Halliburton Build's Concentration Camps & ISP's Spy On You

muckraker10021

Superstar *****
BGOL Investor
<font face="verdana" size="4" color="#333333">
Wake up peeps, ‘soft fascism’ is already in effect. The RepubliKlan are attempting to close the gates & turn soft fascism into the police state fascism you thought couldn’t happen in America</font>

<hr noshade color="#0000FF" SIZE="12"></hr>

<font face="arial black" size="6" color="#d90000">
The Real Assault On America</font>

<font face="georgia" size="3" color="#000000">
<b>by Paul Craig Roberts

May 15th 2006 </b>

http://www.vdare.com/roberts/060515_assault.htm<br>
The neoconservative Bush regime has adroitly used 9/11 to create fear of terrorism among Americans that blinds Americans to the Bush regime&rsquo;s assault on our constitutional system.&nbsp; Americans have meekly acquiesced to the Bush regime&rsquo;s brutal assaults on civil liberties, human rights, the separation of powers, and statutory law, because Americans have been brainwashed to believe that the <strong>&ldquo;war on terror&rdquo; </strong>takes precedence and cannot be waged under the rules established by the Founding Fathers.
<br>By elevating its <strong>&ldquo;war on terror&rdquo; </strong>above the US Constitution, the neoconservative Bush regime has made itself a far greater threat to Americans than are foreign terrorists. Two constitutional scholars, <a href="http://www.cato.org/pub_display.php?pub_id=1130">Timothy Lynch</a> and <a href="http://www.cato.org/pub_display.php?pub_id=1248">Gene Healy,</a> document the Bush regime&rsquo;s forceful assault on the US Constitution in &ldquo;<em><a href="http://www.cato.org/pub_display.php?pub_id=6330">Power Surge: The Constitutional Record of George W. Bush</a></em>&rdquo; released May 3 by the Cato Institute in Washington, D.C. (available at).
<br>Lynch and Healy show that Bush has failed in his most important responsibility <strong>&ldquo;to preserve, protect and defend&rdquo;</strong> the Constitution and, thus, is in violation of his sworn oath of office.&nbsp; The two scholars document the Bush regime&rsquo;s <strong>&ldquo;ceaseless push for power, unchecked by either the Courts or Congress&rdquo;</strong> on issues ranging from war powers, habeas corpus, and federalism to free speech and unwarranted surveillance. Bush&rsquo;s assault on the Constitution &ldquo;should disturb people from across the political spectrum.&rdquo;
<br>Alas, it doesn&rsquo;t.&nbsp; Many Americans believe that Bush&rsquo;s dictatorial powers will only be applied to terrorists.&nbsp; This belief is extremely foolish, because it means that <strong>&ldquo;the liberty of every American rests on nothing more than the grace of the White House.&rdquo; &nbsp;</strong>
<br>It has become commonplace to hear Americans dismiss the Bush regime&rsquo;s illegal and unconstitutional exercise of power on the grounds that only those implicated in terrorism have anything to fear.&nbsp; These Americans need to ask themselves why, if only evildoers have anything to fear from government, the Founding Fathers bothered to write the Constitution? &nbsp;
<br>If we can trust the government the way Americans seem prepared to trust the Bush regime, we don&rsquo;t need the Constitution.&nbsp; Indeed, why is a president inaugurated with his oath to defend the Constitution if we don&rsquo;t need the Constitution to protect us from our government?&nbsp; If we can trust government, why go to all the trouble to have elections?&nbsp; Why not just get a dictator or a king or contract with a company to provide government?&nbsp;
<br>The question presents itself:&nbsp; Are Americans guilty of treason when they turn their backs on the Constitution? Treason is betrayal of country.&nbsp; And what defines country?&nbsp; In the United States the Constitution defines country.&nbsp; The Bush regime&rsquo;s assault on the Constitution is an assault on America.
<br>Moreover, it is a far more dangerous and deadly assault than a terrorist assault on buildings. &nbsp;
<br>Ask yourself, gentle reader, what are we without the Constitution?&nbsp; Without the Constitution, how do we differ from the hapless subjects sent to Soviet and Nazi death camps? The Constitution protects our rights, and without our rights we are nothing. &nbsp;
<br><b>
<span style="background-color: #FFFF51">It has been widely reported, apparently without causing Americans any unease, that the Bush regime has <a href="http://www.truthout.org/cgi-bin/artman/exec/view.cgi/47/17936">awarded Halliburton $385 million</a> to build concentration camps in the United States.&nbsp; Who are to be the inmates?&nbsp; Certainly not terrorists. The Bush regime has proven inept at catching terrorists, and those few who are captured are kept offshore out of the reach of the courts where they can be tortured and abused. The camps are certainly not for illegal aliens who both political parties want to give amnesty and citizenship.&nbsp;</b></span>
<br>Concentration camps epitomize the horrors and inhumanity of the Stalin and Nazi era. Why is the Bush regime building concentration camps in America?
<br>The Bush regime&rsquo;s war on terror is the equivalent to the Nazi regime&rsquo;s Reichstag fire.&nbsp; It serves to blind people to the real assault. &nbsp;
<br>According to Bush, America is under terrorist attack because &ldquo;they hate our freedoms.&rdquo;&nbsp; But, as Lynch and Healy show, it is the Bush regime that is attacking our freedoms, removing their institutional protections, and making our liberties subject to the grace of the executive.
<br><em>Paul Craig Roberts</em> [paulcraigroberts@yahoo.com] <em>was Assistant Secretary of the Treasury in the Reagan Administration. </font>


<hr noshade color="#0000FF" SIZE="12"></hr>


<img src="http://i.i.com.com/cnwk.1d/i/ne/gr/news_logo.gif">
<font face="arial black" size="5" color=#D90000">
Congress May Make ISPs Snoop On You</font>
<font face="Georgia" size="3" color="#000000">
<b>By Declan McCullagh</b>
<a href="http://news.com.com/Congress+may+make+ISPs+snoop+on+you/2100-1028_3-6072601.html">http://news.com.com/Congress+may+make+ISPs+snoop+on+you/2100-1028_3-6072601.html</a>

Story last modified Tue May 16 06:26:43 PDT 2006</font>


<font face="tahoma" size="4" color="#0000ff"><b>A prominent Republican on Capitol Hill has prepared legislation that would rewrite Internet privacy rules by requiring that logs of Americans' online activities be stored, CNET News.com has learned.</b></font>
<font face="Georgia" size="3" color="#000000">
<br>The proposal comes just weeks after Attorney General Alberto Gonzales <a title="U.S. attorney general calls for 'reasonable' data retention -- Thursday, Apr 20, 2006" href="/U.S.+attorney+general+calls+for+reasonable+data+retention/2100-1030_3-6063185.html?tag=nl">said Internet service providers should retain records</a> of user activities for a &quot;reasonable amount of time,&quot; a move that represented a dramatic shift in the Bush administration's views on privacy.
<br>Wisconsin Rep. <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.house.gov%2Fsensenbrenner%2F&amp;siteId=3&amp;oId=/U.S.+attorney+general+calls+for+reasonable+data+retention/2100-1030_3-6063185.html&amp;ontId=1023&amp;lop=nl.ex">F. James Sensenbrenner</a>, the chairman of the House Judiciary Committee, is proposing that ISPs be required to <a title="Your ISP as Net watchdog -- Thursday, Jun 16, 2005" href="/Your+ISP+as+Net+watchdog/2100-1028_3-5748649.html?tag=nl">record information about Americans' online activities</a> so that police can more easily &quot;conduct criminal investigations.&quot; Executives at companies that fail to comply would be fined and imprisoned for up to one year.
<br>In addition, Sensenbrenner's legislation--expected to be announced as early as this week--also would create a federal felony targeted at bloggers, search engines, e-mail service providers and many other Web sites. It's aimed at any site that might have &quot;reason to believe&quot; it facilitates access to child pornography--through hyperlinks or a discussion forum, for instance.
<br><a title="U.S. attorney general calls for 'reasonable' data retention -- Thursday, Apr 20, 2006" href="/U.S.+attorney+general+calls+for+reasonable+data+retention/2100-1030_3-6063185.html?tag=nl">Speaking to</a> the National Center for Missing and Exploited Children last month, Gonzales warned of the dangers of pedophiles using the Internet anonymously and called for new laws from Congress. &quot;At the most basic level, the Internet is used as a tool for sending and receiving large amounts of child pornography on a relatively anonymous basis,&quot; <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.usdoj.gov%2Fag%2Fspeeches%2F2006%2Fag_speech_060420.html&amp;siteId=3&amp;oId=/U.S.+attorney+general+calls+for+reasonable+data+retention/2100-1030_3-6063185.html&amp;ontId=1023&amp;lop=nl.ex">Gonzales said</a>.
<br>Until Gonzales' speech, the Bush administration had explicitly opposed laws requiring data retention, saying it had &quot;serious reservations&quot; (<a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.usdoj.gov%2Fcriminal%2Fcybercrime%2Fintl%2FUSComments_CyberCom_final.pdf&amp;siteId=3&amp;oId=/U.S.+attorney+general+calls+for+reasonable+data+retention/2100-1030_3-6063185.html&amp;ontId=1023&amp;lop=nl.ex">click here for PDF</a>) about them. But after the European Parliament last December <a title="Europe passes tough new data retention laws -- Wednesday, Dec 14, 2005" href="/Europe+passes+tough+new+data+retention+laws/2100-7350_3-5995089.html?tag=nl">approved such a requirement</a> for Internet, telephone and voice over Internet Protocol (VoIP) providers, top administration officials began <a title="ISP snooping gaining support -- Friday, Apr 14, 2006" href="/ISP+snooping+gaining+support/2100-1028_3-6061187.html?tag=nl">talking about it more favorably</a>.
<br>The drafting of the data-retention proposal comes as Republicans are trying to do more to please their conservative supporters before the November election. One <a title="Congress targets social network sites -- Wednesday, May 10, 2006" href="/Congress+targets+social+network+sites/2100-1028_3-6071040.html?tag=nl">bill announced last week</a> targets MySpace.com and other social networking sites. At a meeting last weekend, social conservatives called on the Bush administration to step up action against pornography, according to a <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.nytimes.com%2F2006%2F05%2F15%2Fwashington%2F15dobson.html&amp;siteId=3&amp;oId=/Congress+targets+social+network+sites/2100-1028_3-6071040.html&amp;ontId=1023&amp;lop=nl.ex">New York Times report</a>.
<br>Sensenbrenner's proposal is likely to be controversial. It would substantially alter U.S. laws dealing with privacy protection of Americans' Web surfing habits and is sure to alarm Internet businesses that could be at risk for linking to illicit Web sites.
<br>A spokesman for the House Judiciary Committee said the aide who drafted the legislation was not immediately available for an interview on Monday.
<br>U.S. Justice Department spokesman Drew Wade said the agency generally doesn't comment on legislation, though it may &quot;issue a letter of opinion&quot; at a later date.
<br>Marc Rotenberg, executive director of the <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.epic.org%2F&amp;siteId=3&amp;oId=/Congress+targets+social+network+sites/2100-1028_3-6071040.html&amp;ontId=1023&amp;lop=nl.ex">Electronic Privacy Information Center</a> in Washington, called Sensenbrenner's measure an &quot;open-ended obligation to collect information about all customers for all purposes. It opens the door to government fishing expeditions and unbounded data mining.&quot;
<br>The National Security Agency has engaged in extensive data-mining about Americans' phone calling habits, USA Today <a title="FAQ: NSA's data mining explained -- Friday, May 12, 2006" href="/FAQ+NSAs+data+mining+explained/2100-1028_3-6071780.html?tag=nl">reported last week</a>, a revelation that could complicate Republicans' efforts to enact laws relating to mandatory data retention and data mining. Sen. John Sununu, a New Hampshire Republican, for instance, <a title="GOP skepticism over NSA program widens -- Monday, May 15, 2006" href="/GOP+skepticism+over+NSA+program+widens/2100-1028_3-6072440.html?tag=nl">took a swipe</a> at the program on Monday, and Democrats have been <a title="Anger grows over NSA surveillance report -- Thursday, May 11, 2006" href="/Anger+grows+over+NSA+surveillance+report/2100-1028_3-6071525.html?tag=nl">calling for a formal investigation</a>.
<br><strong>Worries for Internet providers</strong>
One unusual aspect of Sensenbrenner's legislation--called the Internet Stopping Adults Facilitating the Exploitation of Today's Youth Act--or Internet Safety Act--is that it's relatively vague.
<br>Instead of describing exactly what information Internet providers would be required to retain about their users, the Internet Safety Act gives the attorney general broad discretion in drafting regulations. At minimum, the proposal says, user names, physical addresses, Internet Protocol addresses and subscribers' phone numbers must be retained.
<br>That generous wording could permit Gonzales to order Internet providers to retain records of e-mail correspondents, Web pages visited, and even the contents of communications.
<br>&quot;In the absence of clear privacy safeguards, Congress would be wise to remove this provision,&quot; Rotenberg said.
<br><a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.pacificresearch.org%2Fabout%2Fteam.html&amp;siteId=3&amp;oId=/Anger+grows+over+NSA+surveillance+report/2100-1028_3-6071525.html&amp;ontId=1023&amp;lop=nl.ex">Sonia Arrison</a>, director of technology studies at the free-market Pacific Research Institute in San Francisco, said the Internet Safety Act &quot;follows in a long line of bad laws that are written in the name of protecting children.&quot;
<br>Complicating the outlook for the Internet Safety Act is the uncertain political terrain of Capitol Hill. Rep. Diana DeGette, a Colorado Democrat, <a title="Congress may consider mandatory ISP snooping -- Friday, Apr 28, 2006" href="/Congress+may+consider+mandatory+ISP+snooping/2100-1028_3-6066608.html?tag=nl">announced legislation</a> (<a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fenergycommerce.house.gov%2F108%2FMarkups%2F04262006%2Fdegette_001_XML.PDF&amp;siteId=3&amp;oId=/Congress+may+consider+mandatory+ISP+snooping/2100-1028_3-6066608.html&amp;ontId=1023&amp;lop=nl.ex">click for PDF</a>) last month--which could be appended to a telecommunications bill--that would require Internet providers to store records that would permit police to identify each user.
<br>The head of the Energy and Commerce Committee, Rep. Joe Barton of Texas, has <a title="Republican politico endorses data retention -- Friday, May 5, 2006" href="/Republican+politico+endorses+data+retention/2100-1028_3-6069210.html?tag=nl">expressed support</a> for DeGette's plan. That could lead to a renewal of a turf battle between the two committees, one of which has jurisdiction over Internet providers, while the other is responsible for federal criminal law.
<br>&quot;We're still evaluating things,&quot; said Terry Lane, a spokesman for the House Energy and Commerce Committee. &quot;We haven't really laid out exactly yet what kind of proposals we would support and what kind of proposals would be necessary.&quot;
<h3>New Internet felonies proposed</h3>
<br><strong>Following are excerpts from Rep. Sensenbrenner's Internet Safety Act:</strong>
<br>&quot;Whoever, being an Internet content hosting provider or email service provider, knowingly engages in any conduct the provider knows or has reason to believe facilitates access to, or the possession of, child pornography shall be fined under this title or imprisoned not more than 10 years, or both.
<br>&quot;'Internet content hosting provider' means a service that (A) stores, through electromagnetic or other means, electronic data, including the content of web pages, electronic mail, documents, images, audio and video files, online discussion boards, and weblogs; and (B) makes such data available via the Internet&quot;
<br>&quot;Not later than 90 days after the date of the enactment of this section, the Attorney General shall issue regulations governing the retention of records by Internet Service Providers. Such regulations shall, at a minimum, require retention of records, such as the name and address of the subscriber or registered user (and what) user identification or telephone number was assigned...&quot;
<br>Federal politicians also are being lobbied by state law enforcement agencies, which say strict data retention laws will help them investigate crimes that have taken place a while ago.
<br>Sgt. Frank Kardasz, head of Arizona's <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.azicac.org%2F&amp;siteId=3&amp;oId=/Republican+politico+endorses+data+retention/2100-1028_3-6069210.html&amp;ontId=1023&amp;lop=nl.ex">Internet Crimes Against Children Task Force</a>, surveyed his colleagues in other states earlier this year asking them what new law would help them do their jobs. &quot;The most frequent response involved data retention by Internet service providers,&quot; or ISPs, Kardasz told News.com last month.
<br><strong>&quot;Preservation&quot; vs. &quot;Retention&quot;</strong>
At the moment, ISPs typically discard any log file that's no longer required for business reasons such as network monitoring, fraud prevention or billing disputes. Companies do, however, alter that general rule when contacted by police performing an investigation--a practice called data preservation.
<br>A 1996 <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.usdoj.gov%2Fcriminal%2Fcybercrime%2F2703_CSEA.htm&amp;siteId=3&amp;oId=/Republican+politico+endorses+data+retention/2100-1028_3-6069210.html&amp;ontId=1023&amp;lop=nl.ex">federal law</a> called the Electronic Communication Transactional Records Act regulates data preservation. It <a title="My (brief) career as an ISP -- Friday, Oct 10, 2003" href="/My+brief+career+as+an+ISP/2010-7355_3-5089267.html?tag=nl">requires Internet providers to retain</a> any &quot;record&quot; in their possession for 90 days &quot;upon the request of a governmental entity.&quot;
<br>Because Internet addresses remain a relatively scarce commodity, ISPs tend to allocate them to customers from a pool based on whether a computer is in use at the time. (Two standard techniques used are the <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FDynamic_Host_Configuration_Protocol&amp;siteId=3&amp;oId=/My+brief+career+as+an+ISP/2010-7355_3-5089267.html&amp;ontId=1023&amp;lop=nl.ex">Dynamic Host Configuration Protocol</a> and <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FPoint-to-Point_Protocol_over_Ethernet&amp;siteId=3&amp;oId=/My+brief+career+as+an+ISP/2010-7355_3-5089267.html&amp;ontId=1023&amp;lop=nl.ex">Point-to-Point Protocol over Ethernet</a>.)
<br>In addition, ISPs are <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.law.cornell.edu%2Fuscode%2Fhtml%2Fuscode42%2Fusc_sec_42_00013032----000-.html&amp;siteId=3&amp;oId=/My+brief+career+as+an+ISP/2010-7355_3-5089267.html&amp;ontId=1023&amp;lop=nl.ex">required by another federal law</a> to report child pornography sightings to the National Center for Missing and Exploited Children, which is in turn charged with forwarding that report to the appropriate police agency.
<br>When adopting its data retention rules, the European Parliament approved <a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Fwww.europarl.eu.int%2Fomk%2Fsipade3%3FL%3DEN%26OBJID%3D105467%26LEVEL%3D5%26MODE%3DSIP%26NAV%3DX%26LSTDOC%3DN&amp;siteId=3&amp;oId=/My+brief+career+as+an+ISP/2010-7355_3-5089267.html&amp;ontId=1023&amp;lop=nl.ex">U.K.-backed requirements</a> saying that communications providers in its 25 member countries--several of which had enacted their own data retention laws already--must retain customer data for a minimum of six months and a maximum of two years.
<br>The Europe-wide requirement applies to a wide variety of &quot;traffic&quot; and &quot;location&quot; data, including the identities of the customers' correspondents; the date, time and duration of phone calls, voice over Internet Protocol calls, or e-mail messages; and the location of the device used for the communications. But the &quot;content&quot; of the communications is not supposed to be retained. The rules are expected to take effect in 2008.
<br>According to a memo accompanying the proposed rules (<a href="http://dw.com.com/redir?destUrl=http%3A%2F%2Feuropa.eu.int%2Feur-lex%2Flex%2FLexUriServ%2FLexUriServ.do%3Furi%3DCOM%3A2005%3A0438%3AFIN%3AEN%3APDF&amp;siteId=3&amp;oId=/My+brief+career+as+an+ISP/2010-7355_3-5089267.html&amp;ontId=1023&amp;lop=nl.ex">click here for PDF</a>), European politicians approved the rules because not all operators of Internet and communications services were storing information about citizens' activities to the extent necessary for law enforcement and national security.
<br>In addition to mandating data retention for ISPs and liability for Web site operators, Sensenbrenner's Internet Safety Act also would:
<br>&bull;&nbsp;Make it a crime for financial institutions to &quot;facilitate access&quot; to child pornography, for instance by processing credit card payments.
<br>&bull;&nbsp;Increase penalties for registered sex offenders who commit another felony involving a child.
<br>&bull;&nbsp; Create an Office on Sexual Violence and Crimes against Children inside the Justice Department.
<br><em>CNET News.com's Anne Broache contributed to this report.</em>
</font>

</div>
 
<font size="4" color="#ff0000">
"If this were a dictatorship, it would be a heck of a lot easier, just so long as I'm the dictator" - July 30, 2001</font><br><img src="http://semiskimmed.net/bushhitler/flyingfish.gif">

<table id="table1" bordercolor="#111111" cellspacing="0" cellpadding="10" width="700" bgcolor="#006699" border="5">
<tbody><tr>
<td width="100%"><font face="arial Black" size="6" color="FFFFFF"><center>Bush's Mysterious 'New Programs'</center>
<br><font size="4">By Nat Parry<br>February 21, 2006</td></font></font></tr></tbody></table>

<font face="georgia" size="3" color="#000000">
http://www.alternet.org/rights/32647/
<br><img src="http://www.alternet.org/images/managed/Story+Image_thumb_022306_story.jpg" align="right">Not that George W. Bush needs much encouragement, but Sen. Lindsey Graham suggested to Attorney General Alberto Gonzales a new target for the administration&rsquo;s domestic operations -- Fifth Columnists, supposedly disloyal Americans who sympathize and collaborate with the enemy.
<br>&ldquo;The administration has not only the right, but the duty, in my opinion, to pursue Fifth Column movements,&rdquo; Graham, R-S.C., told Gonzales during Senate Judiciary Committee hearings on Feb. 6.
<br>&ldquo;I stand by this President&rsquo;s ability, inherent to being Commander in Chief, to find out about Fifth Column movements, and I don&rsquo;t think you need a warrant to do that,&rdquo; Graham added, volunteering to work with the administration to draft guidelines for how best to neutralize this alleged threat.
<br>&ldquo;Senator,&rdquo; a smiling Gonzales responded, &ldquo;the President already said we&rsquo;d be happy to listen to your ideas.&rdquo;
<br>In less paranoid times, Graham&rsquo;s comments might be viewed by many Americans as a Republican trying to have it both ways &ndash; ingratiating himself to an administration of his own party while seeking some credit from Washington centrists for suggesting Congress should have at least a tiny say in how Bush runs the War on Terror.
<br>But recent developments suggest that the Bush administration may already be contemplating what to do with Americans who are deemed insufficiently loyal or who disseminate information that may be considered helpful to the enemy.
<br>Top U.S. officials have cited the need to challenge news that undercuts Bush&rsquo;s actions as a key front in defeating the terrorists, who are aided by &ldquo;news informers&rdquo; in the words of Defense Secretary Donald Rumsfeld. [For details, see Consortiumnews.com &ldquo;<a href="http://www.consortiumnews.com/2006/021806.html">Upside-Down Media</a>&rdquo; or below.]
<br><strong>Detention Centers</strong>
<br>Plus, there was that curious development in January when the Army Corps of Engineers awarded Halliburton subsidiary Kellogg Brown &amp; Root a $385 million contract to construct detention centers somewhere in the United States, to deal with &ldquo;an emergency influx of immigrants into the U.S., or to support the rapid development of new programs,&rdquo; KBR said. [<a href="http://www.marketwatch.com/news/newsfinder/pulseone.asp?dist=SignInArchive&amp;param=archive&amp;siteid=mktw&amp;guid=&amp;dateid=38741.5136277662-858254656">Market Watch</a>, Jan. 26, 2006]
<br>Later, the <a href="http://www.nytimes.com/2006/02/04/national/04halliburton.html?_r=1&amp;oref=login">New York Times</a> reported that &ldquo;KBR would build the centers for the Homeland Security Department for an unexpected influx of immigrants, to house people in the event of a natural disaster or for new programs that require additional detention space.&rdquo; [Feb. 4, 2006]
<br>Like most news stories on the KBR contract, the Times focused on concerns about Halliburton&rsquo;s reputation for bilking U.S. taxpayers by overcharging for sub-par services.
<br>&ldquo;It&rsquo;s hard to believe that the administration has decided to entrust Halliburton with even more taxpayer dollars,&rdquo; remarked Rep. Henry Waxman, D-California.
<br>Less attention centered on the phrase &ldquo;rapid development of new programs&rdquo; and what kind of programs would require a major expansion of detention centers, each capable of holding 5,000 people. Jamie Zuieback, a spokeswoman for Immigration and Customs Enforcement, declined to elaborate on what these &ldquo;new programs&rdquo; might be.
<br>Only a few independent journalists, such as Peter Dale Scott and Maureen Farrell, have pursued what the Bush administration might actually be thinking.
<br>Scott <a href="http://www.globalresearch.ca/index.php?context=viewArticle&amp;code=%20SC20060206&amp;articleId=1897">speculated</a> that the &ldquo;detention centers could be used to detain American citizens if the Bush administration were to declare martial law.&rdquo; He recalled that during the Reagan administration, National Security Council aide Oliver North organized Rex-84 &ldquo;readiness exercise,&rdquo; which contemplated the Federal Emergency Management Agency rounding up and detaining 400,000 &ldquo;refugees,&rdquo; in the event of &ldquo;uncontrolled population movements&rdquo; over the Mexican border into the United States.
<br>Farrell <a href="http://buzzflash.com/farrell/06/02/far06003.html">pointed out</a> that because &ldquo;another terror attack is all but certain, it seems far more likely that the centers would be used for post-911-type detentions of immigrants rather than a sudden deluge&rdquo; of immigrants flooding across the border.
<br>Vietnam-era whistleblower Daniel Ellsberg said, &ldquo;Almost certainly this is preparation for a roundup after the next 9/11 for Mid-Easterners, Muslims and possibly dissenters. They&rsquo;ve already done this on a smaller scale, with the <a href="http://www.ocnus.net/artman/publish/article_22660.shtml">&lsquo;special registration&rsquo; detentions</a> of immigrant men from Muslim countries, and with Guantanamo.&rdquo;
<br><strong>Labor Camps</strong>
<br>There also was another little-noticed item <a href="http://www.army.mil/usapa/epubs/pdf/r210_35.pdf">posted at the U.S. Army Web site</a>, about the Pentagon&rsquo;s Civilian Inmate Labor Program. This program &ldquo;provides Army policy and guidance for establishing civilian inmate labor programs and civilian prison camps on Army installations.&rdquo;
<br>The Army document, first drafted in 1997, underwent a &ldquo;rapid action revision&rdquo; on Jan. 14, 2005. The revision provides a &ldquo;template for developing agreements&rdquo; between the Army and corrections facilities for the use of civilian inmate labor on Army installations.
<br>On its face, the Army&rsquo;s labor program refers to inmates housed in federal, state and local jails. The Army also cites various federal laws that govern the use of civilian labor and provide for the establishment of prison camps in the United States, including a <a href="http://uscode.house.gov/download/pls/18C307.txt">federal statute</a> that authorizes the Attorney General to &ldquo;establish, equip, and maintain camps upon sites selected by him&rdquo; and &ldquo;make available &hellip; the services of United States prisoners&rdquo; to various government departments, including the Department of Defense.
<br>Though the timing of the document&rsquo;s posting &ndash; within the past few weeks &ndash;may just be a coincidence, the reference to a &ldquo;rapid action revision&rdquo; and the KBR contract&rsquo;s contemplation of &ldquo;rapid development of new programs&rdquo; have raised eyebrows about why this sudden need for urgency.
<br>These developments also are drawing more attention now because of earlier Bush administration policies to involve the Pentagon in &ldquo;counter-terrorism&rdquo; operations inside the United States.
<br><strong>Pentagon Surveillance</strong>
<br>Despite the Posse Comitatus Act&rsquo;s prohibitions against U.S. <span lang="en" xml:lang="en">military personnel engaging in domestic law enforcement, the Pentagon has expanded its operations beyond previous boundaries, such as its role in domestic surveillance activities.</span>
<br><span lang="en" xml:lang="en">T</span>he Washington Post has reported that since the Sept. 11, 2001, terror attacks, the Defense Department has been creating new agencies that gather and analyze intelligence within the United States. [<a href="http://www.washingtonpost.com/wp-dyn/content/article/2005/11/26/AR2005112600857.html">Washington Post, Nov. 27, 2005</a>]
<br>The White House also is moving to expand the power of the Pentagon&rsquo;s <a href="http://www.dss.mil/polygraph/cifa.htm">Counterintelligence Field Activity</a> (CIFA), created three years ago to consolidate counterintelligence operations. The White House proposal would transform CIFA into an office that has authority to investigate crimes such as treason, terrorist sabotage or economic espionage.
<br>The Pentagon also has pushed legislation in Congress that would create an intelligence exception to the Privacy Act, allowing the FBI and others to share information about U.S. citizens with the Pentagon, CIA and other intelligence agencies. But some in the Pentagon don&rsquo;t seem to think that new laws are even necessary.
<br>In a 2001 Defense Department memo that surfaced in January 2006, the U.S. Army&rsquo;s top intelligence officer wrote, &ldquo;Contrary to popular belief, there is no absolute ban on [military] intelligence components collecting U.S. person information.&rdquo;
<br>Drawing a distinction between &ldquo;collecting&rdquo; information and &ldquo;receiving&rdquo; information on U.S. citizens, the memo argued that &ldquo;MI [military intelligence] may receive information from anyone, anytime.&rdquo; [See <a href="http://cqpolitics.com/cq.com/www.cq.com/public/20060131_homeland.html">CQ.com, Jan. 31, 2006</a>]
<br>This receipt of information presumably would include data from the National Security Agency, which has been engaging in surveillance of U.S. citizens without court-approved warrants in apparent violation of the Foreign Intelligence Security Act. Bush approved the program of warrantless wiretaps shortly after 9/11.
<br>There also may be an even more extensive surveillance program. Former NSA employee Russell D. Tice told a congressional committee on Feb. 14 that such a top-secret surveillance program existed, but he said he couldn&rsquo;t discuss the details without breaking classification laws.
<br>Tice added that the &ldquo;special access&rdquo; surveillance program may be violating the constitutional rights of millions of Americans. [<a href="http://www.upi.com/SecurityTerrorism/view.php?StoryID=20060214-053955-9494r">UPI, Feb. 14, 2006</a>]
<br>With this expanded surveillance, the government&rsquo;s list of terrorist suspects is rapidly swelling.
<br>The Washington Post <a href="http://www.washingtonpost.com/wp-dyn/content/article/2006/02/14/AR2006021402125.html">reported</a> on Feb. 15 that the National Counterterrorism Center&rsquo;s central repository now holds the names of 325,000 terrorist suspects, a four-fold increase since the fall of 2003.
<br>Asked whether the names in the repository were collected through the NSA&rsquo;s domestic surveillance program, an NCTC official told the Post, &ldquo;Our database includes names of known and suspected international terrorists provided by all intelligence community organizations, including NSA.&rdquo;
<br><strong>Homeland Defense</strong>
<br>As the administration scoops up more and more names, members of Congress also have questioned the elasticity of Bush&rsquo;s definitions for words like terrorist &ldquo;affiliates,&rdquo; used to justify wiretapping Americans allegedly in contact with such people or entities.
<br>During the Senate Judiciary Committee&rsquo;s hearing on the wiretap program, Sen. Dianne Feinstein, D-California, complained that the House and Senate Intelligence Committees &ldquo;have not been briefed on the scope and nature of the program.&rdquo;
<br>Feinstein added that, therefore, the committees &ldquo;have not been able to explore what is a link or an affiliate to al-Qaeda or what minimization procedures (for purging the names of innocent people) are in place.&rdquo;
<br>The combination of the Bush administration&rsquo;s expansive reading of its own power and its insistence on extraordinary secrecy has raised the alarm of civil libertarians when contemplating how far the Pentagon might go in involving itself in domestic matters.
<br><span lang="en" xml:lang="en">A Defense Department document, entitled </span>the &ldquo;<a href="http://www.dod.gov/news/Jun2005/d20050630homeland.pdf">Strategy for Homeland Defense and Civil Support</a>,&rdquo; has set out a military strategy against terrorism that envisions an &ldquo;active, layered defense&rdquo; both inside and outside U.S. territory. In the document, the Pentagon pledges to &ldquo;transform U.S. military forces to execute homeland defense missions in the &hellip; U.S. homeland.&rdquo;
<br>The Pentagon strategy paper calls for increased military reconnaissance and surveillance to &ldquo;defeat potential challengers before they threaten the United States.&rdquo; The plan &ldquo;maximizes threat awareness and seizes the initiative from those who would harm us.&rdquo;
<br>But there are concerns over how the Pentagon judges &ldquo;threats&rdquo; and who falls under the category &ldquo;those who would harm us.&rdquo; A Pentagon official said the Counterintelligence Field Activity&rsquo;s TALON program has amassed files on antiwar protesters.
<br>In December 2005, NBC News <a href="http://msnbc.msn.com/id/10454316/">revealed</a> the existence of a secret 400-page Pentagon document listing 1,500 &ldquo;suspicious incidents&rdquo; over a 10-month period, including dozens of small antiwar demonstrations that were classified as a &ldquo;threat.&rdquo;
<br>The Defense Department also might be moving toward legitimizing the use of propaganda domestically, as part of its overall war strategy.
<br>A secret Pentagon<strong> <a href="http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.pdf" target="_blank">&ldquo;Information Operations Roadmap,&rdquo;</a></strong> approved by Rumsfeld in October 2003, calls for &ldquo;full spectrum&rdquo; information operations and notes that &ldquo;information intended for foreign audiences, including public diplomacy and PSYOP, increasingly is consumed by our domestic audience and vice-versa.&rdquo;
<br>&ldquo;PSYOPS messages will often be replayed by the news media for much larger audiences, including the American public,&rdquo; the document states. The Pentagon argues, however, that &ldquo;the distinction between foreign and domestic audiences becomes more a question of USG [U.S. government] intent rather than information dissemination practices.&rdquo;
<br>It calls for &ldquo;boundaries&rdquo; between information operations abroad and the news media at home, but does not outline any corresponding limits on PSYOP campaigns.
<br>Similar to the distinction the Pentagon draws between &ldquo;collecting&rdquo; and &ldquo;receiving&rdquo; intelligence on U.S. citizens, the Information Operations Roadmap argues that as long as the American public is not intentionally &ldquo;targeted,&rdquo; any PSYOP propaganda consumed by the American public is acceptable.
<br>The Pentagon plan also includes a strategy for taking over the Internet and controlling the flow of information, viewing the Web as a potential military adversary. The &ldquo;roadmap&rdquo; speaks of &ldquo;fighting the net,&rdquo; and implies that the Internet is the equivalent of &ldquo;an enemy weapons system.&rdquo;
<br>In a speech on Feb. 17 to the Council on Foreign Relations, Rumsfeld elaborated on the administration&rsquo;s perception that the battle over information would be a crucial front in the War on Terror, or as Rumsfeld calls it, the Long War.
<br>&ldquo;Let there be no doubt, the longer it takes to put a strategic communication framework into place, the more we can be certain that the vacuum will be filled by the enemy and by news informers that most assuredly will not paint an accurate picture of what is actually taking place,&rdquo; Rumsfeld said.
<br>The Department of Homeland Security also has demonstrated a tendency to deploy military operatives to deal with domestic crises.
<br>In the wake of Hurricane Katrina, the department dispatched &ldquo;heavily armed paramilitary mercenaries from the Blackwater private security firm, infamous for their work in Iraq, (and had them) openly patrolling the streets of New Orleans,&rdquo; reported journalists Jeremy Scahill and Daniela Crespo <a href="http://www.truthout.org/docs_2005/091005A.shtml">on Sept. 10, 2005.</a>
<br>Noting the reputation of the Blackwater mercenaries as &ldquo;some of the most feared professional killers in the world,&rdquo; Scahill and Crespo said Blackwater&rsquo;s presence in New Orleans &ldquo;raises alarming questions about why the government would allow men trained to kill with impunity in places like Iraq and Afghanistan to operate here.&rdquo;
<br><strong>U.S. Battlefield</strong>
<br>In the view of some civil libertarians, a form of martial law already exists in the United States and has been in place since shortly after the 9/11 attacks when Bush issued Military Order No. 1 which empowered him to detain any non-citizen as an international terrorist or enemy combatant.
<br>&ldquo;The President decided that he was no longer running the country as a civilian President,&rdquo; wrote civil rights attorney Michael Ratner in the book <em>Guantanamo: What the World Should Know.</em> &ldquo;He issued a military order giving himself the power to run the country as a general.&rdquo;
<br>For any American citizen suspected of collaborating with terrorists, Bush also revealed what&rsquo;s in store. In May 2002, the FBI arrested U.S. citizen Jose Padilla in Chicago on suspicion that he might be an al-Qaeda operative planning an attack.
<br>Rather than bring criminal charges, Bush designated Padilla an &ldquo;enemy combatant&rdquo; and had him imprisoned indefinitely without benefit of due process. After three years, the administration finally brought charges against Padilla, in order to avoid a Supreme Court showdown the White House might have lost.
<br>But since the Court was not able to rule on the Padilla case, the administration&rsquo;s arguments have not been formally repudiated. Indeed, despite filing charges against Padilla, the White House still asserts the right to detain U.S. citizens without charges as enemy combatants.
<br>This claimed authority is based on the assertion that the United States is at war and the American homeland is part of the battlefield.
<br>&ldquo;In the war against terrorists of global reach, as the Nation learned all too well on Sept. 11, 2001, the territory of the United States is part of the battlefield,&rdquo; Bush's lawyers argued in briefs to the federal courts. [Washington Post, July 19, 2005]
<br>Given Bush&rsquo;s now open assertions that he is using his &ldquo;plenary&rdquo; &ndash; or unlimited &ndash; powers as Commander in Chief for the duration of the indefinite War on Terror, Americans can no longer trust that their constitutional rights protect them from government actions.
<br>As former Vice President Al Gore asked after recounting a litany of sweeping powers that Bush has asserted to fight the War on Terror, &ldquo;Can it be true that any President really has such powers under our Constitution? If the answer is &lsquo;yes,&rsquo; then under the theory by which these acts are committed, are there any acts that can on their face be prohibited?&rdquo;
<br>In such extraordinary circumstances, the American people might legitimately ask exactly what the Bush administration means by the &ldquo;rapid development of new programs,&rdquo; which might require the construction of a new network of detention camps.
</font>

<hr noshade color="#006699" size="14"></hr>
 
Last edited:
Re: american gulags...aka "detainment camps" wtf

`

A well respected lawyer I knew, commenting on what a witness was trying to pass off as what he knew to be the <u>truth</u>, once said:

"... it ain't what you don't know that scares me; its what you <u>do</u> know that just ain't so ..."

`
 
Re: american gulags...aka "detainment camps" wtf

When you start expounding on your one-line theories, I'll join you.
 
Back
Top