Constant's pations

If it's more than 30 minutes old, it's not news. It's a blog.

Tuesday, April 04, 2006

Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

The language in the Senate Bill is instructive.

This note outlines the summary flaws with the current Senate rule making, and outlines specific remedies to what the Senate is abusing.

The way forward is to summarize the abused powers of the Senate, and then find remedies to these abuses. This will show you that there is a direct connection between each violation and the proposed remedies in the New Constitution.

You’ll notice the breakdown is familiar. This information summarizes the original indicators in the Senate Bill. We proceed on the assumption that the indicators in the FISA violations and illegal NSA activity are consistent; just as the arguments and loopholes.

Where there is a pattern of conduct that permits violations of the law, the Senate shall be found to have committed a felony for permitted what is a violation. The Senate does not have the power to abuse power, nor create language which permits violations of the law.

* * *






Legend


All references are to the following document: Ref

Format: 23.09 – means, page 23, line 09.

* * *


Template

1. Summary Issue: What the Executive is doing.

2. Problem: How this method is violates the Constitution.

3. Description of methods President, DoJ, and NSA use to violate the Constitution.

4. Abused power: How this information shows us how power is being abused: What the Senate has done or failed to do to contribute to this violation.

5. Remedy: Senate changes required in a New Constitution to compel them to do what is required to protect rights and prevent the abuse of power.










* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

Summary issue: Senate aware of illegal programs, but failure to shut down funding.

Problem: Data sharing.

Problem: Page 28, you’ll notice that the information can be shared with anyone. Note there is no law that prevents the Executive from sharing this information to be people he decides can look at it. Thus we conclude that the information is freely shared with contractors; the goal of the Presidential program is to prevent the public from discovering to what extent the NSA data is disseminated.

Abused power: Failure to ensure information is protected and not shared.

Remedy: The Congress shall be given the power to have an NSA-like mentoring capability direct at all NSA contractors and executive branch. Sampling will include methods to validate that the reports Congress is getting is consistent with actual conduct.

Abused power: Unlawful appropriations for activities not adequately bounded

Remedy: Felony for Senators to continue funding a program with unanswered questions on data sharing, or with program language that does not expressly prohibit and make illegal the end results. The issue is not to sanction the mode, but to sanction the result: The violation of rights and abuse of power.




* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Inadequate program bounds

Problem: Insufficient catalyst on Senate to shut down funding with very loose parameters.


Page 31, includes interagency funding to authorized groups. We judge this is widely interpreted to mean that any agency the executive deems to be related can receive funding, even if that objective is in contravention to the Constitution. We judge “other groups” is broadly defined as anyone, also at odds with the privacy. We judge the executive describes this language as the “inherent authority” to designate anyone to receive anything, and use that information in any matter that is consistent with what the Executive decides is or into appropriate.

Abused power: Appropriations without credible basis to believe lawful.

Remedy: Senators shall be convicted of a felony for appropriation funds for programs loosely described, or permitting loose transfer of funds. Language shall include exploit language that the funds may not be used for any illegal purpose; and that no executive order may direct anyone to violate the law, nor create a ruse designation or exemption permitting violations of Constitutional rights.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

Summary issue: Non-sense threats for funding

Problem: Invalid requirements

Page 34, includes programs to meet or exceed others. We speculate that any imagined threat – however fabricated – is the basis to assert that funding is required. Capabilities that are not real are used as the basis to justify funding, set milestones, and get funding allocated to programs. Program baselines are poorly linked with bonafide threats; and in turn actual capabilities are degraded faster than what really exists overseas. This is an illusory inducement for Congress to appropriate funds for programs that do not need to be upgraded. We judge the basis for the degradation and the threat assessments is not credibly independently reviewed; rather the threat assessments are merely accepted as true – and set the baseline to exceed. These targets are not realistic, and we judge the NSA programs are for the most part poorly managed on absurd timelines, and Congress fails to effectively manage the program along credible milestones relative to bonafide threats. Rather, it’s merely a “throw money at the problem” – however illusory that threat might be.

Abused power: Senate has failed to ensure that appropriations are for what stated.

Remedy: Senators shall face sanction of a felony conviction for failing to ensure that the program funding is for a bonafide reason.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

Summary issue: Failure to inquire on matters outside law.

Problem: Senators know full well the information they get is worthless



Page 41.2-3 : The “fully inform” is not met. Rather, “fully” is defined as “fully to the satisfaction of the program manger,” and is not the same as “complete”. Material information – needed by congress to assess legality – is not sufficient.

Abused power: Failure of oversight.

Remedy: Increased staff, bounties for Staffers to report programs where program activities and outcomes at odds with laws. Use of NSA-like monitoring system within Congress to randomly sample Executive activities.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

Summary issue: Self-delegation of unlawful exemptions

Problem: Assigning oversight to non-Congressional members

Page 41.22-042 : There is no effective mechanism to ensure that letters to Congress meet the full reporting requirement. Rather, the letters are looked at as occasional inconveniencies, and are generally looked at as something Congress should be happy to get, not something that the NSA needs to seriously comply with. Rather, the executive is inclined to self-delegate himself the authority and oversight responsibility; and say that his independent review does not require a letter to congress.

Abused power: Failure to demand a list of programs President interpedently review.

Remedy: Make it a felony for Senators not to compel the Executive to certify that the list is complete.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

Summary issue: Unresponsive to discovery

Problem: Subpoenas are not gleaning need information

Pages 44 25-045.18 : Personnel inside the NSA are taught to lie, not comply with subpoenas. Subpoenas are only valid if you have one in front of you, but you are encouraged to say the party line. If you lie and get caught, it is your problem. Those who lie and do not get caught are promoted.

Abused power: Failure of Senate to create a credible system that will compel discovery.

Remedy: Rotating system of tri-partate leadership on the NSA activities. Information randomly sampled using an NSA-like capability directed at the Executive.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Violations of the Constitution

Problem: Non-reports on violations.


Page 49.5 : The reports on the civil liberties is not included. This activity is defined as another program which someone else takes care of. There is no effective mechanism to ensure the letters and repots to Congress are accurate, complete, or meaningful. This is merely window dressing on the wrong building. The approach to Congress in these repots is: If you are honest, you are a fool; it is better to say less, that increases you chances of having a question. Truth can be rewritten to embrace another reality.

Abused power: Failure of Senate to check abused powers.

Remedy: Senate lawfully compelled to investigate, gather facts, and provide summary report to House in 90 days for impeachment.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Attacks on whistleblowers.

Problem: Senate refuses to act to protect those in the know.


Page 52 : Previously assigned personnel may be targeted for smearing if they dare discuss the real scope of the NSA illegal activity.

Abused power: Failure to protect and safeguard the process.

Remedy: Senate protection to those who provide information; felony on senator if they know of in formation, but fail to grant protection.

Abused power: Too much deference on whether Senate does or does not act.

Remedy: Strip oversight responsibility from the Senate to the States.


* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

Summary issue: Senate complicity in war crimes

Problem: No outside review

Page 56.12-15 : On false statements to Congress, this standard is not effectively enforced. Rather, all investigations into this matter are deemed to be national security and the leadership does not provide a letter as required. The issue isn’t that Congress was or was not deceived; rather, it was that Congress – because it was part of the deception – will do nothing. The Congress suppresses reports, refuses to investigation, and fails to recuse itself from matters they are involved in, and should be reviewed.

Abused power: Failure of rule enforcement

Remedy: Transfer rule enforcement to the States

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Exercise of non-delegated power.

Problem: Consolidated power, failure of senate to intervene.


Page 57.06-07 : Reports of violations of criminal law are not followed. The AG has been given the power to make new exceptions, and assent to executive orders that violate the law.

Abused power: Executive asserts legislative power; Senate fails to assert power.

Remedy: Felony for Senator to fail to assert oath, and force a full accounting of the unlawful abuse of power

Abused power: Consolidated power

Remedy: Each Executive department shall have two other leaders – one from the judicial branch and legislative, each with separate reporting. They shall report to an independent branch other than Congress for investigations and prosecution. Senate does not have exclusive power to oversee executive.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Use of non-delegated powers.

Problem: Consolidation of Judicial, legislative, and executive power.


Page 60 : this is the area where this a lot of abuse. AG is given the power to make many things exempt when they should not.

Abused power: Failure to prevent abuse of power.

Remedy: Felony for a Senator to not challenge consolidated power.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Illegal activities not reported

Problem: Exemptions abused.


Page 67.13 : The nexus of exemptions and the National Intelligence Director is fraught with abuse. Whether something is or is not related to the NID is in question. On those things that should be reported, the NID is given discretion and latitude to say that the exemption applies; on matters where the Congress is culpable, the NSA IG is encouraged to remind the Congress of their complicity. This means that Congress is not inclined to talk about something they may be criminal liable for actively supporting. This is a form of blackmail and extortion.

Abused power: Failure of oversight

Remedy: Felony on Senate if they fail to investigate; or ensure that fourth branch of government timely supported with information.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Violations of the law

Problem: Designation violations as acceptable


Page 68.16 : This is the likely source of the NSA illegal activity. The NSA will classify things as being “terror related” in order to get money and exemptions. This is a free for wall. It’s another way of saying, “No matter how disconnected this illegal activity is from the name, we can lawfully violate the law by asserting the conduct is counter-terror related. This is known fiction.

Abused power: Failure to sample the program designations.

Remedy: Senators face a felony for not credibly increasing audit scope to effectively oversee programs.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

Summary issue: Bill of Rights violated

Problem: Failure to manage violations of the law

Page 77.14-23 : Exceptions on page 78 imply that there are intelligence-related
exceptions that are permitted. That’s very broad. This power is broadly combined with the “anti-terror” programs and the two have fused: If something is related to anti-terrorism and intelligence – even if it is illegal – it is given an exemption, and the self-assertion of legality means that the NID does not report this to Congress.

This is the area where the DoJ AG is given wide latitude to create new exemptions to the law, and permit warrantless detentions. The definitions related to probable cause have been watered down to justify anything based on pre-text, even pre-emptive use of force to stop what may simply be imagined or convenient. The DoJ AG uses this as the mechanism to self-grant exemptions to the Constitution; and use military police in domestic law enforcement roles. They call this training, but it is actually using military police in violation of the Posse Comitatus Act.

Abused power: Checks and balances

Remedy: Felony for a Senator for failing to assert power and ensure that conduct is lawful, investigated, and sanctions imposed.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: War crimes against Americans

Problem: NSA illegally monitoring civilians


80.-1-16 NSA and DoD have a source program. Sometimes people are assigned to the source program without being told they are a source. This is a way of getting around the restrictions against domestic surveillance.

Americans are targeted using the NSA. The NSA will identify key areas of communication and nubs of interactions. These are areas and people that are given a choice: Cooperate with our illegal activities, or we will prosecute you based on false charges. This is how Americans are blackmailed to be silent about what they are discussing with the government.

Abused power: Illegal use of combat support against Americans

Remedy: Senators can be tried for war crimes for appropriating funds for war crimes against Americans.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Civil rights violations

Problem: Warrantless detentions, interrogations


Page 77.14-23 : Notice the link between the CIA, NSA, and DoJ AG under this. This shows that the AG will say to the CIA “It is OK to arrest without a warrant Americans using illegally-intercepted-NSA data.”

This is the area that permits arrests without warrant. DoJ has self-conferred wide latitude, as was done under the FISA statute – to create new standards. However, what’s actually happened is that they’ve ignored the law, and will late attempt to rely on this provision as an excuse. The goal of this is to delay fact finding and bringing this to court. IN realty, they know they are violating the law; goal is to delay understanding of this. When the story first breaks, rather than say “We’re guilty.” They’ll say the opposite: “There is no crime.” This will attempt to make people who are involved think, “I’m doing something legal.” In truth, they know they are violating the law.

Abused power: Senate fails to assert power

Remedy: Senate denied power to oversee, and this power delegated to the States.

Abused power: Appropriations for unlawful things

Remedy: Senate faces a felony for failing to ensure training sufficient to meet requirements of the Statute.


* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Unconstitutional conduct

Problem: Illegal searches


Page 80.23-24 : This is the provision which government agents assigned to NSA, CIA, and DoJ will lie and say they are with the police. These types of people showed up during Operation Falcon. This essentially permits an entity to hide it is related to
NSA, and approach/intercept the source as if they were a foreign agent. This is the catchall how the President gets around the Constitution.

Abused power: Failure of senate to make rules making this a felony.

Remedy: Felony for Senators not to challenge Executive on pattern of conduct.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: war crimes

Problem: Illegal orders


Page 81.23 : These are the exceptions to the Constitution. The Executive Orders [EO's] can violate the law or Constitution; when asked about EO’s that are illegal or contrary to law, the DoJ AG will say that this is OK as an exception to the reporting requirement, and the waivers they can grant themselves on exemptions and disclosures. They assert that anything that is “intelligence related” is legal, even if it violates the Constitution.

Abused power: Unlawful appropriations

Remedy: War crime for senators to illegally appropriate funds for illegal use of military force against Americans.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Senators join Executive in rebellion.

Problem: Constitutional violations


Page 81.4 : Another exemption is the “outside the US”- rule. This means that they can define anybody as being “outside the US’ even though they are physically located in the United States. IN other words, the “outside the US” provision was deleted because they did not want to have that requirement imposed on them in the statute. It means they can do two things; violate the law, regardless whether someone is or is out of the US: and if it services their purposes, they can call people in the US “outside” if they are asserted to be “terror connected.” They make up excuses, and the FISA court has been lulled to believe them.

Abused power: Failure of Senate to assert power.

Remedy: Felony for Senators to not assert power and challenge Executive.

* * *


Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


Summary issue: Illegal discretion to violate the law.

Problem: Excuses to violate the Bill of Rights.


Page 83.24 : “Protective functions” can mean anything, from accusations based on poetical ideology, trumped up charges, or simply to impose power to intimidate others.

This is how DoJ self-issues warrants without court review. Warrantless protective functions approved By DoJ AG.

  • A. Fiction and unconstitutional: "reasonable grounds to believe" --
  • B. This is an excuse: Self-issued warrantless searches by the NSA
  • C. In reality, they are illegally invading homes, violating rights without any valid reason. They’re on fishing trips and abusing power and authority. This is illegal. DoJ has fatally asserted that NSA is a combat support tool – this means that NSA and DoJ know that the DoD assets are illegally being used against Americans in contravention to the Geneva Conventions, and a war crime.

    This takes us back to the NSA and the “reasonable grounds to believe” nonsense. This is a lesser standard than what is in the Constitution. This permits self-issued warrants on anything; retroactive warrants; or simply by passing the procedures because of an “emergency” or “novel situation.” This can be pre-text, made up, fabricated. The goal is to create a story that sounds believable; but if you examine the excuse it collapses: Assertions are not supported by facts; personnel are lying; and the information has been fabricated based on illegally obtained evidence. The catchall excuse is to call this “training”.

    Abused power: Senate has no power to delegate to AG.

    Remedy: Felony for Senators to write language conferring power or granting exceptions to Constitution.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

    Summary issue: Constitutional violations

    Problem: Abuse of exceptions


    Page 84.01 : These are other exceptions that the AG can self-create without Congressional knowledge. IN this case, where the exceptions are not applicable, the AG will assign them into a category that permits them to be outside what Congress is told about; or beyond the limitations of the current exceptions. In other words, he’s creating a new “exception to the exception” rule by putting things in “other”. This is another way of getting around the Constitution and violating it. By defining things as “other” he can self-assert that it is permissible, even if it violates the law, is illegal, or is at odds with explicit Congressional language to the contrary.

    Abused power: Illegal delegation of discretion

    Remedy: Felony for Senators to draft or approve legislation conferring illegal exceptions to the Constitution.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

    Summary issue: Constitutional violations

    Problem: Illegal surveillance


    Page 85.04 : IF there is a problem with a file, that file is labeled exempt. Even if someone is an American citizen, people can be encourage to be confused and may think that they are foreign, or a “terror related agent”. This will put the file in an exempt area, and the NSA IG and Congress will not know to look at the problem information. Any American citizen who is under surveillance is asserted to be one of three things: [1] terror connected; [2] agent of a foreign power; or [3] a foreign government connected person. It doesn’t matter if the designation is correct; the goal is to hide the file, prevent knowledge of the scope of the illegal activity.

    Abused power: Illegal grant of discretion

    Remedy: Felony for Senators to not challenge Executive.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Fraud.

    Problem: Non-sense reasons for actions.


    Page 85.10 : Information about what other nations are doing, and how they do it can be made up. This will ensure that the basis for a program – the technical requirements and the threat they are supposedly challenging that can also be made up – is not accessible. It is well known – and asserted – that there are methods by which the NSA cannot intercept. This is the means by which “big scary things” are asserted to be another threat, even if it is made up. This is how money is justified.


    Abused power: Failure of oversight

    Remedy: NSA-like monitoring system to sample, verify data to Congress.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Constitutional violations

    Problem: Abuse of exemptions

    Page 85.23 The DoJ AG will self-assign exemptions using this section. This springs off the President’s authority -- and concludes that exemptions have been created as was FISA, and these self-created exemptions are broad, created by the AG. [Using the Anti-Terror name as the catchall; Not the intent of Congress]

    Abused power: Illegally granting Executive discretion.

    Remedy: Felony for senators to permit violations of the constitution.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Congressional oversight

    Problem: Discovery incomplete

    Page 86.01 - 87.04 : This is a list of other agencies which Congress could rely on; however NSA will say that they have exclusive control over the questions. This is false. These are other entitles where subpoenas could be issued, but NSA and DoJ AG have no plans to remind the public or Congress of these other avenues.

    Abused power: Failure to engage in fact finding.

    Remedy: Felony for Senators not to exhaust remedies before assenting to Presidential rebellion.

    Abused power: Senate refuses to ensure programs are lawful.

    Remedy: Transfer authorization to States.


    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

    Summary issue: Illegal data mining

    Problem: Excuses for illegal surveillance


    Page 87.08 : This is the exemption for derivative works. This is a self-created exemption. It permits data mining products to be exempt in that they are deemed to be a ‘derivative work”. This is a new exception, which the AG appears to have created: They’ve designated the NSA work products/data mining as a derivative product, but it is
    exempt because it is "terror related". This is bogus.

    Abused power: Appropriating funds for illegal things

    Remedy: Senators face a felony for appropriating funds for illegal programs.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Language twisted to justify illegal things

    Problem: Failure of Senate to tighten language


    Page 87.20-24 : This the “provision of law” exception. This is similar to the AUMF
    argument; and this is the tool they use to create new exceptions/exemptions.
    Self-write new provisions using this phrase. This is how the President creates new legislation.

    Abused power: Illegal permission to create exceptions.

    Remedy: Felony on senate for failing to challenge Executive for asserting legislative powers; felony for unlawfully delegating power to Executive to make exceptions.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

    Summary issue: Court ignored

    Problem: Checks and balances failed


    Page 88 : The court reviews have been ignored. FISA has been ignored and side stepped in a similar fashion. FISA court was taken out; they’ve set up their own judicial review -- as they did with FISA -- to review whether documents are or are not being appropriately reviewed/classified. NSA IG and other investigators ignore the "Domestic enemy" provision of the oath.

    Abused power: Senators fail to ensure laws followed

    Remedy: Felony on senators for failing to assert power against Executive.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

    Summary issue: Standards as followed at odds with Senators intent

    Problem: Ignoring the rules


    88.25 : This is the language that has been broadly interpreted to mean that all rules of civil procedures and rules of evidence are waived as an exemption. They ignore that the exemption only applies to rules 26-36 of civil procedure.

    Abused power: Language broadly interpreted illegally.

    Remedy: Felony for Senators to not narrow language, or include explicit clauses banning unconstitutional conduct.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

    Summary issue: Failure of Senate to shut down illegal activity

    Problem: Unconstitutional Conduct

    89.19 : This is the exception related to “personal knowledge.” The issue here is the specific. Because something is illegal, they will apply an exemption and call it "anti-terror"-related. In order to avoid broad discovery, they will say that the conduct is isolated. This a way of saying that a broad pattern of abuse – which is other wise suppressed – will be the burden of the Congress and public to prove.

    However, the real issue is that the FISA violations are clear and form a broad pattern of conduct. It is reasonable to say that there is other illegal fruit of searches and other misconduct and illegal exemptions. The reports related to these challenges and exemptions are suppressed because they are a data mining product. Rather, what they’re doing is using circular reasoning; Engaging in illegal conduct; exempting disclosure; then saying that all information related to that illegal conduct is “not related” and forcing all people to state the facts based on personal knowledge. When this is done, they then go after the accuser for whist blowing. This is how they suppress information about the full range of illegal activity.

    If you get the real reports, you’ll see that the exemptions are not reasonable, the data is not actually related to bonafide exemptions, and the targets have no reasonable connection with unlawful activity or anything warranting review. Rather, they’re using their ignorance about reality as the basis to “justify” illegal conduct and widespread violations of the constitution. It is reasonable to infer that the conduct in one area is widespread; and that the excuses in FISA are also proffered across the spectrum. Most people will not know to question the reasonableness of an exception, especially when they are not given tall the information about a particular US citizen.

    As Gonzalez fatally admitted – the files are rather large; and no NSA person or contractor will review the entire file to ensure that the monitoring is actually connected to terrorism. They’re merely given in information to punch into a computer, adjust satellites orientation, or go along certain intercept paths in the sky.

    The problem they have is that they’re using the violations of the law as the basis to assign that information to an intelligence-exemption folder. This is a cover-up. In turn, any thing related to that illegally collected data is also assigned an exemption. This is how the data mining products are suppressed.

    Just as they assigned-created-fabricated exemptions to FISA after they get caught so too is this how they will likely assign an exemption to the data mining activities. If something is connected to a FISA-like exemption – however ridiculous it might be – then that product is also assigned an exemption. If they’ve violated the law – and assign an exemption of “intelligence” or “counter terrorism” then they’ll do the same on the reports, exemptions, and other information that would be provided to Congress. They will self-assign an exemption based on a non-sense designation; then used that designation to say, “We have reviewed this, Congress does not need to see it.”

    Each successive decision along the review is based on the false assertion that the American is [1] terror related; [2] a foreign agent; [3] a connected person; or [4] somehow under an exemption that qualifies as training. The goal of this is to self-report that the challenges to the data withholding are bonafide; and that the repots and exceptions do not need to see the light of day or get shared with Congress.


    Abused power: Appropriating funds for illegal things

    Remedy: Felony for Senator to appropriate funds for illegal things.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Suppression of information

    Problem: Abuse of classification to hide illegal conduct


    Page 90.10 : This is the exclusive remedy rule that gets ignored. As with FISA where FISA is the exclusive means –but ignored, so too is this ignored as the “exclusive” remedy. There are other ways; conversely, they deny this remedy on the assertion that there are others options. You have to ask, but if you ask questions you are accused of being a terrorist and then filed in the exemption file.


    Abused power: Statutes are narrowly then expansively interpreted; executive does not have this power.

    Remedy: Judicial and Legislative officers assigned to program office and Cabinet departments, impendent reporting, and full audit rights without notice.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Illegal activity

    Problem: Insufficient reviews by other branches


    Page 93.17 : “Prohibited reviews” This is a blanket excuse to not review a matter. They can put anything in here, self-designate. There are procedures to meet this standard, and the DoJ AG can give waivers at any time, or write new exemptions.


    Abused power: Senators appropriating funds for things not disclosed

    Remedy: Felony for Senators to appropriate funds for things they have not been told about in detail.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Meaningless reports from NSA and DoJ

    Problem: Illegal activity


    Page 94.01-04 : Requirements to submit a report are self-waived. They lied about the NSA activity; and didn’t’ provide reports; reasonable to expect them to violate the laws in other areas as they relate to other reports.

    Abused power: Failure of Senate to compel responses.

    Remedy: Felony for senators not to compel public responses to inaction

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

    Summary issue: Expansive Judiciary

    Problem: Illegal activity


    Page 98.20 : This recognizes the Deputy DoJ AG’s liaison with intelligence. He may assign anything to an exemption, even information about ongoing investigations related to unlawful abuse of power. Congress will never find out. This is a black hole.

    Abused power: Failure to comply with Constitution

    Remedy: Felony for Senators not to ensure conduct, programs, and activities are lawful.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Constitutional violations

    Problem: Appropriating funds for illegal activates

    Page 98.22 : “Other duties” assigned to the Deputy DoJ AG doesn’t narrow this assignment to legal things. Rather, the DoJ AG may classify anything as “legal” and then delegate that, even if it violates the law. “Other duties” – even if they are unconstitutional – can be linked to intelligence and counter-terrorism. This is a catchall to justify anything.

    Abused power: Illegally delegating broad powers not permitted.

    Remedy: Felony for Senators to write language giving Executive department power, right, or discretion to violate the Constitution. Must include express language imposing consequences on individual actors.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Mislabeling activities to hide illegal actions

    Problem: Illegal programs incorrectly called “terror” or “intelligence” related to avoid reporting to Congress


    Page 101.03 : This is the “counter terrorism” bucket where all illegal things are buried. If you can call it “counter terrorism” – even if it is not – DoJ AG will grant you an exception, and Congress will never see any reports on this.

    Abused power: Failure of Senators to ensure appropriations are for lawful things.

    Remedy: Felony on Senators for appropriating funds for illegal activities, especially when the activity is not reasonable related to “counter terrorism”

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: American citizens are paying to have rights violated and power abused.

    Problem: Illegal discretion to fund illegal things

    Page 102.07-18 : This section has been broadly interpreted. It relates to funding. DoJ AG assigns himself wide discretion on who reviews the funds, whether the NSA IG does or does not find out about this, or whether the DOJ IG can review the matter. They self-create new exemptions; they make programs and funds disappear in this section using the catchall on the exemptions. They first write new laws that are outside the law; and then assign a “counter terror” program POC to monitor that area. In no time, they have programs and funding going to illegal things, and they’ve convinced themselves that it’s the right thing to do: The actually believe their non-0sense. They believe that anything they do not understand is terror-related; and that any illegal act is something that is appropriate, and is exempt from Congressional review.

    Abused power: Insufficient constraints in language to prevent abuse of authority

    Remedy: Felony on senators who fail to ensure language expressly prohibits expenditures for illegal things

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: DoJ has misclassified activities, but getting little attention; would help if look at how they respond on known programs, then use this as a baseline to compare responses on “classified”.

    Problem: Failure to inquire into nature of program


    Page 102.23 : Congress should ask about the unclassified portions of the activity, and the reasons for the changes. Two questions; [1] - What is the range of unclassified funds in para (1) on page 102; and [2] - What types of activities are ~not~ classified. This will give you a sense of whether they have any non-classified programs; or whether everything – even stuff Congress thinks should be public – is classified. We judge all things that should be known – especially those related to illegal activity – have been unlawfully classified.

    Abused power: Appropriations for unlawful things

    Remedy: Felony on Senators for appropriation for unlawful activity

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill

    Summary issue: Civil rights

    Problem: NSA data illegally used for investigative leads and targeting Americans


    Page 105.01 : This is another terror-relate exemptions. Anything so-classified is exempt, even when it has no reasonable connection with any “anti-terror” investigation. They use this to hide illegal searches, pre-textual stops, and other JTTF information reports back and forth between JTTF and NSA related to investigative leads. These are deemed outside Brady; and investigators rely on “accidental findings” using this information during their investigative stops, or warrantless searches. Calling the activity to "protect against international terrorism" -- very wide in re NSA; also wide in re DoJ as a prosecutor’s ruse to avoid discovery.

    Abused power: Failure of Senate to narrow language

    Remedy: Felony on senators for appropriating funds for illegal things

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Senate fails to set a reasonable time limit

    Problem: Failure to set reasonable time limit on emergency

    Page 105.23 : The “Urgent” and “unique” designations are broadened. This is an exemption to hire a contractor to do something, and avoid Congressional access to government employees. This is the loophole for the wide commercial contract exceptions, to quickly get contracts to do things : The activity may become permanent, but remains as “urgent” and “unique.” How long does this “war on terror” going to last? No Congress knows why it has no information: Everything has been designated exempt; yet all that money is going on there, and no valid audits. That’s not impressive.

    Abused power: DoJ asserting non-delegated power of discretion to violate the law.

    Remedy: Felony for Senators to grant Executive powers outside Constitution.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Meaningless audits and reports to Congress

    Problem: Unresponsive executive on issues of Constitutional Violations

    Page 105.25 : One ruse is to assert that anything related to discovery, audits, or oversight is “impracticable. This is a very loosely applied term. This is the catchall phrase to
    permit contractors be hired under he "anti=terror" program, with full knowledge they’re being assigned to the many exceptions in violation of the law.

    If they can say that something is not practical -- like going to congress, following FISA, or the Constitution -- then this pretty much opens the floodgates on anything.

    Abused power: Appropriations for activities Executive does not explain

    Remedy: Felony for Senators to appropriate funds for illegal or non-explained programs.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Nuremberg preparations for civilian contractors

    Problem: War crimes by civilian contractors


    Page 106.05 : This is a reminder that Contractors are not employees, but still liable for war crimes, and illegally support of illegal use of military forces against American civilians. Contractors may not be employees, but they are still subject to the law; waivers to the law are not enforceable.

    Abused power: Appropriations for war crimes

    Remedy: Felony for Senator to appropriate funds for war crimes by civilians

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Senators craft language permitting war crimes

    Problem: War crimes


    Page 106.09 : “Any law” is a broad exception. Any law language has been
    stretched to permit President to do anything. Also, "may provide for" means that OSD can do what he likes; the key will be to convince others of this. This is why they continue to issue public news releases: It is to convince people that what they’re doing is terror related, when its not.

    Argument: Show this reasoning is flawed, illegal, and contractors cannot be immune; rather they are subject to war crimes given NSA is a combat-support tool directed at Americans.

    Abused power: Illegally delegating authority to commit war crimes

    Remedy: War crime for Senators to craft language permitting war crimes; and not removing themselves from the rebellion against the Constitution.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Shell game on illegal programs.

    Problem: First warnings of problems prompt program redesignation.

    Page 106.16 : The “successor program” designation is one that is part of a shell game. This means that when illegal activity occurs in one program, the non-discovered aspects are slid into a “new program”. This allows illegal activity discovered in one program to get slid into something else without congress knowing about it.

    Abused power: Failure to investigate and follow-up.

    Remedy: Bounties for reporting illegal conduct. Congressional and state notification on program redesignation, manning reassignments. Senators face persona liability for failing to investigate, or suppressing information related to indicators of illegal activity.

    * * *


    Taming the Senate: Remedies to abused Senate powers identified in Senate Bill


    Summary issue: Consolidation of abused power at lowest levels of government.

    Problem: NSA and DoJ program mangers running illegal activities have too much discretion. NSA IG does not have enough visibility.

    Page 114.19 : “Multi year intelligence program” can mean anything. DoJ AG can self assign any activity as “intelligence” then have funds obligated, expended without Congressional oversight.

    Abused power: Failure of checks and balances

    Remedy: Program shall be tri-led by three program managers, all with different reporting responsibilities. Program teams will have auditors assigned to the team, and be regularly cycled through to avoid familiarity. Congressional liaison will be on the program team, they will have a separate reporting channel. They will monitor the day to day activities, and all notes will be owned by Congress. They cannot be destroyed. Bounties will be provided to those who provide information on secret meetings.