chairmen former Congressman Max Sandlin, former Bronx borough president and New York City Democratic mayoral nominee Fernando Ferrer, and Michael McKeon, former communications director to Governor George Pataki."

In March 2007, former Congressman Bill Luther joined the practice as a senior vice-president. Luther served on the House Energy & Commerce Committee, the International Relations Committee and the Science Committee, according to the Holmes Report ("Former Congressman Joins Fleishman Government Relations," March 19, 2007).

Also in March 2007, F-H Government Relations announced that former Missouri Senator Jim Talent had joined the firm as Co-Chairman. The firm cited Talent's bipartisan success in securing funding and construction bonds in the highway bill and in passing the "most comprehensive anti-meth bill ever enacted into law", as well his leadership role in efforts to add a renewable fuels standard to the energy bill as accomplishments which would enhance F-H's ability to "work on important issues like increasing access to healthcare, improving our transportation infrastructure, and strengthening our military". <6>

In June 2007, O'Dwyer's PR Daily reported that, in his new role as co-chair of Fleishman-Hillard's government relations practice, former U.S. Senator Jim Talent will be "spearheading the Alliance of Automobile Manufacturers' bid to torpedo the effort to raise fuel mileage standards to 52 miles per gallon" by 2030. Instead, the automakers are supporting a compromise measure from Senators Carl Levin and Kit Bond. "Talent cannot lobby for the Levin-Bond bill because of Senate rules," explained O'Dwyer's. "He can do media outreach on behalf of the carmakers." <7>




Clients

According to O'Dwyer's PR Report, in mid-2004 F-H clients included:

* the state of Illinois, "to handle PR and public affairs to prevent the closure of Scott Air Force Base in the southern part of the state" <9>;
* Novell, Sun Microsystems and J.D. Edwards, in a San Francisco-based "effort to use customer outreach programs to add their voice to clients' PR, sales adn marketing efforts"<10>;
* Great Plains Airlines, a short-lived St. Louis-based service that declared bankruptcy after four months<11>; and
* Circuit City, a $1 million account. <12>

Other clients include:

* Democratic Party of Japan <13>
* HBOS, the UK’s biggest mortgage and savings bank; <14> (Sub req'd)
* Quickie Manufacturing Corporation <15>
* AtheroGenics Inc <16>
* Marriott Hotels and Ritz-Carlton Hotels <17>*Mexicana Airlines <18>
* National Association of Insurance Commissioners <19>
* California Grown <20>
* Egypt <21>
* San Joaquin County <22>
* Saudi Arabia's King Abdullah University of Science and Technology, a "post-graduate, research-focused university ... scheduled to open in 2009," according to PR Week <23>

In August 2004, PR Week reported that the Chicago office of F-H were advising PepsiCo with a campaign to respond to concern about rising levels of obesity. The campaign will promote the company's "Smart Spot" on a range of products which it claims contribute to a healthy lifestyle.<24>




The Holmes Report writes: "Fleishman-Hillard has better national coverage than any of its competitors, with 34 domestic offices. With more than 400 employees, the St. Louis headquarters continues to rank among the largest concentrations of PR talent on the planet, and to handle a wide variety of consumer, business-to-business and corporate clients."

Holmes also notes: "Fleishman-Hillard has been getting more and more deeply involved in the biotechnology sector, helping the Biotechnology Industry Organization and the Council of Biotechnology Information communicate the benefits of the technology to consumers and opinion leaders."<25>

In August 2006, one day after the Associated Press reported that the electronic voting machine company Election Systems & Software (ES&S) "agreed to a $750,000 settlement that resolves complaints filed after its software caused delays for some Indiana voters and election officials during the state's May primary," O'Dwyer's PR Daily reported that Fleishman-Hillard was representing ES&S. <26><27>




Fleishman-Hillard and UK Politics

In April 2005 Kevin Maguire wrote of F-H distributing a glossy brochure to their clients sketching the likely changes that could be expected under a Labour government led by Gordon Brown. "Warning multinational bosses that the next Labour premier's philosophy is built on - wait for it - equity, the booklet predicts Brown will centralise power around himself," Maguire wrote. <28>

In June 2005, Kevin Bell from the UK arm of Fleishman-Hillard spoke at a one-day conference in London called ID Cards: Towards Procurement and Implementation. The title of his talk was "Achieving public acceptance". <29>




We should be massively digging into Fleishman-Hillard, it appears.



Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:20 AM
Response to Original message
212. SUMMARY FROM kos
Edited on Wed Aug-01-07 07:49 AM by kpete
Found on Democratic Underground a reference to a blogger on TPMMuckrakers that is deep-throat-esque, and has sensitive information regarding Bush and Co.'s lies and obfuscation of FISA, TSP, NSA, and warrantless wiretapping investigation


SUMMARY
Mueller appears to be referring to a sub-contracted effort which indirectly supports the NSC with a special domestic security unit. These units engage in direct engagement with state-side personnel and civilians. Contractors, law enforcement, and intelligence personnel are assigned under non-direct-NSC-NSA units, but are hidden inside commercial entities. The groups appear capable of moving quickly, with no direct supervision, but act as internal security forces, completely outside FISA oversight. They appear to be entities unrelated to FISA, but are front line units which verify information, gather intelligence domestically, and help NSC pinpoint targets which NSC contractors are assigned.

RECOMMENDATIONS
A. Congress examine the Operation Falcon; determine which NSA/NSC personnel were assigned to oversee.
B. Examine the budget lines inside the DOD foreign entities support accounts; and determine which banks are used to challenge those funds. Determine how the DOD funds are funnelled overseas through the NSC entities, then back to the US to these individual groups.
C. Review the "investigative leads" and ground rules JTTF and local law enforcement use to dissuade detection of the domestic intelligence gathering efforts.
D. Review the destruction logs of the CIFA; and determine who was supposed to keep the logs related to these classified documents.
Determine which signalling systems, monitoring, and other intelligence gathering the JTTF are using; and where this information is sent. Ultimately, it winds up somewhere: Which contractors, NSC staffers have access to these reports.
E. Examine with Congressional Counsel whether it is the intent that these domestic security services operate this way; and whether, as FISA is written, this type of activity would fall outside what the FISA Court can engage.
F. Review the DHS domestic interrogation facilities. Look at the gas mileage for the DHS pick up teams. Review the files they've had access to; and the basis for detaining someone. Review the complaints of citizens being forcibly removed from their cars, engines running, or being taken from their homes while school children are present in the early morning. Evidence includes car impound fees.
G. Discuss with POST and local LE efforts used to dissuade public awareness of intelligence gathering: Excuses given to hide pre-textual stops; and examine whether local officials do or do not keep adequate records related to officer complaints and requests for civilian oversight to examine officer misconduct.
H. Examine problems during audits: To what extent officers in LE, FBI, and DHS are concerned when reports of officer misconduct arise; and what methods auditors are aware to segregate complaints about officer misconduct from auditors:

Have they been asked to leave the room; were concerns explained away; were officers complaining they were "short manned" an unable to supervise; and how do these explanations square with the officer conduct.
How often are these units employed to provoke innocent civilians to respond to abuse?
To what extent are these domestic units used to harass civilians based on a "hunch"?
Would these units put the children of minors at risk to entrap a suspected target?
Is there no report of any of these personnel ever exposing a minor to a potentially unsafe situation to engage a target?
Has the FISA court, Congress, and Judiciary been fully apprised of how these units operate; their procedures; and oversight requirement to ensure 42 USC 1983 claims are minimized?
What insurance do these units have if they are engaged in liable action?
Posted by:
Date: July 27, 2007 5:37 PM

more & some interesting comments at:
http://www.dailykos.com/storyonly/2007/8/1/42635/43285
Printer Friendly | Permalink |  | Top
 
NewJeffCT Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:42 AM
Response to Original message
213. I just hope something does come out of this - will it be the new Pentagon Papers?
I know TPM is probably the most respected left of center blog from a journalistic perspective.

But, back in the early 70s, media ownership was far more diffuse, while everybody watched Walter Cronkite on TV for their news.

Nowadays, the media ownership is concentrated with a few big mega-corporations and every nightly news anchor struggles to get a small fraction of Cronkite's audience.
Printer Friendly | Permalink |  | Top
 
Holly_Hobby Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:59 AM
Response to Original message
215. Delete
Edited on Wed Aug-01-07 08:00 AM by Holly_Hobby
.
Printer Friendly | Permalink |  | Top
 
jzodda Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:14 AM
Response to Original message
216. This is Just Stunning! The question now becomes: What do We do Now?
We have this info. It leads to more questions and so whats the next step? This is news imo, not some opinion piece. Its all very mysterious but if this individual is willing to risk his/her job or even dare we say "more". Then we need to make sure this information reaches the right people!
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:18 AM
Response to Original message
217. kick
Edited on Wed Aug-01-07 08:28 AM by alyce douglas
thanks again Kpete, I think with enough of us behind this, this information will be disseminated into the right channels.

Should we send this information to Senator Schumer? Who can we send this information which Senators?, will they even look into it?
Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:43 AM
Response to Original message
221. He's on TPM
writing about Stevens...I think it's him...
Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:45 AM
Response to Reply #221
223. This him?
Why was this "hold" provision exercised by anyone 2001-2007 in re:
- FISA illegal activity
- Unlawflu prisoner abuse
- Rendition funding
- Patriot Act
- NSLs
- MCA
- Habeas destruction

Tell us, Senators: Which dares to explain why this rule was not fully enforced to ensure that only _lawful_ bills were enacted?

Either this rule -- by its invocation on ethics -- is evidence of wrong doing, warranting Steven's expulsion by the body; or, the rule exists, and "should have" been used, but was not on the above listed -- ILLEGAL -- bills.

Comment from the SEnate; and enter into evidence: Each of the Senators -- using this rule -- had the power to block -- individually -- each bill which they knew, or should have known was illegal and unconstitutiona. In contravention to their oath, the Senators refused; but did permit, illegally, the listed BIlls to be fully fundedd, despite their illegality.

Seeing a rule to defend the Constutition, but not seeing that rule enforced, means the Senators -- all 100 of them, have no excuse for these illegal bills.

Posted by:
Date: July 31, 2007 9:34 PM
Printer Friendly | Permalink |  | Top
 
DemReadingDU Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 08:57 AM
Response to Reply #223
225. I think so
Looks the the Mystery Poster is posting on other threads in TPM. I have more reading to do.

:hi:
Printer Friendly | Permalink |  | Top
 
frustrated_lefty Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:22 AM
Response to Reply #221
228. Yup, it's him
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:25 AM
Response to Reply #228
229. I am a bit
OVERWHELMED!!!
Printer Friendly | Permalink |  | Top
 
sojourner Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:01 AM
Response to Reply #229
237. yeah.......talk about unleashing a firestorm! GOOD WORK...kpete!
It will be interesting to see where this goes, if it's legit, and whether efforts here can help it make a difference.
Printer Friendly | Permalink |  | Top
 
Blackhatjack Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:30 AM
Response to Original message
230. Some thoughts on the mystery blogger(s)' identity....
Edited on Wed Aug-01-07 09:45 AM by Blackhatjack
Editted the post title...

I have read almost all the linked instances in which the mystery blogger may have posted.

This is just my opinion, but we can draw a few conclusions as to who he/she might be from the following:

Knowledge of forensic accounting principles
Knowledge of government auditing procedures
Knowledge of present career officeholders and how they actually function, not just their job descriptions
Knowledge of email recovery and internet exploitation schemes

Some knowledge of law related to powers and procedures
Some knowledge of how ethical standards are applied and the obligations they impose
Some knowledge of constitutional law interpretation

Some deficits regarding obligations imposed on President and his staff
Some deficits regarding obligations imposed on House and Senate
Some deficits regarding Congressional funding bills and approval process

IMHO some information that is provided may have been included as 'a red herring' to assist in keeping his/her identity a secret

And why disclose this information in this manner when it could have been disclosed in such a way as to ensure his/her identity would be protected?

IMHO I believe the 'mystery blogger' MOST LIKELY is a combination of two or more individuals with one likely posting the information online and the other feeding critical information as 'an insider' with the Administration. Thus, the insider can truthfully say they have not posted anything online in this regard, and the actual poster can get the critical information to the public.

I do not believe that any of the individuals making up the mystery blogger are attorneys, but they have worked with attorneys and/or been involved in legal actions.

I believe the insider who is feeding the critical information is most likely a career bureaucrat presently employed inside the Administration or recently separated from their job inside the Administration.

In the best tradition of upholding the 'public's right to know' what its government is doing in their name I believe these individuals are indeed patriots, and they would be prosecuted to the fullest extent of the law if they were to become known.

Just a theory.
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:35 AM
Response to Reply #230
231. CHENEY's Gestapo
Mueller appears to be referring to a sub-contracted effort which indirectly supports the NSC with a special domestic security unit. These units engage in direct engagement with state-side personnel and civilians. Contractors, law enforcement, and intelligence personnel are assigned under non-direct-NSC-NSA units, but are hidden inside commercial entities. The groups appear capable of moving quickly, with no direct supervision, but act as internal security forces, completely outside FISA oversight. They appear to be entities unrelated to FISA, but are front line units which verify information, gather intelligence domestically, and help NSC pinpoint targets which NSC contractors are assigned.
Printer Friendly | Permalink |  | Top
 
Blackhatjack Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:40 AM
Response to Reply #231
233. So all this intel gathering falls under the heading of 'outsourced civilian intel collection'...
... and the question to ask is does that provide the government with 'deniability' in claiming that it is not engaged in clearly illegal intel collection activities.
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:57 AM
Response to Reply #233
236. good question
lots of good questions - now we need answers
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:21 AM
Response to Reply #230
253. Probably not a political office type. Seeming detailed knowledge of how DoD runs black budget ops,
so I would tend to guess that this guy's backround is as a DoD or NSA operations manager, if he's for real. Knowledge of legal matters indicates a program management background instead of a purely technical specialist.

This is someone who appears to have read investigative case files, shows detailed knowledge of physical surveillance as well as elint, so he could be present or former FBI.

I don't get the imnpression that his career focus has been in running actual counter-terrorism operations because the specialized references I read in first-hand accounts by CT operators aren't there.

Could be a collaborative effort by some ex-military intel types to spoof us. The person(s) involved obviously far more knowledgable and intelligent than any Freeper I've ever encountered.
Printer Friendly | Permalink |  | Top
 
Blackhatjack Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:42 AM
Response to Reply #253
262. The more I review the posts, the more I am convinced there are 2 or more involved...
The range of matters mentioned typically would not be confined to the responsibility of one individual.
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:47 PM
Response to Reply #262
282. A bright, experienced DIA/CIA/NSA program manager would have that range of knowledge
Edited on Wed Aug-01-07 01:10 PM by leveymg
You could be right. This could be a composite pseudo-identity.

You gotta wonder what the purpose of the spoof would be, if this is a hoax. If it's meant to send Hill Committees off after red-herrings, I doubt if a lot of professional staff time has been spent trying to walk this back.

It's all very speculative -- and admittedly so -- so I suspect that it's a high-order rant, rather than a complete hoax. A hoax would more likely try to convince us that this is somebody with first-hand, inside knowledge iof an actual operation, but that's not being claimed here.

No matter who this really is, it's fascinating.
Printer Friendly | Permalink |  | Top
 
Blackhatjack Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:59 PM
Response to Reply #282
288. I do not think this is a hoax, but I do think it is a collaborative effort...n/t
Printer Friendly | Permalink |  | Top
 
Rosa Luxemburg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:01 PM
Response to Reply #230
309. I would think it would be an insider
one with an axe to grind
Printer Friendly | Permalink |  | Top
 
happygoluckytoyou Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:38 AM
Response to Original message
232. TONY SNOW HERE------------------------->
cant you see that by hurting the president the terrorists win?

and johnny can you tell us what the terrorists have won?

----thank you tony... yes, by damaging the presidents image, the terrorists have won flattened houses, dead relatives, any chance for a democracy in their country, deformed embryos due to exposure to uranium, hunger, no clean drinking water, no electricity, an invasion and occupation by foreign troops, the destruction of their government, infrastructure, and historical works of art...

---------and if you will look, down on the floor, vanna will you open the curtain.... yes! you have had your country's wealth and control of your oil and your destiny given to BIG OIL at 10 cents on the dollar.....

CONGRATULATIONS!!!!
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:55 AM
Response to Original message
234. an archive of mystery blogger at Kos
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:40 AM
Response to Reply #234
244. see if you think this would be useful
I threw it together in response to a couple of comments above
this is just a shell - I put two posts as illustration - I can collect from whomever wants to go "gathering"

I can put copies on my server, or put links to the posts themselves

http://www.algaeawards.com/reflib
Printer Friendly | Permalink |  | Top
 
Free Speech Zone Donating Member (55 posts) Send PM | Profile | Ignore Wed Aug-01-07 11:33 AM
Response to Reply #234
259. Thanks for that
Printer Friendly | Permalink |  | Top
 
rhiannon55 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:55 AM
Response to Original message
235. Verrry Interesting....
Bookmarked; morning K & R!:kick:
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:03 AM
Response to Original message
238. interesting
Lets start of with a quote from out mystery poster:

Remember, this information is open. Anyone can do this. The key is to notice the leverage We the People have on Congress, the President, and US government.

and

Do what you have to do. The problem is simple: The clues are emerging; the issue is whether people want to see them, then dig. The answer are not hidden, they are not as deep as you might think. One thing surfacing in one area, sheds light on what else is happening in other areas. Take the larger perspective.
Printer Friendly | Permalink |  | Top
 
havocmom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:31 AM
Response to Reply #238
257. Kick
and taking the larger perspective:

Hiding all those various entities to circumvent laws and oversight sure looks like the hand of some boardroom pros. Companies hidden within holding companies within companies.... hmmm, a corporate sort of tangle. Who do we know that played THAT game?

And who ever it is setting up all the layers also knows DOD inside and out.

Hmmmm.

Ya know, kpete, my neck hairs have always told me Tenent didn't just fall on his sword and walk away. Nothing to base it on but gut feeling and tingling nerves. The chess game just got started when Cheney thought he had a patsy taking the fall way back when.

There are lots of bad guys in the world, but there are also lots of people who really do serve the nation. When those people put together just how they have been used, them would comprise on hell of a chess team. Somebody has the respect and affection of good spooks.

Thanks for this great thread. So much to digest. Have to do it in stages.

Meanwhile, keeping it :kicked:
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:07 AM
Response to Original message
239. I sent this information to Thom Hartmann
just to see what he thinks.
Printer Friendly | Permalink |  | Top
 
rubberducky Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:15 AM
Response to Original message
240. kpete, another kick
this story is BIG. While what the mystery poster has to say is beyond chilling,this all needs to see the light of day. But, damn is this beyond scary. Who in the government can we trust?
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:37 AM
Response to Original message
243. keep kicking and rec if you haven't already
Printer Friendly | Permalink |  | Top
 
GMFORD Donating Member (202 posts) Send PM | Profile | Ignore Wed Aug-01-07 10:47 AM
Response to Original message
246. Other programs
The mystery poster asks the question Why doesn't the Congress pursue this? Or something to that effect. He(she) also mentions that the other program(s) appear to be in place pre-911.

My thought is that the other program(s) referred to were inherited from the Clinton administration. That would certainly explain why the Dems are not so anxious to expose. I mean, do we really think there was time to set up whole surveillance systems from scratch in the short time Bush was in office prior to 911?
Printer Friendly | Permalink |  | Top
 
Horseradish Donating Member (98 posts) Send PM | Profile | Ignore Wed Aug-01-07 10:51 AM
Response to Original message
248. drop kick ...
What's blowing my mind at the moment is how completely MODERN and unique this whole thing is.

Could you have imagined in 1998 this web of minds and this passion for the truth passing the MSM like it's a Model T !?!? SEE YA!
Printer Friendly | Permalink |  | Top
 
Cetacea Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:52 AM
Response to Original message
249. K+R nt.
Printer Friendly | Permalink |  | Top
 
DeSwiss Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:53 AM
Response to Original message
250. Holy Shit!!!
I think this may be IT!!!!! :wow:
Printer Friendly | Permalink |  | Top
 
Blackhatjack Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:18 AM
Response to Original message
252. 135th Rec and looking for more!
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:28 AM
Response to Original message
256. IS IT STRANGE TO ANYONE THAT JOSH MARHSALL HASN'T COMMENTED ON THIS?
Edited on Wed Aug-01-07 11:32 AM by mod mom
JMM's site is the main place this person/persons have posted (also at CREW), yet he and his staff have not made a formal acknowledgement. I'm not saying this is fake (think pyschops) but how do we know this guy isn't spreading disinformation. Yes, there's a lot of technical/insider info but that doesn't mean it's true. Read Leveymg post above. I'm just suggesting that this frenzied acceptance should be coupled with caution.
Printer Friendly | Permalink |  | Top
 
Subdivisions Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:32 AM
Response to Reply #256
258. As excited as I am by this information and the "mystery poster",
I join with you in excercising caution. It's a strange new world we're living in and we don't want to fall victim to a Trojan horse.
Printer Friendly | Permalink |  | Top
 
Justice Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:37 AM
Response to Reply #256
260. You were reading my mind
I've been wondering that as well. On the other hand, no one is censuring the posts either (ie deleting them).
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:44 AM
Response to Reply #260
264. The only one that I have known Josh to censure/ban is "jake" a chronic troll
who posted there all the time. In fact Josh just recently posted that they had many complaints about Jake but had to work out a way to ban. He was EXTREMELY infuriating and posted nothing but attacks.

I know I really got to get a life but I am an avid/regular reader of the comments posted at Muck as I find very knowledgeable folks there. :blush:
Printer Friendly | Permalink |  | Top
 
DeSwiss Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:22 PM
Response to Reply #264
276. In general I agree....
...that caution should be exercised. However, the specificity of these posts not only suggests they may be credible, but they are so voluminous that at this point I don't think Josh or anyone else could comment upon their validity until some of these suggestions, links and queries that Anonymous has recommended can be followed up on.

Of course that doesn't preclude what your suggested as far as it possibly being some kind of psysop exercise being perpetrated here. Particularly if the points being made are designed to leads us away from the fire to just where there is more smoke. But from what I've read so far of the posts, Anonymous is making suggestions of not only what the press can do, but average citizens as well as Congress and their staff lawyers.

Anonymous is saying that the wrong questions are being asked by Congress, and other questions that should be asked, aren't being asked because no one's considered the connection between what are apparently separate and disconnected activities. And Anonymous also said that BushCo would not think twice about misleading Congress based upon semantics and simply because they failed to specifically ask the exact right questions. An example might be where Anonymous uses the Ralston testimony:

What's curious about Ralston's denial is that she, as Goodling did, leaves open other possibilities. This information builds off the discussion related to Ralston's apparent vague, open-ended comment. Ralston stated in her deposition that she was not aware of any discussions related to this claim:

I don't have a recollection of anyone discussing with me specifically that claim.

The above Ralston comment leaves open the possibility that Ralston was aware of non-discussions: Online White House-EOP-DoJ communications in a collaborative electronic environment. As Ralston as carefully worded her denial, she does not specifically exclude the possibility that she, while working for Rove, was not aware of any online electronic data exchange; or collaborative work product review. One such product that integrates with Windows Office 2007 is SharePoint from Microsoft.


As anonymous states, in their minds they haven't lied even when the intent to obfuscate and mislead is clear. And one other point that Anonymous has made that would be relatively easy to clear up and that is the "open source" information where data that Congress has been rebuffed in receiving from the WH based upon their claim of privilege, may be available in open sources that others haven't considered because they do not appear to be related to their inquiry.

And the clincher could be Anonymous's suggestion to cross-reference some of the phone numbers in one of those open source documents related to the lawsuits brought by the Maine state AG's office against Palfrey's phone lists. That would get everyone's interest even the MSMs becasue sex is involved. Even though its pales in comparasion with the real crimes these people have committed.
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:08 PM
Response to Reply #276
291. excellent points.
Also, could be more than one anonymous poster-especially with the notoriety (DU Muck,Kos) they are receiving. Seems to have information in a range of complex areas.
Printer Friendly | Permalink |  | Top
 
ClayZ Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 11:56 AM
Response to Original message
265. WOW! K and R
Amazing read!
Printer Friendly | Permalink |  | Top
 
Babsbrain Donating Member (536 posts) Send PM | Profile | Ignore Wed Aug-01-07 12:01 PM
Response to Original message
267. Posted by anonymous poster on July 10
posted on TPMmuckraker.com:

WH appears not inclined to back down: The RNC e-mail destruct appears to be linked with war crimes. Possible punishment: Death penalty. They have nothing to lose by fighting everything.

Not to worry: We the People outnumber them; the law is on our side; and their legal arguments are frivolous, without merit, and uncompelling. We the People retain the power and right to impeach legal counsel and officers of the court if they choose to hide evidence of illegal activity.

Posted by:
Date: July 10, 2007 5:31 PM

Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:04 PM
Response to Original message
269. for those who want more - they are working on this at KOS
Printer Friendly | Permalink |  | Top
 
seemslikeadream Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:08 PM
Response to Original message
270. a deeper, darker context to what Bush and/or Cheney might be trying to hide.
http://www.rigorousintuition.ca/board/viewtopic.php?t=12658&sid=fcef73b99b61d43d8a7e0b82b37ac392

(sorry if it causes any confusion, but I've edited this a bit since first posting it, for a typo/some grammar/clarity issues)

Seemslikeadream, I found the comment below interesting--it's not in what you posted (unless I missed it somehow?)--it comes from a section the TPM comment thread that your selection jumps over, but to me it gives a deeper, darker context to what Bush and/or Cheney might be trying to hide.

Sorry if you left it out for some reason--I don't mean to shift away from the focus you seemed to have on what seem to be tips/info from an 'insider' on what may really be behind Gonzales' mincing answers. I'm with you and Sunny: the comments raising NSC and round-about DOD connections seem NOT like someone's speculations, but more like a 'follow the money' kind of 'tip'.

But, about the comment from that TPM discussion that I'm adding: with it's focus on events leading up to 9-11, though raising such a connection may lead to looking at/dismissing the AG-gate scandal, etc. as just an extension of 9-11 Truthers' 'conspiracy theories', I think it's still worth raising--if for no other reason than it may get others, drawn by such a connection, to look at the NSC/DoD aspects and to spread the word about the 'insider-y sounding' comments you've flagged and posted.

So: I hope raising this will spark interest in this thread, but will not have misdirect discussion.

That said, I gotta say, I've long wondered about that meeting in early July of 2001. If there were two meetings and I'm confusing them, someone set me straight--but I think 'there can be only one' high level meeting with Rice: Tenet and some unnamed 'other' gave a power point to alert the administration about very strong concerns re some sort of terrorist strike.

Does this comment's mention of a 'high level FBI official' narrow down who that unnamed 'other' was? Was is Mueller? Of course, maybe this comment is made someone who's confused or doesn't really know any more than we do about that meeting. It's from 'mo2' and the 'insider-y' comment is anonymous.

In any case, I remember word coming out about this meeting about a year ago when one of Woodward's book had just come out. Word of Tenet having met with Rice made Rice and the administration in general look bad. They were taking a lot of heat but then Richard Clarke said something that gave Rice some cover/defense against such attacks. I think he said something about things were not as clear as Woodward had made them out to be. Since he'd been (very) critical of the administration in the 9-11 Hearings, it seemed strange that he now, to some degree, stood up for them.

I had a bee in my bonnet about who had been with Tenet in that meeting--some other official (I thought CIA, but maybe not) was supposed to have been there. It seemed like a lead that could have led somewhere, to find out who that other person was. I also wondered and still wonder if the power point from that meeting could be recovered and what it would say.

The comment below doesn't answer such things, but it's interesting that the July 5, 2001 mtg.--which stirred up such an interesting flurry at the time I'm thinking of--is (maybe) again a part of the flow of meaningful events.

Quote:
I think I have figured out why Mueller is parsing his words and what the White House is protecting:

The illegal Project X wiretaps had captured information on Zacarious Moussaoui that could have prevented the 9-11-2001 attacks from occurring at all.

"A senior FBI official attending the White House meeting on July 5th (2001) committed the bureau to redouble contacts with its foreign counterparts and to speed up transcription and analysis of wiretaps obtained under the Foreign Intelligence Surveillance Act (FISA), among other steps.

But when the field agent in Phoenix, Arizona, reported the suspicions of a hijacking plot just five days later, the FBI did not share the report with any other agency. One must ask, why?
...
On August 15,2001, an alert civilian instructor at a Minnesota flight school called the FBI" ...
The FBI office in Minnesota attempted to get a FISA warrant, but they were rebuffed. A crucial mistake, because Zacarias Moussaoui’s possessions contained evidence that would have exposed key elements of the September 11th plot.

But, why was this request denied? Again, the historical facts must be analyzed.

In March 2001, an internal debate ignited at the Justice Department and the FBI over wiretap surveillance of certain terrorist groups. Prompted by questions raised by Royce C. Lamberth, the Chief Judge of the FISA Court, the Justice Department opened an inquiry into Michael Resnick an FBI official who coordinated the Act’s applications. Attorney General John Ashcroft and Robert Mueller (then deputy Attorney General), ordered a full review of all foreign surveillance authorizations.
...
The article goes on to state, “the men then phoned Bangor airport trying to get a flight to Boston but were told there was no flight that matched their desired departure time, the authorities said. The men then phoned Portland International JetPort, where two of them apparently made reservations for a flight to Boston on Tuesday morning.”

How would this information be gleaned so quickly? How would the FBI know to visit a store in Bangor, Maine only hours after the attacks? Moreover, how would they know the details of a phone conversation that occurred a week prior to the attacks?"
http://s3.amazonaws.com/911timeline/2002/senatecommittee091802b.html

Posted by: mo2
Date: July 27, 2007 5:19 PM
Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:16 PM
Response to Reply #270
272. Wowie Zowie
:wow:
Printer Friendly | Permalink |  | Top
 
Holly_Hobby Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:16 PM
Response to Reply #270
273. Are we getting warmer yet? n/t
Printer Friendly | Permalink |  | Top
 
Old and In the Way Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:16 PM
Response to Original message
274. Way too complicated for my peabrain.
I wonder why this person didn't go to a Josh Marshall and lay this out in depth? I have no real clue where you'd start to validate these observations....seems like this treatise is going to take the collective minds of the bloggosphere to make sense and distill this down to a few sentences that can connect with the average guy in the streets. Hope this isn't some kind of elaborate seeding to send us off on a wild goose chase....
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:17 PM
Response to Original message
275. with all the excitement - euphoria might be a better word
as far as i can see from my limited review, it does not seem like a treasure trove

what I get from it, in brief, is something that would be pretty obvious to anyone with familiarity with modern "collaborative computing" tools

The "aha!" experience is really just the simple statement that "hey, these guys don't operate in the 1980's" - that is, there use of technology is not limited merely to sending point-to-point emails.

To the extent that what we have seen of the investigations often appears like a bunch of barely technically-literate old guys who have at least become aware of email but are otherwise oblivious, that is an excellent point to make. I can't believe, though, that the dem's have not engaged some tech-savvy types to guide them. SURELY, I say to myself, they are not just grasping at straws. SURELY the public hearings are the tip of an investigative iceberg!

What these anonymous-poster posts seem to do is kind of like saying "follow the money;"
all the jargon and snippets of detail and advice on what to ask is great, but the key point is:

"hey, they may have been using a discussion db fronted by Sharepoint. Check it's sqlserver db, dummies!"

The problem remains the Congress' inability to get their hands on the raw materials. The only thing they got after repeated tries for emails was a bunch of printouts, which don't tell you what was omitted. All you can do is look for gaps in the dates and say "why so quiet these days?" And if they cannot just seize the email server and do their own search, then they can't seize the sharepoint server either - or any other data repository that might contain evidence of conspiracy, lawbreaking, etc.

The person is trying to steer them to a server (or maybe just guessing) but until they have probable cause to seize a server of the RNC (thus bypassing "executive privilege" fights) there is nothing actionable.

If the person is really an insider, rather than a savvy guesser, then they need to do what Daniel Ellsberg did with the Pentagon Papers. Only use technology rather than a copier.

All they need to do is copy/paste whatever they think is damning to a word doc or text file, and either carry it out on a memory stick or email it to themselves - or the press, or wherever.

If they can get to private personal email and the juicy stuff from the same workstation, then they can open a new gmail or yahoo mail account using some pseudonym , copy/paste into mail messages, and hit send.

Of course the ISP can provide data as to the owner of the email account, and they could probably eventually be identified, but not before they streamed tons of stuff right out the door.

If the environment is secured so they cannot get to the private email account, then the memstick option is there - riskier perhaps, but lord knows people have been smuggling floppies out of places forever.

maybe if the anonymous posts don't do it, they'll get bolder
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:24 PM
Response to Original message
277. kick
Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:41 PM
Response to Original message
279. Found this very interesting...
One answer: There is a way to lawfully oppose. There is no merit to any assertion that there is no opting; or that were are stuck with this abuse. There is a way: If Congress will not oppose this abuse; and Congress will not end funding, then there is _someone else_ who can be trusted to assert their oath, and defend the Constitution. Assent to DNC-GOP joint assent to this despotism is unacceptable. It doesn't matter if its unwillingness to impeach, refusal to investigate, inaction on subpoenas, or stupid assent to DoJ-US Atty decisions to do nothing to enforce the law. _Someone else_ can be found who _will_ do their job. Stop listening to excuses of why this "cannot" be done;and _find_ a way to make those who have an oath to _do_ their job: Defend the Constitution, even it means prosecuting the President, VP, Speaker, and House Judiciary Chairman for violating Geneva; and refusing to enforce the Constitution using all lawful options. It is reckless -- this many years after 9-11 and the disclosures of the prisoner abuse and illegal NSA -- for Congress to be still rubber stamping legislation/funding: There are options to end the funding, which the DNC refuses; and there are options to lawfully target legal counsel complicit with this illegal activity.


This isn't about DoJ, FISA, or RNC e-mails, but whether legal counsel -- with that "special position of trust before the court" -- can really be trusted; or whether they need to be overseen, audited, and intruded upon as if they were a branch of government. America's legal counsel have expected too much deference for reckless service; and this many years after the illegal activity has surfaced it is absurd for the American legal community to flaunt "how great it is" or ask anyone to embrace the "American model" when the lawyers have their disastrous results on _their_ hand. Their only solution appears to be to laugh at what they've done to gum things up; never realizing We the People have the option to get them disbarred, and make _them_ the lawful target of war crimes prosecutions. America's lawyers, indeed, did learn the lesson of the Holocaust: How to commit illegal warfare and not get caught. We the People have something to say about that. This is far from over. These are issues of international criminal law with one large defense pool: American legal counsel inside DoJ, OVP, DoD, and outside counsel
Once the auditor completes their review, they provide an audit report. The report is sometimes called a report of an "audit engagement". Either the audit report exists or it does not; either management met the requirements, or it did not; either the management developed a plan to correct their problems, or they did not. Once an audit is done, there is required _follow-up to test whether the implemented solutions solve the _original_ problem identified. Either the program/solution is _solving_ the problem or it is not.
- - - -

There's also problem the President has: There are mandatory audits which _he_ has to oversee, but the audit target is _outside his control_ This means, that we can test whether the _president's auditors_ were or were not doing their job.

Google < PART 266 AUDITS OF STATE AND LOCAL GOVERNMENTS, INSTITUTIONS OF HIGHER EDUCATION, AND OTHER NONPROFIT INSTITUTIONS >

That is the trap that Congress has laid. By funding these "non-US government entities", what Congress has created are entities which can _observe_ whether the President is or is not overseeing his auditors; and how competent the audits are.

Don't miss the point: Congress is allowed to set up dummy entities not to waste money, but to create _bait_ that the President is _required_ to engage, target, and put under surveillance. The Presidents' problem is that he doesn't know which of the companies are real; or which ones are bait that are direct reporting units to the Congressional staffers.

Anything that the bait detects is then back challenged to Congress: Has the team from the President's office attempted to do something inappropriate; have the audit rules been followed; or have there been unusual interactions suggesting that the President and RNC have attempted to deploy "people not related to the President".

The problem: Once Congress creates this dummy entity, from that point on, all interactions with that entity are from a specific _time_. Congress can then use the President's efforts to interact -- directly or indirectly -- and test:

A. What are the President's method to share information about the upcoming target;
B. Who is coordinating;
C. And are the President's personnel able to professional respond to unusual situations.

These are part of the _designed_ problems the President is forced to confront. Then, going backwards from the audit, we can examine

1. Which data fields did the President's auditors use, access, and adjust when _preparing_ for the audit;
2. Which records _only related to this dummy audit_ were created; and how were those records updated; and how was the information sent/transmitted/stored
3. Once we let this data sit for a while, and then create the impression that there ha has been illegal activity, what effort do legal counsel, the President, DOJ staff, and others make to destroy that audit data that was _only_ connected to that bogus entity.

This is what has happened with the President right now. He and his auditors have been set up; the records that they've destroyed were based on discrete communications on specific dates and times. Before that information was received, the records were fine; after the data was received, the records were destroyed.

SO we can pinpoint:

1. What the President, DoJ Staff, legal counsel, OVP, EOP, and others were told; how they were told; and the means that the records were stored;
2. The time that the triggering event occurred;
3. Then trace the record holes -- knowing that a credible search would trigger responses related to the known target.

Once those known targets are missing, then we broaden the line of inquiry:
A. When did legal counsel review the information, procedures, and conduct an audit;
B. Who last had access;
C. Who had the responsibility to establish this baseline.

It can't be changed. Either its there; or its not. The President's problem is he doesn't know which of the data sets have been planted; and that doesn't matter: There are known holes that were once linked with information that outside personnel put there _knowing_ they would be removed.

Printer Friendly | Permalink |  | Top
 
percussivemadness Donating Member (733 posts) Send PM | Profile | Ignore Wed Aug-01-07 12:44 PM
Response to Original message
280. Could the mystery poster be
John Titor?

peace
Printer Friendly | Permalink |  | Top
 
Duer 157099 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:54 PM
Response to Reply #280
306. LOL. Am I the only one who gets that?
It does remind of that situation doesn't it?

Now where's my IBM 5100...
Printer Friendly | Permalink |  | Top
 
Silver Gaia Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:27 PM
Response to Reply #306
344. Hi Dot! LOL No, you aren't the only one. ;) n/t
Printer Friendly | Permalink |  | Top
 
DemReadingDU Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:10 PM
Response to Reply #280
314. John Titor
John Titor is the name used by the person or persons claiming to be a time traveler from the year 2036 who posted on several time-travel–related bulletin boards during 2000/2001. In these posts he made numerous ambiguous predictions about events in the near future, starting with events in 2004.

Whether John Titor was a hoax or not has been a topic of controversy on web-based paranormal discussion boards and has never been proven or disproven. He has also been discussed occasionally on the radio show Coast to Coast AM

http://en.wikipedia.org/wiki/John_Titor
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:51 PM
Response to Original message
283. keep kicking. DKos has a link to this now. mods, keep on front page!
Printer Friendly | Permalink |  | Top
 
uberblonde Donating Member (993 posts) Send PM | Profile | Ignore Wed Aug-01-07 12:54 PM
Response to Original message
285. This sure sounds like the real deal.
:bounce: K&R!!
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 12:58 PM
Response to Original message
286. kick kick
Printer Friendly | Permalink |  | Top
 
Babsbrain Donating Member (536 posts) Send PM | Profile | Ignore Wed Aug-01-07 12:59 PM
Response to Original message
287. More from 10 July

From: http://www.tpmmuckraker.com/archives/003645.php#comments


Let's take a look at the RNC e-mail IP numbers:
- Which legal counsel were using their computers for non=official business;
- Which open source information -- related to the RNC e-mail accounts -- has been disclosed, helping to fill in the holes of what was destroyed
- How many RNC e-mails were sent related to war crimes, Geneva violations, and violations of international criminal law
- Does it appear WH Counsel memoranda were shared with outside counsel discussing the concerns the evidence would not, ultimately, enjoy a privilege claim
- How did the RNC coordinate with outside counsel to establish a backup system
- What evidence destruction procedure did outside counsel know about, but refuse to audit or report
- What was the means by which outside counsel's legal services in re evidence "retention" was used as a means to explain how to destroy evidence so that it could not be retrieved
- What information does the Grand Jury have related to patterns of RNC e-mail destruction that shed light on the specific assumptions outside counsel shared with the RNC on how to destroy this evidence
- What RNC e-mails were sent to confirm access to the MicrosoftOutlook SharePoint system, or other file transfer system used to quickly coordinate on legal memoranda
- Does the SharePoint system have a copy of the RNC e-mail requests to gain access to these file sharing systems
- Which outside legal firms are on the access list for the specific RNC e-mail/file sharing systems
- Which legal memoranda, written after the _decision_ to destroy evidence was made, exist confirming outside counsel did review the RNC e-mail system; and were involved with the audits related to the compliance or non-compliance with the Hatch Act?
- Have all RNC e-mails connected to any US Government computer been reconciled to work flows, time sheets, and specific DoJ, OLC, WH, EOP, OVP,and outside counsel work products?
- Are personnel, assigned to specific IP numbers, not using that system for official business?
- Which Instant Messaging system liked with DOJ and outside entities are known to have been used while personnel were engaged in joint discussions related to third party-stored information on sites outside the control of the US Government and the outside entity?
- If this issue was "not a concern," why were the personnel -- inside EOP and the outside counsel's office -- working on the weekend to prepare for this review?
- How do the DOJ Workflows -- as a measure of what legal counsel were supposed to have been working on -- compare with the actual IP-connections between DoJ-OLC-EOP-WH-OVP and the outside information sources; is there a pattern of key personnel not using their computers for the workflows they were reporting as complete; who was actually doing the work: Processing the warrants; or was this activity not done at all, and was this malfeasance known to the AG in re compliance with FISA, rendition, Geneva, and other legal obligations?
- How were the risk factors with the document retention factored into the audit of the outside counsel's review of the firms alleged to be involved with rendition, FISA violations, NSA illegal activity, and Geneva violations?
- What financial incentive did outside counsel have in conducting a cursory review of the RNC email retention plan; which contracts in other areas were they guaranteed to win on a no-bid basis; how were the consulting contracts on the various issues for the WH assured if outside counsel was silent in official reporting to the SEC on the status of compliance or non-compliance with document retention,audits, and legal compliance?
- Where are the internal memoranda consistent with the SAS Standards of outside counsel's legal reviews of the entities; and how were differences of opinion as it relates to rendition, FISA violations, NSA illegal activity, and prisoner abuse resolved internal: Which legal counsel with reservations about war crimes were subsequent denied promotion, fired; and how did the litigation related to these premature firings ultimately get resolved by the courts: Was discrimination found to have occurred?
- What is the legal status of Judge Robert's ethics investigation; and how will this be resolved in re the RNC e-mail reviews?
- When did the IP numbers for Judge Roberts' wife's law firm get reviewed for purposes of identifying the communications between outside counsel linked with the White House, with ongoing legal discussions on issues related to other financial interests?
- Has a review of all staff counsel at Judge Roberts' wife's' law firm been done to determine whether counsel have or have not been using their business computers; why are these computers linked with specific identifying information of personnel linked with non-official websites?
- Why is the NSA linked with IM systems that are not official; what audit has NSA made of these non-official e-mail systems to send and receive information from oustide entiteis into the NSA?
- Why is the DOJ connected with IM systems that have been coordinated with outside entities; and used concurrently during official duty hours?

Posted by:
Date: July 10, 2007 5:04 PM
Printer Friendly | Permalink |  | Top
 
GardeningGal Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:58 PM
Response to Reply #287
307. Interesting questions related to Judge Roberts.
May help to explain the stress he's been under helping to lead to his seizure this week.

Printer Friendly | Permalink |  | Top
 
percussivemadness Donating Member (733 posts) Send PM | Profile | Ignore Wed Aug-01-07 12:59 PM
Response to Original message
289. Before I get slammed
Edited on Wed Aug-01-07 01:00 PM by percussivemadness
for my somewhat frivolous remark, there is some method to my obvious madness.

Duers need to email en masse George Norry at Coast to Coast Am and draw his attention to this, I already have - george@coasttocoastam.com

Before any know it alls dismiss Coast to Coast, they have a listener ship of over 20,000,000 and it was Norry who broke the Dubai Ports deal 4 days before the mainstream media picked up on it. It was because of the backlash from his programme that the MSM were forced to pick up on it.

If enough people from DU email him, it will force it onto his show, this is classic coast to coast, a mystery poster etc etc (hence my Titor reference).

Olberman is good, but his audience is a fraction of Norry`s, and whilst Norry can be somewhat annoying at times, his guests somewhat ridiculous, he has balanced this with some pretty heavy duty political stuff that noone else touches.

Email him now, force this into the mainstream.

Peace
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:16 PM
Response to Reply #289
296. I just did too.
Printer Friendly | Permalink |  | Top
 
Duer 157099 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:04 PM
Response to Reply #289
312. No! Send it to Ian Punnett at the same place
Ian is MUCH MUCH MUCH more likely to do a credible job.
Printer Friendly | Permalink |  | Top
 
percussivemadness Donating Member (733 posts) Send PM | Profile | Ignore Wed Aug-01-07 04:05 PM
Response to Reply #312
331. With all due respect to Ian Punnet - George Noory has far more clout
Edited on Wed Aug-01-07 04:05 PM by percussivemadness
I really like Ian Punnet, but he is limited to one show a week in a bad timeslot.

George Noory is on every night and is the main man for coast to coast.

Either way, we agree on the power of C2C :)

Peace
Printer Friendly | Permalink |  | Top
 
Silver Gaia Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:33 PM
Response to Reply #331
345. I agree with Dot.
If you want to know why, PM me, because I'm not going to tie up space in this thread to talk about Noory.
Printer Friendly | Permalink |  | Top
 
kpete Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:00 PM
Response to Original message
290. nice archive
Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:12 PM
Response to Reply #290
293. Oh yes...
:applause:
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:19 PM
Response to Reply #290
297. kpete that's great, is this recommended site to send off to
Reps like Henry Waxman.
Printer Friendly | Permalink |  | Top
 
DemReadingDU Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:01 PM
Response to Reply #290
310. Great find, Thanks!
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:18 PM
Response to Reply #290
326. Thanks kpete
they pay more attention to you!! :)
Printer Friendly | Permalink |  | Top
 
RandomKoolzip Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:21 PM
Response to Original message
298. Reminds me a lot of Casolaro/PROMIS stuff.
Interesting read; hope it leads somewhere. :thumbsup:
Printer Friendly | Permalink |  | Top
 
Tab Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:24 PM
Response to Original message
299. From what I can follow
ALMOST all of it makes sense; certainly the stuff I understand does (there's lots of references that I don't), and this is basically a tantalizing trail of crumbs.

I'm not convinced they are that technical or with the NSA - I find it really hard to believe the NSA can't monitor RSS or newsgroups. If it's traffic, they can monitor it, unless it's been highly encrypted. Not being able to monitor is something a non-technical person would believe. It's still traffic, just in a different protocol. So I think we can write off NSA or techie.

I fall in with the GAO assessment - there's a lot of information here that would have run through GAO.

That said, the person MAY NOT know anything. They may like conspiracy theories and fancy themselves a modern-day Deep Throat. It's hard to tell, because we won't know until either (a) they deliver something key, or (b) we investigate and find nothing (which by itself still doesn't prove anything) or (c) we investigate and find it's totally correct.

Regardless, it's a lot of interesting things to talk about - I don't put anything past this bunch of crooks, so pretty much everything is plausible.
Printer Friendly | Permalink |  | Top
 
Babsbrain Donating Member (536 posts) Send PM | Profile | Ignore Wed Aug-01-07 01:25 PM
Response to Original message
301. Good info...read comments from anonymous
Printer Friendly | Permalink |  | Top
 
Rosa Luxemburg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:04 PM
Response to Reply #301
311. thanks for that
Printer Friendly | Permalink |  | Top
 
Babsbrain Donating Member (536 posts) Send PM | Profile | Ignore Wed Aug-01-07 01:42 PM
Response to Original message
303. This is what mystery poster wants us to know and act upon
Congress Cannot Stop We the People

The answer is not with Congress: It is with We the People. Congress may choose not to issue contempt citations; and may bungle an impeachment. However, there is nothing stopping other options: State Attorney Generals -- any of the 50 -- from prosecuting a sitting President outside impeachment.

(From site I linked to above)
Printer Friendly | Permalink |  | Top
 
Buttercup McToots Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 01:46 PM
Response to Reply #303
304. We have to do it State By State...
A. State Standing
Constitution guarantees to all States a Republican Form of government, which includes an enforcement mechanism.

B. Assertion of Retained State Power
States have power to do this: Amendment X reserves all non-delegated powers to the States. Congress was not delegated power to prosecute a President only impeach. States retain and may at any time assert this non-delegated, reserved power at any time without coordination with Congress. The intent of framers was for the States to act as one of the last vanguards of the Constitution against an abusive Government. The State prosecution is consistent with the Framers intent of preserving the Constitution, not, as this Congress and president have done, impersmissibly let the Constitution decay.
C. Allegations
President's conduct has denied the States of the Constitutionally Protected Guarantees: Refusal to enforce; failure to defend Constitution; illegal abrogation of Supreme Law and Geneva.
D. Charge
President has violated his oath of office to ensure the States enjoy a Republican Form of Government; and illegally abrogated war crimes.
E. Punishment, Remedy
The President and Vice President may be jailed; pending their release, the Speaker shall Assume Duties of President. President and VP shall retain title of "President' and "Vice President" but all legal duties and power shall be transferred to Pelosi and her Congressionally-approved Nominee, per 25th Amendment, by a simple majority vote in each house.
Make it happen.
Printer Friendly | Permalink |  | Top
 
DemReadingDU Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:17 PM
Response to Reply #304
316. here's your link to the new thread, Deep Throat 2
Printer Friendly | Permalink |  | Top
 
RainDog Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 04:52 PM
Response to Reply #303
334. Maybe this is one reason why someone is bringing up this issue of illegal wiretaps...
because right now Congress may make the crimes legal "retroactively."

Right now Congress is "looking for a way" to extend surveillance to make it easier to listen in on foreign conversations. the "media massaging" of this article is pretty amazingly obvious considering the way the public feels about FISA and the 4th amendment, etc. The frame for the story is trying to instill demo fear of "soft on terrorism" accusations...a right wing talking point.

http://www.nytimes.com/2007/08/01/washington/01nsa.html?_r=2&ref=washington&oref=slogin&oref=slogin

The administration says that digital technology and the globalization of the telecommunications industry have created a legal quandary for the intelligence community. Some purely international telephone calls are now routed through telephone switches inside the United States, which means such “transit traffic” can be subject to federal surveillance laws requiring search warrants for any government eavesdropping.

Under the program of wiretapping without warrants, which began soon after the Sept. 11 attacks, the N.S.A. eavesdropped on the transit traffic without seeking court approval. But in January, the administration placed the program back under the FISA law, which meant warrants were required for surveillance of the transit traffic.


this post on Raw Story via The Washington Post notes the story is buried on page 11 of the NYTimes, while the issue of admission of more illegal surveillance is in the WaPo article.

so, if other nations have been listening to whoever and funneling the info to the OVP, etc, as Deep Modem claims, the dems approving the foreign surveillance would cover the administration, I suppose...because the exec. could say...hey, you approved the activity now. Except, in fact, the illegal surveillance was going THE OPPOSITE WAY, from other countries to the U.S. and not from what the U.S. was intercepting itself.

whaddya think?
Printer Friendly | Permalink |  | Top
 
RainDog Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 04:54 PM
Response to Reply #334
335. oops. second link
the WaPo story is available via this link, but with comments on this issue before the link-

http://rawstory.com/news/2007/Bush_Administration_acknowledges_series_of_other_0801.html
Printer Friendly | Permalink |  | Top
 
Duer 157099 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:23 PM
Response to Original message
319. What was the verdict on starting a thread in the Research Forum?
This thread is getting too long, but I don't want to lose track of the info.
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:27 PM
Response to Reply #319
321. Perhaps it should be sequentially.
I have a series of posts I have copied by date. I've never started a research thread but would be glad to post what I have. Maybe one thread with just anonymous posts and another with commentary on it, tying ideas together. Just a thought..
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:33 PM
Response to Reply #319
347. look here
Printer Friendly | Permalink |  | Top
 
Seabiscuit Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 02:53 PM
Response to Original message
322. Any DU'ers post TPM? Maybe you can ask mystery poster to answer more
Edited on Wed Aug-01-07 03:05 PM by Seabiscuit
questions or at least clarify some things.
Printer Friendly | Permalink |  | Top
 
Capn Sunshine Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:11 PM
Response to Reply #322
325. This is really getting around
I came to this thread via KOS.

Nice-no, FANTASTIC catch, Pete.
Printer Friendly | Permalink |  | Top
 
jn2375 Donating Member (858 posts) Send PM | Profile | Ignore Wed Aug-01-07 03:10 PM
Response to Original message
324. dailykos had these posts up and now their sites down
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 06:41 PM
Response to Reply #324
340. thay have been slow today
- probably getting pounded with YearlyKOS coming up

Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:20 PM
Response to Original message
327. kpete, here's Anonymous posting on 2 July and I don't see it on your
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 10:35 PM
Response to Reply #327
348. its on my reference site
Printer Friendly | Permalink |  | Top
 
Cameron27 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:24 PM
Response to Original message
328. Kick
I haven't even read through 1/2 of this info yet, but it's certainly intriguing.

Bookmarking
Printer Friendly | Permalink |  | Top
 
davidwparker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 03:39 PM
Response to Original message
329. Anonymous posting to afterdowningstreet.org
You know, where there's enough evidence for Nancy to be on the impeachment table if it were not for the collusion.

http://www.afterdowningstreet.org/?q=comment/reply/25036/137419
Printer Friendly | Permalink |  | Top
 
L. Coyote Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 04:51 PM
Response to Original message
333. IDIOTS & LIBTARDS: Everything's Just a Lame Online Diversion .., Including the 'New Deep Throat'
Everything's Just a Lame Online Diversion These Days, Including the 'New Deep Throat'
http://wonkette.com/politics/dept'-of-time-person-of-the-year%7C-you/everythings-just-a-lame-online-diversion-these-days-including-the-new-deep-throat-284993.php



In the Watergate era, “Deep Throat” was supposedly a government insider who met Bob Woodward in a parking garage and moodily smoked cigarettes while wearing a trench coat. The fact that Woodward himself was a government spook recently transferred from Naval Intelligence to the Washington Post newsroom ....

Today, there are no brave reporters or editors at the Washington Post who would even think about trying to take down an administration, and the only Post guy really hammering away at the White House is an online guy, Dan Froomkin, ...

The libtard blogs are all worked up about the mysterious “new Deep Throat” whistleblower who is revealing dark secrets of the NSA/NSC/OVP/DoJ domestic spying scandal that should’ve already seen everybody impeached and locked in a dungeon forever but nothing happens because the Democrat-controlled Congress is toothless and lame. He or She writes really long comments that seem pretty insidery and detailed, and he asks a lot of loaded, knowing questions that we can all recognize from the X-Files. .....
Printer Friendly | Permalink |  | Top
 
hootinholler Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 05:43 PM
Response to Original message
336. .
Printer Friendly | Permalink |  | Top
 
bobthedrummer Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 05:59 PM
Response to Original message
337. Kick
See H2O Man's thread "The Huston Plan" for more on the background
Printer Friendly | Permalink |  | Top
 
Mind_your_head Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 06:37 PM
Response to Reply #337
338. Do you have a link? n/t
Printer Friendly | Permalink |  | Top
 
frogcycle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 06:39 PM
Response to Original message
339. obviously there are multiple "anonymous's" out there.
we should try to be discerning, not co-mingle unrelated rants against Pelosi or whatever with presumed "Blog Throat" posts...
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 07:49 PM
Response to Original message
342. kicking this thread
Printer Friendly | Permalink |  | Top
 
mmonk Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-01-07 09:44 PM
Response to Original message
346. Anyway to sum this up?
An extragovernmental spying network?
Printer Friendly | Permalink |  | Top
 
bdamomma Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Aug-02-07 08:15 AM
Response to Original message
349. kick kick
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 07:37 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC