Hope2012


Our Common Enemy: Spread of Fascism Across the Globe

Brits, You Are Running Out of Time–the Army Is About To Become Your Police

Chilcot War Inquiry: Professor to launch ‘Nuremberg’ war crimes prosecution against Blair

CCTV in the sky: police plan to use military-style spy drones

Taxman using terror laws 15 times a day to spy on suspects (UK)

Britain: Police Plan to Use Military-Style Spy Drones

The 20,000 snooper army: Vast number of town hall bureaucrats get power to enter your home without a warrant

Telecom firms’ fury at plan for ‘Stasi’ checks on every phone call and email

Telecoms firms have accused the Government of acting like the East German Stasi over plans to force them to store the details of every phone call for at least a year.  Under the proposals, the details of every email sent and website visited will also be recorded to help the police and security services fight crime and terrorism.

Ministers WERE told invading Iraq was illegal, Foreign Office law chief tells Chilcot inquiry

Lord Goldsmith: I changed my mind about legality of Iraq war after talks with Bush’s lawyers in Washington

More than 106,000 officials punished in first 11 months of 2009 (China)

Anger over broadened police powers to search people (Australia)

UN agency calls for global cyberwarfare treaty, ‘driver’s license’ for Web users

Canadian House of Commons Shut down Until March.

Furious opposition MPs accused Prime Minister Stephen Harper of muzzling the House of Commons after he moved for the second time in a little more than a year to suspend Parliament.  Mired in controversy over an alleged cover-up on the torture of Afghan prisoners and eager to increase the Conservatives’ power in the Senate, the government is closing down Parliament until March 3, the Prime Minister’s Office said Wednesday.

A North American Security Perimeter on the Horizon

Plans for a North America security perimeter might have seemed like a pipe dream just a short time ago, but it could become a reality sooner than one thinks. Some believe that a perimeter approach to security would be a more effective way of providing safety while ensuring the free flow of trade and investment. For those pushing for deep continental integration, this move is seen as the next logical step. A recent article from the Toronto Star, Canada warms to idea of a tougher ‘perimeter’ suggests that Canadians might now be ready to debate the concept of perimeter security. David Biette who specializes in U.S.-Canada relations and is a member of the Woodrow Wilson Center stated that a, “Perimeter is no longer a dirty word.

Italy to Require Anyone Who Uploads Video to the Internet to Obtain Government Authorization

GERMANY 1940 ISRAEL 2009

Israel stole 2 billion dollars from Palestinian workers: 40-year deception exposed

Over the past four decades Israel has defrauded Palestinians working inside Israel of more than two billion US dollars by deducting from their salaries contributions for welfare benefits to which they were never entitled, Israeli economists have revealed.

Israeli Robots Remake Battlefield

In coming years, engineers say unmanned air, sea and ground vehicles will increasingly work together without any human involvement. Israel and the U.S. have already faced backlash over civilian deaths caused by drone-fired missiles in Gaza, Pakistan and Afghanistan. Those ethical dilemmas could increase as robots become more independent of their human masters.

Obama Approves $30 Billion Military Aid To Israel Over Next Decade

Russia: Mental Checks for Police

 “If we resume testing, we’ll find that at least a third of all active police officers have some kind of mental pathology”

ACTA: the leaked secret memos

Michael Geist: “Negotiations in the 7th round of the ACTA [ed: The Anti-Counterfeiting Trade Agreement — a brutal, secret Internet treaty] talks open this morning in Mexico with civil enforcement issues on the agenda. Yesterday I posted on the developments to-date, including a chronology of talks, issues, and leaks that have led to this week’s round of discussions. Part Two of the ACTA Guide provides links to the underlying documentation. Governments have been very tight lipped about the talks. Initially, only a brief summary following the conclusion of each round of the talks was provided. More recently, the agenda of each meeting is disclosed and a summary document (largely confirming Internet leaks) has been provided. Of far greater importance are the leaked documents. These have confirmed how the Anti-Counterfeiting Trade Agreement is designed to extend far beyond counterfeiting and how it would reshape domestic law in many countries.”

Advertisements

Leave a Comment so far
Leave a comment



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s



%d bloggers like this: