The US Justice department has built a Legal case for felicitating the attack on persons.organisations out side the US by US forces.
Khaled Abdullah / Reuters file Tribesmen examine the rubble of a building in southeastern Yemen where American teenager Abdulrahmen al-Awlaki and six suspected al-Qaida militants were killed in a U.S. drone strike on Oct. 14, 2011. Al-Awlaki, 16, was the son of Anwar al-Awlaki, who died in a similar strike two weeks earlier.
A confidential Justice Department memo concludes that the U.S. government can order the killing of American citizens if they are believed to be “senior operational leaders” of al-Qaida or “an associated force” — even if there is no intelligence indicating they are engaged in an active plot to attack the U.S…(open channel)
The 16-page memo, a copy of which was obtained by NBC News, provides new details about the legal reasoning behind one of the Obama administration’s most secretive and controversial polices: its dramatically increased use of drone strikes against al-Qaida suspects abroad, including those aimed at American citizens, such as the September 2011 strike in Yemen that killed alleged al-Qaida operatives Anwar al-Awlaki and Samir Khan. Both were U.S. citizens who had never been indicted by the U.S. government nor charged with any crimes.
The pornography recovered in bin Laden’s compound in Abbottabad,Pakistan, consists of modern, electronically recorded video and is fairly extensive, according to the officials, who discussed the discovery with Reuters on condition of anonymity.
The officials said they were not yet sure precisely where in the compound the pornography was discovered or who had been viewing it. Specifically, the officials said they did not know if bin Laden himself had acquired or viewed the materials.
Reports from Abbottabad have said that bin Laden’s compound was cut off from the Internet or other hard-wired communications networks. It is unclear how compound residents would have acquired the pornography.
But a video released by the Obama administration confiscated from the compound showed bin Laden watching pictures of himself on a TV screen, indicating that the compound was equipped with video playback equipment.
Related:
In a 2002 “letter to the American people,” Bin Laden denounced American culture for its exploitation of women’s bodies in dress, advertising and popular culture.
“Your nation exploits women like consumer products or advertising tools, calling upon customers to purchase them,” he wrote. “You plaster your naked daughters across billboards in order to sell a product without any shame. You have brainwashed your daughters into believing they are liberated by wearing revealing clothes, yet in reality all they have liberated is your sexual desire.”
A team of intelligence analysts under the C.I.A.’s direction has been working to review the material seized from Bin Laden’s house in Abbottabad, Pakistan, by the Navy Seal team that killed him. Officials have said the material shows that Bin Laden was making notes about new ways to attack the United States and sending instructions by courier to subordinates and Qaeda affiliates.
The Obama administration expects the scheme to generally make Internet security better for millions of Americans and to, coincidentally, take away the need for users to memorise login details, passwords, etc, for online use. The measure is being drafted as the National Strategy for Trusted Identities in Cyberspace, which is expected to be in project stage at the Department of Commerce shortly.
‘The Identity Ecosystem will provide more security for consumers; it will also provide better privacy protections. Today, a vast amount of information about consumers is collected as they surf the Internet and conduct transactions. How organizations handle that information can vary greatly, and more often than not, it is difficult for consumers to understand how their privacy will (or will not) be protected. The NSTIC seeks to drive the development of privacy-enhancing policies as well as innovative privacy-enhancing technologies to ensure that the ecosystem provides strong privacy protections for consumers.
The NSTIC outlines a private-sector led effort, facilitated by government, to develop the technologies, standards and policies necessary to create the Identity Ecosystem and to enable a self-sustaining market of many different credential providers. The Identity Ecosystem will be built to provide more security and privacy to consumers, while also spurring economic growth by helping businesses move more services online.’
You must be logged in to post a comment.