Implements an image recognition captcha.

"; break; case 'admin/modules#description': case 'admin/modules/textimage': case 'admin/textimage': $output = t('Implements an image recognition captcha.'); break; } return $output; } function textimage_captchachallenge(&$form) { $form['captcha_response'] = array ( '#type' => 'textfield', '#title' => t('Captcha Validation'), '#default_value' => '', '#required' => TRUE, '#validate' => array('_captcha_validate' => array()), '#description' => t('Please type in the letters/numbers that are shown in the image above.'), '#prefix' => 'Captcha Image: you will need to recognize the text in it.', ); return $form; } function textimage_captchavalidate(&$captcha_word, &$correct) { $captcha_word = drupal_strtolower($captcha_word); if (($_SESSION['captcha'] != '') && $captcha_word == $_SESSION['captcha']) { $correct = true; } else { $correct = false; form_set_error('captcha_response', t('The image verification code you entered is incorrect.')); } } /** * Implementation of hook_menu(). */ function textimage_menu($may_cache) { $items = array(); $suffix = ''; if (arg(2)!=null) $suffix='/'.arg(2); $items[] = array( 'path' => '_textimage/image'.$suffix, 'title' => t('textimage'), 'callback' => '_textimage_image', 'access' => user_access('access textimages'), 'type' => MENU_CALLBACK ); return $items; } function textimage_perm() { return array('access textimages'); } function textimage_settings() { $fonts_path = variable_get("textimage_fonts_path", ""); $images_path = variable_get("textimage_images_path", ""); //check for GD if (!function_exists(imagecreate)) drupal_set_message(t('Image library not available. Textimage needs the GD library extension to be installed. Please install GD.')); //check for TTF support elseif (!function_exists(imagettftext)) drupal_set_message(t('Your image library does not seem to have TrueType font support. Textimage will work, but will use the default inbuilt font.'),'status'); //check for valid font path elseif ($fonts_path!="" && !is_dir($fonts_path)) drupal_set_message(t('The current font path is invalid. The default font will be used.')); //check for valid image path if ($images_path!="" && !is_dir($images_path)) drupal_set_message(t('The current images path is invalid. No images will be used.')); //Fonts settings $form['fonts'] = array( '#type' => 'fieldset', '#title' => t('Fonts settings'), '#collapsible' => TRUE, '#collapsed' => FALSE ); $form['fonts']['textimage_use_only_upper'] = array( '#type' => 'checkbox', '#title' => t('Use only Uppercase'), '#default_value' => variable_get('textimage_use_only_upper',0) ); $form['fonts']['textimage_fonts_path'] = array( '#type' => 'textfield', '#title' => t('TrueType Fonts Path'), '#default_value' => $fonts_path, '#size' => 30, '#maxlength' => 255, '#description' => t('Location of the directory where the Truetype (.ttf) fonts are stored. If you do not provide any fonts, the module will use the default font for text. Relative paths will be resolved relative to the Drupal installation directory.'), ); $form['fonts']['textimage_font_size'] = array( '#type' => 'textfield', '#title' => t('Font Size'), '#default_value' => variable_get('textimage_font_size',24), '#size' => 5, '#maxlength' => 2, '#description' => t('Font size of Captcha text (in pixels).'), '#validate' => array("_textimage_number_validate" => array("textimage_font_size")), ); $form['fonts']['textimage_char_spacing_max'] = array( '#type' => 'textfield', '#title' => t('Character Spacing'), '#default_value' => variable_get('textimage_char_spacing_max',10), '#size' => 5, '#maxlength' => 4, '#description' => t('Sets the kerning between letters in Captcha. Higher numbers indicate more spacing.'), '#validate' => array("_textimage_number_validate" => array("textimage_char_spacing_max")), ); $form['fonts']['textimage_char_jiggle_amount'] = array( '#type' => 'textfield', '#title' => t('Character Jiggle'), '#default_value' => variable_get('textimage_char_jiggle_amount',5), '#size' => 5, '#maxlength' => 2, '#description' => t('Sets the amount of up and down movement in the Captcha letters. Higher numbers indicate more jiggling.'), '#validate' => array("_textimage_number_validate" => array("textimage_char_jiggle_amount")), ); $form['fonts']['textimage_char_rotate_amount'] = array( '#type' => 'textfield', '#title' => t('Character Rotation'), '#default_value' => variable_get('textimage_char_rotate_amount',5), '#size' => 5, '#maxlength' => 2, '#description' => t('Sets the amount of rotation in the Captcha letters (in degrees, only works with non-default fonts).'), '#validate' => array("_textimage_number_validate" => array("textimage_char_rotate_amount")), ); $form['fonts']['textimage_char_size_amount'] = array( '#type' => 'textfield', '#title' => t('Character Size Adjustment'), '#default_value' => variable_get('textimage_char_size_amount',2), '#size' => 5, '#maxlength' => 2, '#description' => t('Sets the amount of variation in size between the different letters in the Captcha (in pixels).'), '#validate' => array("_textimage_number_validate" => array("textimage_char_size_amount")), ); //Image settings $form['images'] = array( '#type' => 'fieldset', '#title' => t('Image settings'), '#collapsible' => TRUE, '#collapsed' => FALSE ); $form['images']['textimage_images_path'] = array( '#type' => 'textfield', '#title' => t('Background Images Path'), '#default_value' => $images_path, '#size' => 30, '#maxlength' => 255, '#description' => t('Location of the directory where the background images are stored. If you do not provide a directory, solid colors will be used. Relative paths will be resolved relative to the Drupal installation directory.'), ); $form['images']['textimage_image_noise'] = array( '#type' => 'textfield', '#title' => t('Image Noise (pixels)'), '#default_value' => variable_get('textimage_image_noise',4), '#size' => 5, '#maxlength' => 4, '#description' => t('Sets the amount of noise (random pixels) in the Captcha image. Higher numbers indicate more noise.'), '#validate' => array("_textimage_number_validate" => array("textimage_image_noise")), ); $form['images']['textimage_image_lines'] = array( '#type' => 'textfield', '#title' => t('Image Noise (lines)'), '#default_value' => variable_get('textimage_image_lines',4), '#size' => 5, '#maxlength' => 4, '#description' => t('Sets the amount of noise (random lines) in the Captcha image. Higher numbers indicate more noise.'), '#validate' => array("_textimage_number_validate" => array("textimage_image_lines")), ); $form['images']['textimage_image_margin'] = array( '#type' => 'textfield', '#title' => t('Image Margin'), '#default_value' => variable_get('textimage_image_margin',10), '#size' => 5, '#maxlength' => 4, '#description' => t('Set a distance between the Captcha letters and the edges of the image.'), '#validate' => array("_textimage_number_validate" => array("textimage_image_margin")), ); $form['info'] = array( '#type' => 'fieldset', '#title' => t('Image and font information'), '#collapsible' => TRUE, '#collapsed' => FALSE ); if (isset($fonts_path)) { $imagefontinfo .= t('Number of fonts found: ').count(_textimage_font_list()); } if (isset($images_path)) { $imagefontinfo .= '
'.t('Number of background images found: ').count(_textimage_image_list()); } $gdinfo = gd_info(); $imagefontinfo .= '
'.t('GD Version: ').$gdinfo["GD Version"]; $imagefontinfo .= '
'.t(' FreeType Support: '); $imagefontinfo .= ($gdinfo["FreeType Support"]==true) ? 'True' : 'False'; $imagefontinfo .= '
'; $form['info']['captcha_info'] = array ( '#type' => 'item', '#value' => $imagefontinfo, ); return $form; } function textimage_settings_form_validate ($form_id,$form) { //check for valid font path if ($form['textimage_fonts_path'] !="" && !is_dir($form['textimage_fonts_path'])) form_set_error('textimage_fonts_path', t('The entered font path is invalid')); //check for valid image path if ($form['textimage_images_path'] !="" && !is_dir($form['textimage_images_path'])) form_set_error('textimage_images_path', t('The entered image path is invalid')); } function _textimage_number_validate ($field,$fieldName) { if (!is_numeric($field['#value'])) { form_set_error($fieldName,t("The value for")." ".t($field['#title'])." ".t("must be a number")); } } /** * Prints an image containing a textimage code. */ function _textimage_image() { //if we don't have GD2 functions, we can't generate the image if (!function_exists('imagecreatetruecolor')) return; // Set headers header('Expires: Mon, 01 Jan 1997 05:00:00 GMT'); header('Cache-Control: no-store, no-cache, must-revalidate'); header('Cache-Control: post-check=0, pre-check=0', false); header('Pragma: no-cache'); header('Content-type: image/png'); $string = _textimage_code(); // Get truetype font list $fonts = _textimage_font_list(); // Get the background images list $images = _textimage_image_list(); // Randomization amounts: $charSpacingMax = variable_get('textimage_char_spacing_max',10); // Letter spacing max (pixels) $charSpacingMin = max($charSpacingMax*.5,0); // Letter spacing minimum (pixels) $charJiggleAmount = variable_get('textimage_char_jiggle_amount',5); // Up and down randomization (pixels) $charRotateAmount = variable_get('textimage_char_rotate_amount',5); // Character rotation amount (degrees) $charSizeAmount = variable_get('textimage_char_size_amount',2); // Character size amount (pixels) $imageRotateAmount = variable_get('captcha_image_rotate_amount',12); // Image rotation amount (degrees) // Static amounts: $charInitialSize = variable_get('textimage_font_size',24); // Initial Font $imageNoise = variable_get('textimage_image_noise',4); // Amount of noise added to image $imageLines = variable_get('textimage_image_lines',4); // Amount of noise added to image $imageMargin = variable_get('textimage_image_margin',10); // Margin around image (pixels) // write text using a truetype font if (function_exists(imagettftext) && count($fonts) > 0) { // Initialize variables for the loop $characterDetails = array(); // contains the final info about each character // Build a list of character settings for the captcha string for ($i=0;$i $charSize, "angle" => $charAngle, "x" => $x, "y" => $y, "color" => $foreground, "font" => $font, "char" => $char ); // Increment the image size $imageWidth = $x + $charWidth; $imageHeight = max($imageHeight,$y+$charJiggleAmount); } // Create the image based off the string length and margin if (count($images) > 0) { // We're going to be using an image, and need a tranparent background to start with $im = _textimage_create_transparent_image($imageWidth+2*$imageMargin, $imageHeight+2*$imageMargin); $noisecolor = imagecolorallocatealpha($im, 0, 0, 0, 127); } else { // Just make a plain-jane color brackground $im = imagecreatetruecolor($imageWidth+2*$imageMargin, $imageHeight+2*$imageMargin); $background = imagecolorallocate($im, rand(180, 250), rand(180, 250), rand(180, 250)); $noisecolor = $background; imagefill($im, 0, 0, $background); } // Specify colors to be used in the image $foreground = imagecolorallocate($im, rand(0, 80), rand(0, 80), rand(0, 80)); foreach($characterDetails as $char) { // draw character imagettftext($im,$char['size'],$char['angle'],$char['x']+$imageMargin,$char['y']+$imageMargin,$foreground,$char['font'],$char['char']); } } else { // write text using a built-in font $x = 0; $y = 0; $imageWidth = 60 + drupal_strlen($string)*$charSpacingMax*.35; $imageHeight = 30 + $charJiggleAmount; // Create the image if (count($images) > 0 && function_exists(imagecolorallocatealpha)) { // We're going to be using an image, and need a tranparent background to start with $im = _textimage_create_transparent_image($imageWidth, $imageHeight); $noisecolor = imagecolorallocatealpha($im, 0, 0, 0, 127); } else { // Just make a plain-jane color brackground $im = imagecreatetruecolor($imageWidth, $imageHeight); $background = imagecolorallocate($im, rand(180, 250), rand(180, 250), rand(180, 250)); $noisecolor = $background; imagefill($im, 0, 0, $background); } // Add the text for ($i=0;$i 0) { // Prepare a larger image with a background image $im2 = _textimage_create_transparent_image($imageWidth, $imageHeight); } else { // Prepare a larger image with a solid color $im2 = imagecreatetruecolor($imageWidth, $imageHeight); imagefill($im2, 0, 0, $background); } $result = imagecopyresampled ($im2, $im, $imageMargin, $imageMargin, 0, 0, $imageWidth, $imageHeight, imagesx($im), imagesy($im)); $im = $im2; } // strikethrough imageline($im, rand(0, 120), rand(0, 120), rand(0, 120), rand(0, 120), $foreground); // Add Noise for ($x=0; $x<$imageWidth; $x++) { for ($row=0; $row<$imageNoise;$row++) { $y = rand(0,$imageHeight); imagesetpixel($im, $x, $y, $noisecolor); } } // Add Lines and Ellipses for ($x=0; $x<$imageLines;$x++) { imageline($im, rand(0, $imageWidth), rand(0, $imageHeight), rand(0, $imageWidth), rand(0, $imageHeight), $noisecolor); imageellipse($im, rand(0, $imageWidth), rand(0, $imageHeight), rand(0, $imageWidth), rand(0, $imageHeight), $noisecolor); } // Fill image with a random background image if available if (count($images) > 0) { $image = $images[rand(0,count($images)-1)]; _textimage_apply_background_image($im,$image); } //output to browser imagepng($im); imagedestroy($im); } /** * Returns a random string for use in a captcha */ function _textimage_code() { $consts='bcdgjxvmnprst'; $vowels='aeiou'; for ($x=0; $x < 6; $x++) { mt_srand ((double) microtime() * 1000000); $const[$x] = drupal_substr($consts,mt_rand(0,drupal_strlen($consts)-1),1); $vow[$x] = drupal_substr($vowels,mt_rand(0,drupal_strlen($vowels)-1),1); } $string = $const[0] . $vow[0] .$const[2] . $const[1] . $vow[1] . $const[3] . $vow[3] . $const[4]; $string = drupal_substr($string,0,rand(4,6)); //everytime we create a new code, we write it to session $_SESSION['captcha'] = drupal_strtolower($string); if(variable_get('textimage_use_only_upper',0)) $string = drupal_strtoupper($string); return $string; } /** * Returns an array of files with TTF extensions in the specified directory. */ function _textimage_font_list() { $fontdir = variable_get("textimage_fonts_path", ""); $filelist = array(); if (is_dir($fontdir) && $handle = opendir($fontdir)) { while ($file = readdir($handle)) { if (preg_match("/\.ttf$/i",$file) == 1) $filelist[] = $fontdir.'/'.$file; } closedir($handle); } return $filelist; } /** * Returns an array of files with jpg, png, and gif extensions in the specified directory. */ function _textimage_image_list() { $imagesdir = variable_get("textimage_images_path", ""); $filelist = array(); if (is_dir($imagesdir) && $handle = opendir($imagesdir)) { while ($file = readdir($handle)) { if (preg_match("/\.gif|\.png|\.jpg$/i",$file) == 1) $filelist[] = $imagesdir.'/'.$file; } closedir($handle); } return $filelist; } /** * Overlays an image to the supplied image resource */ function _textimage_apply_background_image (&$imageResource,$imageFile) { $backgroundResource = image_gd_open($imageFile,substr($imageFile,-3)); // Copy the text onto the background $backX = imagesx($backgroundResource); $backY = imagesy($backgroundResource); $textX = imagesx($imageResource); $textY = imagesy($imageResource); $randomBackX = rand(0,$backX-$textX); $randomBackY = rand(0,$backY-$textY); // Place the text onto a random location of the background image imagecopyresampled($backgroundResource,$imageResource,$randomBackX,$randomBackY,0,0,$textX,$textY,$textX,$textY); // Crop the background image to the original image size imagecopyresampled($imageResource,$backgroundResource,0,0,$randomBackX,$randomBackY,$textX,$textY,$textX,$textY); } /** * Creates transparent image resources for images with graphic backgrounds */ function _textimage_create_transparent_image($x, $y) { $i = imagecreatetruecolor($x, $y); $b = imagecreatefromstring(base64_decode(_text_image_blankpng())); imagealphablending($i, false); imagesavealpha($i, true); imagecopyresized($i, $b ,0 ,0 ,0 ,0 ,$x, $y, imagesx($b), imagesy($b)); return $i; } function _text_image_blankpng() { $c = "iVBORw0KGgoAAAANSUhEUgAAACgAAAAoCAYAAACM/rhtAAAABGdBTUEAAK/INwWK6QAAABl0RVh0U29m"; $c .= "dHdhcmUAQWRvYmUgSW1hZ2VSZWFkeXHJZTwAAADqSURBVHjaYvz//z/DYAYAAcTEMMgBQAANegcCBNCg"; $c .= "dyBAAA16BwIE0KB3IEAADXoHAgTQoHcgQAANegcCBNCgdyBAAA16BwIE0KB3IEAADXoHAgTQoHcgQAAN"; $c .= "egcCBNCgdyBAAA16BwIE0KB3IEAADXoHAgTQoHcgQAANegcCBNCgdyBAAA16BwIE0KB3IEAADXoHAgTQ"; $c .= "oHcgQAANegcCBNCgdyBAAA16BwIE0KB3IEAADXoHAgTQoHcgQAANegcCBNCgdyBAAA16BwIE0KB3IEAA"; $c .= "DXoHAgTQoHcgQAANegcCBNCgdyBAgAEAMpcDTTQWJVEAAAAASUVORK5CYII="; return $c; } ?> Tallahassee Network for Justice & Peace - Scandals Political Scandals en Stop Watching US <p><A href="" target="_blank"><img src=""></A></p> <p><A href="" target="_blank">StopWatching.Us - Sign TODAY!</A></p> <p>The revelations about the National Security Agency's surveillance apparatus, if true, represent a stunning abuse of our basic rights. We demand the U.S. Congress reveal the full extent of the NSA's spying programs!</p> <p><a href="">read more</a></p> Activism Civil Liberties Fascism USA National Protests Police State Politics Scandals Spying Mon, 01 Jul 2013 21:03:00 -0400 tnjp 451 at IRS Scandal Shakes Constitutional Freedoms <p><A href="" target="_blank">This Isn’t the First Time the IRS has Targeted Specific Groups</A><br /> by <A href="" target="_blank">Rainforest Action Network</A><br /> May 17, 2013<br /> Written by <A href="" target="_blank">Melanie Gleason</A></p> <p>At first glance, it may seem like another annoying addition to the scandal du jour list: Tuesday, Attorney General Eric Holder acknowledged that the Justice Department and FBI <A href="" target="_blank">began a criminal investigation</A> on whether Internal Revenue Service (IRS) employees broke the law when they targeted conservative groups seeking tax-exempt status–using search terms such as “tea party” and “patriot.”</p> <p>However, what may initially appear as a political party tit for tat goes much deeper–in that the IRS has long been a vehicle of political retribution (with politics depending on what administration is currently seated in power)–and perhaps most disconcerting of all: tossing the constitutionally guaranteed equal protection clause right out the window.</p> <p>The recurrent theme of <A href="" target="_blank">governmental power targeting marginalized political communities</A> has been a consistent, abysmal tradition dating back to the FDR administration. The administration admitted using inflated charges of tax evasion on political targets such as former Louisiana governor and senator Huey Long. And the <A href="">tactic of wielding the IRS’ fiery wrath</A> is an equal opportunity strategy for both sides of the aisle: under the Nixon administration, the IRS created the Special Services Staff (SSS) to look into thousands of perceived political enemies–including reporters who wrote critical stories of Nixon, such as Newsday’s Robert Greene, and civil rights organizations like the NAACP.</p> <p><a href="">read more</a></p> Civil Rights Fascism USA Politics Scandals Sat, 18 May 2013 17:55:00 -0400 tnjp 441 at DoJ Spying On AP Reporters <p><A HREF="" TARGET="_blank">Monitoring of AP Phones a "Terrifying" Step in State Assault on Press Freedom</A></p> <p><iframe width="600" height="337" src="" frameborder="0"></iframe><br /> Pulitzer Prize-winning journalist Chris Hedges joins us to discuss what could mark the most significant government intrusion on freedom of the press in decades. The Justice Department has acknowledged <A HREF="" TARGET="_blank">seizing the work, home and cellphone records used by almost 100 reporters and editors at the Associated Press</A>. The phones targeted included the general AP office numbers in New York City, Washington, D.C., and Hartford, Connecticut, and the main number for the AP in the House of Representatives press gallery.</p> <p><a href="">read more</a></p> Fascism USA Police State Politics Scandals Spying Video Thu, 16 May 2013 14:18:00 -0400 tnjp 438 at WikiLeaks and Free Speech <p><A href="" target="_blank">WikiLeaks and Free Speech</A><br /> By MICHAEL MOORE and OLIVER STONE<br /> Published: August 20, 2012</p> <p>WE have spent our careers as filmmakers making the case that the news media in the United States often fail to inform Americans about the uglier actions of our own government. We therefore have been deeply grateful for the accomplishments of WikiLeaks, and applaud Ecuador’s decision to grant diplomatic asylum to its founder, Julian Assange, who is now living in the Ecuadorean Embassy in London.</p> <p>Ecuador has acted in accordance with important principles of international human rights. Indeed, nothing could demonstrate the appropriateness of Ecuador’s action more than the British government’s threat to violate a sacrosanct principle of diplomatic relations and invade the embassy to arrest Mr. Assange.</p> <p>Since WikiLeaks’ founding, it has revealed the “Collateral Murder” footage that shows the seemingly indiscriminate killing of Baghdad civilians by a United States Apache attack helicopter; further fine-grained detail about the true face of the Iraq and Afghanistan wars; United States collusion with Yemen’s dictatorship to conceal our responsibility for bombing strikes there; the Obama administration’s pressure on other nations not to prosecute Bush-era officials for torture; and much more...</p> <p><a href="">read more</a></p> Civil Liberties Fascism USA Politics Scandals Wikileaks Sun, 02 Sep 2012 14:28:19 -0400 tnjp 413 at Torturer-in-Chief George W Bush <p><A href=";id=5447&amp;news_iv_ctrl=1281" target="_blank"><IMG src="" title="Indict Bush NOW!"></A><br /> <A href="" target="_blank">George W. Bush: Torturer-in-Chief</A><br /> David Cole<br /> November 10, 2010<br /> In an uncoerced confession in his new memoir, Decision Points, former President George W. Bush proudly admits that he personally signed off on the waterboarding of Khalid Shaikh Mohammed in 2003. Former Vice President Dick Cheney made the same admission in a televised interview shortly before he left office. In one sense, this is nothing new. It had long been reported that the CIA's use of what the Bush administration euphemistically called "enhanced interrogation techniques" had been approved at the highest levels of the administration. But now both Bush and Cheney have publicly admitted to specifically signing off on the CIA's torture tactics. Their direct personal admissions now seal the case against them.</p> <p>What case, you might ask? There is in fact no criminal or civil case against the former president or vice president for these actions. And both men no doubt felt comfortable admitting they had authorized what the world recognizes as torture because they believe they are politically immune from being held accountable. Even before the midterm elections, Barack Obama had insisted that he wanted only to look forward, not backward. With a strengthened Republican Party after the elections, it is even less likely that Bush or Cheney will be held accountable by the Obama administration. On November 9 the Justice Department announced that <A href="" target="_blank">no criminal charges would be brought against the CIA agents who destroyed videotapes</A> of the torture interrogations; that part of the cover-up, it seems, has succeeded...</p> <p><a href="">read more</a></p> Dick Cheney Fascism USA George Bush Human Rights Obama Politics Scandals Torture Fri, 12 Nov 2010 13:57:10 -0500 tnjp 397 at WikiLeaks Iraq War Logs Media Coverage Round-up <p><a href="">Wikileaks</a></p> <p><a href="" target="_blank">Full coverage of the Iraq war logs - Guardian UK</a><br /> <A href="" target="_blank">The Iraq War Logs - Bureau of Investigative Journalism</A><br /> <a href="" target="_blank">The War Logs - NY Times</a><br /> <a href="" target="_blank">Iraq War Logs - SPIEGEL ONLINE - Nachrichten</a><br /> <A href="" target="_blank">The Secret Iraq Files - Al Jazeera</A><br /> <BR></p> <p><B>The Iraq War Logs</B></p> <p><A href="" target="_blank">Biggest Document Leak in History Exposes Real War</A></p> <p><a href="">US troops fail to record civilian deaths in one of Iraq’s biggest battles</a></p> <p><a href="">Allegations of prisoner abuse by US troops after Abu Ghraib</a></p> <p><a href="">Hundreds of civilians gunned down at checkpoints</a></p> <p><a href="">Iraq’s bloodiest month: December 2006</a></p> <p><a href="">15,000 new civilian deaths uncovered in leaked files</a></p> <p><a href="">Syrian intelligence agents linked to al Qaeda in Iraq</a><br /> <BR><br /> <B>Guardian UK</B></p> <p><a href="">Iraq war logs: secret files show how US ignored torture</a></p> <p><a href="">Iraq war logs: US turned over captives to Iraqi torture squads</a></p> <p><a href="">Iraq war logs: Operation Steel Curtain and its 25 ignored civilian casualties</a></p> <p><a href="">Iraq war logs: Battle for Samarra killed dozens of innocent people</a></p> <p><a href="">Iraq war logs: UN calls on Obama to investigate human rights abuses</a></p> <p><a href="">Iraq war logs: Apache crew killed insurgents who tried to surrender</a><br /> <BR><br /> <B>NY Times</B></p> <p><a href="">The Iraq Archive: The Strands of a War - WikiLeaks Documents</a>... More below the fold</p> <p><a href="">read more</a></p> Human Rights Iraq Militarism Obama Politics Scandals Torture Wikileaks Mon, 25 Oct 2010 12:42:00 -0400 tnjp 391 at US Turned Blind Eye to Torture - Iraq War Logs <p><object width="680" height="410" ><br /> <param name="movie" value="" ></param> <param name="allowFullScreen" value="true"></param> <param name="allowscriptaccess" value="always"></param><embed src ="" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="680" height="410"></embed></object><br /> <A HREF="" TARGET="_blank">US turned blind eye to torture</A><br /> Leaked documents on Iraq war contain thousands of allegations of abuse, but a Pentagon order told troops to ignore them.<br /> Gregg Carlstrom Last Modified: 24 Oct 2010 15:31 GMT<br /> An alleged militant identified only as "DAT 326" was detained by the Iraqi army on July 7, 2006 at a checkpoint in the town of Tarmiya, north of Baghdad. When US forces interrogated him later that night, he described hours of brutal abuse at the hands of the Iraqi soldiers, an allegation apparently backed by the findings of a medical exam.<br /> <BLOCKQUOTE>DAT 326 states he was told to lay down on his stomach with his hands behind his back, which is when the Iraqi soldiers allegedly stepped, jumped, urinated and spit on him.</p> <p> […] DAT 326 was evaluated and treated for his injuries at Cobra Clinic. Injuries include blurred vision, diminished hearing in left ear, bleeding in ears, bruising on forehead, neck, chest, back, shoulders, arms, hands, and thighs, cuts over the left eye and on the upper and lower lips, hemorrhaging eyes, blood in nasal cavities, and swollen hands/wrists.</BLOCKQUOTE><br /> Since the alleged torture was committed by Iraqi forces, the US quickly dropped the case: "Due to no allegation or evidence of US involvement, a US investigation is not being initiated," the report said.</p> <p>A review of the leaked documents reveals more than 1,000 allegations of abuse committed by Iraqi security forces. Not all of them are credible, as some detainees showed no physical evidence of abuse, while others changed their stories during multiple interrogations.</p> <p>But hundreds of them – like "DAT 326" – are supported by medical evidence and other corroboration. Those reports demonstrate a clear pattern of abuse and torture in Iraqi jails, one that a high-level Pentagon directive barred US forces from investigating.</p> <p><B>"Only an initial report will be made"</B></p> <p>The instruction not to investigate was handed down in fragmentary order (FRAGO) 242, first mentioned in a report filed on May 16, 2005...</p> <p><a href="">read more</a></p> Human Rights Iraq Militarism Scandals Torture Sun, 24 Oct 2010 23:00:40 -0400 tnjp 387 at Biggest Document Leak in History Exposes Real Iraq War <p><object width="450" height="275"><br /> <param name="allowfullscreen" value="true" /> <param name="allowscriptaccess" value="always" /> <param name="movie" value=";;show_title=0&amp;show_byline=0&amp;show_portrait=1&amp;color=&amp;fullscreen=1&amp;autoplay=0&amp;loop=0" /><embed src=";;show_title=0&amp;show_byline=0&amp;show_portrait=1&amp;color=&amp;fullscreen=1&amp;autoplay=0&amp;loop=0" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="450" height="275"></embed></object><br /> IN VIDEO: <A HREF="" TARGET="_blank">the biggest document leak in history exposes real war</A><br /> October 21st, 2010 by Rachel Oldroyd</p> <p>Twelve weeks ago the <A HREF="" TARGET="_blank">Bureau of Investigative Journalism</A> was given access to the biggest leak of military documents in history.</p> <p>These documents formed a database of nearly 400,000 military logs recorded over six years of the Iraq war and covering the years 2004 to 2009.</p> <p>There are over 37 million words used to recount military significant actions that took place across the entire country. This material provides an unrivalled portrait of one of the most controversial wars of the modern age.</p> <p>For the first time the files reveal just how much the American military detailed the escalating violence in Iraq, and how this contrasts markedly to what the politicians said in public. This is the story behind the pronouncements – the uncensored detail Washington did not want us to know...</p> <p><a href="">read more</a></p> Iraq Militarism Scandals Video Fri, 22 Oct 2010 20:39:00 -0400 tnjp 388 at It Was Oil, All Along <p><object type="application/x-shockwave-flash" data=";feedurl=http%3A%2F%2Ftruthout%2Eblip%2Etv%2Frss%2Fflash&amp;file=http%3A%2F%2Fblip%2Etv%2Frss%2Fflash%2F1038072%3Freferrer%3Dhttp%3A%2F%2Fwww%2Etruthout%2Eorg%2Fvideo%2Fbill%2Dmoyers%2Dit%2Dwas%2Doil%2Dall%2Dalong%26source%3D3&amp;brandlink=http%3A%2F%2Fblip%2Etv%2F%3Futm%5Fsource%3Dbrandlink&amp;brandname=blip%2Etv&amp;showguidebutton=false&amp;showplayerpath=http%3A%2F%2Fblip%2Etv%2Fscripts%2Fflash%2Fshowplayer%2Eswf" width="400" height="255" allowfullscreen="true" id="showplayer"><br /> <param name="movie" value=";feedurl=http%3A%2F%2Ftruthout%2Eblip%2Etv%2Frss%2Fflash&amp;file=http%3A%2F%2Fblip%2Etv%2Frss%2Fflash%2F1038072%3Freferrer%3Dhttp%3A%2F%2Fwww%2Etruthout%2Eorg%2Fvideo%2Fbill%2Dmoyers%2Dit%2Dwas%2Doil%2Dall%2Dalong%26source%3D3&amp;brandlink=http%3A%2F%2Fblip%2Etv%2F%3Futm%5Fsource%3Dbrandlink&amp;brandname=blip%2Etv&amp;showguidebutton=false&amp;showplayerpath=http%3A%2F%2Fblip%2Etv%2Fscripts%2Fflash%2Fshowplayer%2Eswf" /> <param name="quality" value="best" /><embed src=";feedurl=http%3A%2F%2Ftruthout%2Eblip%2Etv%2Frss%2Fflash&amp;file=http%3A%2F%2Fblip%2Etv%2Frss%2Fflash%2F1038072%3Freferrer%3Dhttp%3A%2F%2Fwww%2Etruthout%2Eorg%2Fvideo%2Fbill%2Dmoyers%2Dit%2Dwas%2Doil%2Dall%2Dalong%26source%3D3&amp;brandlink=http%3A%2F%2Fblip%2Etv%2F%3Futm%5Fsource%3Dbrandlink&amp;brandname=blip%2Etv&amp;showguidebutton=false&amp;showplayerpath=http%3A%2F%2Fblip%2Etv%2Fscripts%2Fflash%2Fshowplayer%2Eswf" quality="best" width="400" height="255" name="showplayer" type="application/x-shockwave-flash"></embed></object><BLOCKQUOTE><A HREF="" TARGET="_blank">It Was Oil, All Along</A><br /> June 28, 2008<br /> By Bill Moyers and Michael Winship</p> <p>Oh, no, they told us, Iraq isn't a war about oil. That's cynical and simplistic, they said. It's about terror and al Qaeda and toppling a dictator and spreading democracy and protecting ourselves from weapons of mass destruction. But one by one, these concocted rationales went up in smoke, fire, and ashes. And now the bottom line turns out to be....the bottom line. It is about oil.</p> <p><a href="">read more</a></p> Corporate Power Dick Cheney George Bush Iraq Politics Scandals Video Mon, 30 Jun 2008 20:48:03 -0400 tnjp 316 at U.S. Military Demands Bonus Money Back from Wounded Veterans with Arms, Legs Blown Off <p><object width="425" height="344"><br /> <param name="movie" value=";hl=en&amp;fs=1"></param> <param name="allowFullScreen" value="true"></param> <param name="allowscriptaccess" value="always"></param><embed src=";hl=en&amp;fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /> <A HREF="" TARGET="_blank">U.S. Military Demands Bonus Money Back from Soldiers with Arms, Legs Blown Off</A><br /> by David Gutierrez</p> <p>(NaturalNews) In some cases, the U.S. military has been denying wounded soldiers the full amount of their enlistment bonuses, under the rationale that the soldiers are unable to fulfill the full term of their service contract.</p> <p>The policy came to light after Jordan Fox, who was injured by a roadside bomb in Iraq and sent home three months early, received a letter asking him to repay $2,800 of his signing bonus. Fox had been hospitalized for several months, and still has an injured back and a blind right eye.</p> <p>"I was just completely shocked," Fox said. "I couldn't believe I'd gotten a bill in the mail from the Army."</p> <p>Upon signing up for military service, troops may receive up to $30,000 in signing bonuses. These bonuses are contingent upon fulfilling a specified term of service.</p> <p>But according to CBS affiliate KDKA in Pittsburgh, the military has asked "thousands" of injured troops to return part of their bonuses.</p> <p><a href="">read more</a></p> Issues Militarism Politics Scandals Veterans Video Sun, 29 Jun 2008 16:06:50 -0400 tnjp 340 at