Big Brother, Kill Lists, and Secrecy: What to Expect from Obama’s Second Term
2012 11 22

By Christian Stork | WhoWhatWhy.com



Following Barack Obama’s significant electoral victory, the ways in which the President will interpret his new “mandate” are still very much up for debate. While pundits, many of whom got the election seriously wrong, fumble to come up with new predictions, an analysis of Obama’s track record and statements on national security policy can be quite illuminating. Two momentous stories of the past few weeks can help us evaluate current and future prospects for our Constitutional rights, a year after Osama bin Laden’s death and a decade after 9/11. One grim harbinger of what’s to continue: a nighttime drone strike in Yemen that killed three “al-Qaida militants” was carried out within 24 hours of Obama’s victory speech.


But even more important was the bombshell story that appeared in the Washington Post on October 23, revealing the existence of a new database within the National Counterterrorism Center (NCTC) that will list suspected terrorists and militants slated for extrajudicial assassination. The article details the creation of a “next-generation targeting list called the ‘disposition matrix’” which “contains the names of terrorism suspects arrayed against an accounting of the resources being marshaled” to kill them, including the ability to map “plans for the ‘disposition’ of suspects beyond the reach of American drones.”


Additionally, on October 29, the Supreme Court heard oral arguments in Amnesty v. Clapper, evaluating a lawsuit filed by journalists, human rights workers, and lawyers, who claimed that their jobs are unnecessarily hampered by the specter of the National Security Agency eavesdropping on their communications with clients overseas. As described by the Electronic Frontier Foundation (EFF), “the [Supreme] Court will essentially determine whether any court… can rule on whether the [National Security Agency]’s targeted warrantless surveillance of Americans’ international communications violates the Constitution.”


What do NSA’s warrantless wiretapping program and the Obama administration’s recently developed “disposition matrix” have to do with one another? Two points resound in particular. First, both are only able to function in an environment of total secrecy. Also, they represent significant advances in the codification of a new norm for U.S. national security policy—one very much at odds with the constitutionally limited Commander-in-Chief of common lore.


Perhaps even more ominously, the infrastructure development of the Obama administration’s policy of targeted killing signals a creeping move toward domestic application. As drone technology continues to be imported home, the convergence of the kill-list(s) within the NCTC bureaucracy—which houses huge repositories of both domestic and foreign intelligence with no probable cause of criminality—is a foreboding development in this saga of eroding checks and disappearing balance.


Climbing Out of the Abyss, Jumping Back In


Unknown to the American people and to much of their government until the late 1970’s, NSA has enjoyed free rein to intercept the electronic communications of Americans and foreigners since its secret inception in 1952. To those who were familiar with it, the uniform joke was that NSA stood for “No Such Agency,” an indication of its covert and prized status within the intelligence community.


After media revelations of intelligence abuses by the Nixon administration began to mount in the wake of Watergate, NSA became the subject of Congressional ire in the form of the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities—commonly known as the “Church Committee” after its chair, Senator Frank Church (D-ID)—established on January 17, 1975. This ad-hoc investigative body found itself unearthing troves of classified records from the FBI, NSA, CIA and Pentagon that detailed the murky pursuits of each during the first decades of the Cold War. Under the mantle of defeating communism, internal documents confirmed the executive branch’s use of said agencies in some of the most fiendish acts of human imagination (including refined psychological torture techniques), particularly by the Central Intelligence Agency.


The Cold War mindset had incurably infected the nation’s security apparatus, establishing extralegal subversion efforts at home and brutish control abroad. It was revealed that the FBI undertook a war to destroy homegrown movements such as the Black Liberation Movement (including Martin Luther King, Jr.), and that NSA had indiscriminately intercepted the communications of Americans without warrant, even without the President’s knowledge. When confronted with such nefarious enterprises, Congress sought to rein in the excesses of the intelligence community, notably those directed at the American public.



The committee chair, Senator Frank Church, then issued this warning about NSA’s power:

That capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything. Telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology. I don’t want to see this country ever go across the bridge. I know the capability that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.


[...]

Read the full article at: whywhatwhy.com





Related Articles


Latest News from our Front Page

Sweden Recognizes Palestinian State; Israel Upset
2014 10 31
Sweden on Thursday became the biggest Western European country to recognize a Palestinian state, prompting a strong protest from Israel, which swiftly withdrew its ambassador from Stockholm. The move by Sweden’s new left-leaning government reflects growing international impatience with Israel’s nearly half-century control of the West Bank, east Jerusalem and its blockade of the Gaza Strip. It also comes during increased ...
Fed-Backed Study: How to Brainwash Public into Fearing “Climate Change” Like Ebola
2014 10 31
$84K study seeks ways to make public fear "climate change and overpopulation" The National Science Foundation is funding a study to determine how to brainwash the public into fearing “climate change and overpopulation” as if they were Ebola. The NSF awarded an $84,000 grant to researchers at the State University of New York at Buffalo yesterday to figure out how to make ...
Brain decoder can eavesdrop on your inner voice
2014 10 31
As you read this, your neurons are firing – that brain activity can now be decoded to reveal the silent words in your head TALKING to yourself used to be a strictly private pastime. That’s no longer the case – researchers have eavesdropped on our internal monologue for the first time. The achievement is a step towards helping people who cannot ...
6 Million Lies
2014 10 30
“If you do not specify and confront real issues, what you say will surely obscure them. If you do not alarm anyone morally, you yourself remain morally asleep. If you do not embody controversy, what you say will be an acceptance of the drift of the coming hell.” C Wright Mills. I need to share information I have discovered ...
Google’s New Computer With Human-Like Learning Abilities Will Program Itself
2014 10 30
In college, it wasn’t rare to hear a verbal battle regarding artificial intelligence erupt between my friends studying neuroscience and my friends studying computer science. One rather outrageous fellow would mention the possibility of a computer takeover, and off they went. The neuroscience-savvy would awe at the potential of such hybrid technology as the CS majors argued we have nothing to ...
More News »