Aletho News

ΑΛΗΘΩΣ

Government Placing Itself at Top of New Air Travel Caste System

By Hugh Handeyside | ACLU | September 22, 2014

A new report from the Government Accountability Office shows that the government is going easy on itself when it comes to aviation security screening, and in the process it is stretching the concept of watchlisting to the breaking point. Not only has the Transportation Security Administration expanded its use of blacklists for security screening to identify passengers who may be “unknown threats,” but it also has compiled vast whitelists of individuals—including members of Congress, federal judges, and millions of Department of Defense personnel—who are automatically eligible for expedited screening at airports. These changes have made a broken watchlisting system even more arbitrary, unfair, and discriminatory.

We already know about those at the bottom of this aviation security caste system. We’ve long known that the TSA’s Secure Flight program uses passenger information submitted with airline reservations to screen against watchlists maintained by the FBI’s Terrorist Screening Center, including the No Fly List (which includes individuals who are barred from flying to, from, or over the United States) and the Selectee and Expanded Selectee Lists (which include individuals who are subjected to additional screening every time they fly).

Those watchlists, in turn, are compiled based on criteria that are so overbroad, ambiguous, and riddled with exceptions as to virtually guarantee that innocent individuals will end up blacklisted. Even information of questionable or doubtful reliability can support the “reasonable suspicion” standard that the FBI uses for placing people on the master watchlist. In fact, a single, uncorroborated piece of information—including a Facebook or Twitter post—can be enough to get you on the master watchlist and the Expanded Selectee List.

But the TSA isn’t stopping there. Thanks to the GAO report, we now know that the TSA has modified the Secure Flight program so that it assigns passengers to one of three risk categories: high risk, low risk, or unknown risk. We’ve long been critical of this kind of passenger profiling—which the TSA has proposed in the past—because it inevitably leads to greater intrusion into individuals’ private lives. And of course, it raises the question of what criteria and information the TSA uses to sort people into these categories.

The TSA is keeping those criteria secret, which is part of the problem. However, the GAO report states that the “high-risk” passengers aren’t just those who appear to match a name on the FBI’s No Fly, Selectee, or Expanded Selectee lists (as problematic as those lists may be). Now, the TSA is also using intelligence and law enforcement information, along with “risk-based targeting scenarios and assessments,” to identify passengers who may be “unknown threats.”

In other words, the FBI’s flawed definition of someone who is a suspected threat to aviation security isn’t relaxed enough for the TSA, so the TSA is creating its own blacklists of people who are hypothetical threats. Those people are also subjected to additional screening every time they fly. To make matters worse, another recently published GAO report indicates that the redress process for travelers who have been incorrectly caught up in the watchlisting system does not apply to these new TSA blacklists. So the TSA’s “unknown threats” are truly without recourse.

Moreover, attempting to identify “unknown threats” in the traveling public exacerbates the already unacceptable risk that watchlists will be used for racial and religious profiling—something that leaked documents strongly suggest is already happening.

What about those at the top of this hierarchy? Who gets the privilege of being designated “low risk” and undergoing less onerous screening measures? TSA has established separate lists of entire populations of passengers who, by virtue of their status within the government, get expedited screening, including:

  • Members of Congress
  • Federal judges
  • Department of Defense (DoD) military and civilian personnel (approximately 2.9 million people)
  • Employees of national intelligence agencies (approximately 70,000 people)
  • Homeland Security Advisory Council members and Homeland Security Advisors

These groups receive “Known Traveler Numbers” that they submit when making travel reservations and are then routed to the TSA Pre-Check line when they arrive at the airport. Others (those who have been neither whitelisted nor blacklisted) can apply for expedited screening through Pre-Check by undergoing a background check and submitting biographic information and fingerprints.

Superficially, it’s easy to see the TSA’s logic in focusing on these individuals for whitelisting. Many are involved in defending the country, and some have undergone background checks as part of their positions within the government. But that logic doesn’t stand up under scrutiny. The problem with the TSA’s approach goes to the heart of watchlisting in general: the government is increasingly relying on the unproven and flawed premise that it can predict if a person will commit a dangerous act in the future.

Just as the TSA is blacklisting people who it has decided are unknown, hypothetical threats, it is whitelisting people simply by virtue of their status as employees of the government. That status, however, says next to nothing about whether those individuals will engage in violence or pose a threat to security on any given day. Government employees and officers commit crimes, including crimes that affect national security. Because there is no reason to believe that a given DoD employee is less likely to threaten aviation security than, say, a teacher or an accredited journalist, whitelisting the DoD employee is arbitrary.

The more fundamental problem is how the logic applies to the rest of us.  Instead of subjecting all travelers to the same procedures designed to detect threats to aviation, the government is essentially telling the American public that if we want the same privileges that the government has awarded itself, we’ll have to convince the government that we won’t commit dangerous acts in the future. That means turning over more and more information about ourselves: about who we are, what we do, and with whom we associate. By default, the TSA’s system treats any reluctance to fork over that information as somehow suspicious, and it reinforces the emerging airline security caste system.

Similarly, insulating lawmakers, judges, and other decision-makers from the burdens and inconveniences of air travel does not serve the interests of democracy and fairness. When the government makes status-based decisions about aviation security, it pits Joe Congressman against Joe Sixpack, and unsurprisingly, the congressman comes out ahead.

Ultimately, when we start rewarding or punishing people because of who they are, as opposed to what they’ve done, we drift farther from the principles at the heart of our Constitution.

September 23, 2014 Posted by | Civil Liberties, Full Spectrum Dominance | , | Leave a comment

PRISM’s Controversial Forerunner

By Richard L. Fricker | Consortium News | July 11, 2013

Long before Edward Snowden’s claims or revelations that the National Security Agency and the Central Intelligence Agency were monitoring and tracking the Internet, cell phones, e-mails and any other electronic communication they could get their hands on using a program known as PRISM, there existed PROMIS [Prosecutors Management Information Systems].

PROMIS was designed in the late 1970s and ‘80s to bring Department of Justice criminal case management from the dark ages into the light of the computer age. In the spring of 1981, the Reagan Administration hailed PROMIS as one of law enforcements greatest assets. By 1983, PROMIS had morphed into the behemoth of intelligence gathering. It was not state of the art – it was the art.

Over the ensuing decades PROMIS is reported to have been used by the DOJ, CIA, NSA, and several foreign intelligence agencies including Israel’s Mossad. The ownership of PROMIS has been the subject of federal court hearings and a congressional investigation.

The capabilities of PROMIS as a data collection and tracking program have never been a secret. But the only discussion of PROMIS has been about theft and black-market sales. Neither the courts nor Congress have ever inquired as to privacy issues or the ethics of the program. There has been no rending of political robes as seen with the Snowden case. In fact, the function of PROMIS has been discussed in open court and various public arenas.

PROMIS is a tracking program with enhancements by Washington, DC-based Inslaw Inc., owned by Bill and Nancy Hamilton. PROMIS was developed under a Law Enforcement Assistance Administration [LEAA] grant. Bill Hamilton was employed by NSA for six years. He left the agency in 1966.

PROMIS was designed to track the vast amount of criminal cases piling up in DOJ offices across the country. Bill Hamilton, in an interview for this story, recounted, “It was always a tracking program. It was designed to keep track of cases in local U.S. Attorneys’ offices, which means street crimes, keep track of the scheduled events in court, what actually takes place, who’s there, witnesses, police officers, conclusions, convictions, acquittals, whatever.”

As the LEAA dissolved in the late days of the Carter Administration, the Hamiltons formed Inslaw and began to make modifications to the public domain PROMIS. The short version of the story: As originally designed, PROMIS ran only on 16-bit computers, but using their own funds, INSLAW converted the program to run on 32-bit VAX computers which were massive for their time.

The Reagan administration was very taken with the Inslaw version of PROMIS. In March 1982 Inslaw was awarded $9.6 million to install the program in 20 U.S. Attorney’s offices, with further installations in the remaining 74 offices, if successful. This would be the last government contact the Hamiltons would receive, not because the system failed – quite the contrary, it was too successful.

Hamilton explained, “We developed it originally just for prosecutors. But some of our users wanted to have it shared with the courts and the police. So, the software was engineered to make it adaptable. In making it highly adaptable, a byproduct was to make it useable for non-prosecutor tracking and that made it adaptable totally outside the criminal justice system.”

It became obvious with the latest round of modifications any data system could be integrated into PROMIS. And those data systems could interact – that is, combine – with each other forming a massive tracking data base of people via government documents such as birth and death certificates, licenses, mortgages, lawsuits or anything else kept in a data base. PROMIS could also track banking transactions, arms shipments, communications, airplane parts – again, anything kept in a data base.

With the discovery of these new capabilities Inslaw’s problems began. Unknowingly, the Hamiltons had embarked on an odyssey winding from the White House and the heart of the Reagan inner circle, bankruptcy court, a congressional investigation, secret informants, the CIA, NSA, and the Mossad.

The odyssey began in February 1983 when Dr. Ben Orr, an Israeli prosecutor, came to Hamilton’s office for a demonstration. He left, never placed an order and was never seen again. This was just one of the many demonstrations the company provided potential customers and the press. There was no shroud of secrecy about PROMIS or its capabilities.

Shortly after Dr. Orr’s visit, DOJ terminated payments to Inslaw, but refused to return the software. The company soon [June 1986] found its way into bankruptcy court. Inslaw put forth the claim that DOJ had stolen their software and made a concerted effort to drive them out of business. Bankruptcy Judge George Bason agreed.

In a 216-page opinion delivered in 1987, Judge Bason wrote that DOJ used “trickery, fraud and deceit” to steal PROMIS. He was later overruled by the DC District Court of Appeals on jurisdictional grounds. A previous district court supported his findings that PROMIS had been stolen. Bason became one of the very few Bankruptcy judges to not be re-appointed.

As the PROMIS odyssey continued, information began to surface that DOJ had provided the NSA and CIA with the enhanced 32-bit PROMIS. Stories began to circulate that friends of the Reagan Administration were selling black-market versions of PROMIS to anyone willing to pay the price.

Time and time again the veracity of government employees was called into question. In 1989, the chairman of the House Judiciary Committee, Rep. Jack Brooks, D-Texas, launched what would become a three-year investigation into the theft of PROMIS and DOJ efforts to drive INSLAW out of business.

The Brooks report – dated Aug. 11, 1992 – not only agreed with Bason’s findings but went further: “High government officials were involved … individuals testified under oath that Inslaw’s PROMIS software was stolen and distributed internationally in order to provide financial gain and to further intelligence and foreign policy objectives.”

The report includes scathing comments about former Attorney General Richard Thornburgh and several ranking DOJ staffers. Brooks recommended a settlement of Inslaw claims for damages and the appointment of a special prosecutor. Neither happened. Brooks said in an interview at the time, “[Inslaw] was ravaged by the Justice Department.” They were, he said, “treated like dogs.”

By this time nothing in the report surprised the Hamiltons. Seven months earlier they had discovered that their 1983 visitor, Dr. Ben Orr, was in fact Rafi Eitan, chief of the Israeli Defense Force’s [IDF] anti-terrorism intelligence unit. They further learned he left Washington carrying a copy of PROMIS.

The DOJ explanation was that he was given the 16-bit version, not the new improved 32-bit VAX version. The question would be: why the subterfuge? And why show off the superior 32-bit VAX version and then only provide the cheaper model? DOJ has never answered the question.

Through all this, Inslaw survived; Ireland installed PROMIS for case management, to track land records and in the bank credit system. Hamilton noted that every credit card transaction is tracked by PROMIS. The Netherlands uses the program to keep track of all the inmates in their prison system. The city of Rome has PROMIS for use in their tax office. In fact PROMIS is being legally used in several countries around the world.

Illegally? Who knows. The Canadian government once wrote Inslaw asking for an operating manual. Inslaw never sold PROMIS to Canada. A similar event popped up with Lithuania when a member of its parliament asked for help with its PROMIS program. In each case, when told they may have a bootleg version, the reply was, it must be a different PROMIS. To date, Inslaw has never received a dime for any government recommended settlements, some as high as $50 million.

Hamilton has declined to suggest that PROMIS was the frontrunner to PRISM. He said flatly in the interview for this article that his only information about PRISM is from news accounts.

Regardless of the Inslaw affair, PROMIS is still out there, still tracking whatever its masters require. And still, to this day, no one in government or otherwise has inquired, not about what PROMIS can do, but rather what is PROMIS doing, for whom and why.

PROMIS has been toiling in the intelligence caverns for nearly 30 years – that’s a lot of data consumption, that’s a lot of tracking. Where is the PROMIS data? Compared to 30 years of information gathering and tracking by PROMIS, PRISM could be considered the equivalent of digital binge drinking.

Richard L. Fricker was based in Tulsa, Oklahoma. His last book, The Last Day of the War, is available at https://www.createspace.com/3804081.

September 22, 2014 Posted by | Deception, Full Spectrum Dominance, Timeless or most popular | , , | Leave a comment

Obama administration ‘blocking’ information from the press – AP

RT | September 20, 2014

Uncovering information that should be available to the public has become increasingly difficult under the presidency of Barack Obama, an Associated Press bureau chief says. In some cases, it surpasses the secrecy of the George W. Bush administration.

The White House’s penchant for secrecy does not just apply to the federal government, according to AP’s Washington bureau chief, Sally Buzbee. During a joint meeting of news editors, she stated that the same kind of behavior is starting to appear in state and local governments.

Buzbee pointed out eight ways that the Obama administration is stifling public access to information – including keeping reporters away from witnessing any military action the United States takes as it battles Islamic State extremists in the Middle East.

“The public can’t see any of it,” Buzbee said, referring to the military campaign. “News organizations can’t shoot photos or video of bombers as they take off – there are no embeds. In fact, the administration won’t even say what country the [US] bombers fly from.”

She also expressed frustration with the government’s handling of the upcoming 9/11 trial, during which journalists are prohibited from looking at even non-classified court filings in real time.

“We don’t know what prosecutors are asking for, or what defense attorneys are arguing,” she said.

Meanwhile, basic information about the prison complex in Guantanamo Bay, Cuba is being withheld from the public, despite the fact that the Bush administration freely shared this data. The media is unable to learn how many inmates are on hunger strike in the infamous prison, or how frequently assaults on guards take place.

Freedom of Information Act (FOIA) requests have become harder than ever to process, Buzbee added. Government officials often fail to do so unless media outlets bring a lawsuit to bear.

At the same time, federal officials have begun pressuring state and local agencies to keep quiet.

“The FBI has directed local police not to disclose details about surveillance technology the police departments use to sweep up cellphone data,” Buzbee said. “In some cases, federal officials have formally intervened in state open records cases, arguing for secrecy.”

September 20, 2014 Posted by | Civil Liberties, Full Spectrum Dominance, Progressive Hypocrite | , , , , , , | Leave a comment

US shares Arab citizen’s ‘private’ information with Israel

MEMO | September 18, 2014

The US routinely shares private information about its citizens of Arab and Palestinian descent with Israel, the New York Times revealed yesterday.

In an Op-Ed in the newspaper, James Bamford said that the former National Security Agency (NSA) contractor Edward Snowden told him that the US “routinely passed private, unedited communications to Israel”.

Documents leaked by Snowden reveal that the US passes on “unevaluated and unminimised transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content,” to Unit 8200, an elite Israeli intelligence department.

He said the intercepts included communications of Arab and Palestinian-Americans, whose relatives in Israel and the Palestinian territories could become targets based on the information.

Whistleblower Snowden said this is ”one of the biggest abuses we’ve seen”, Bamford reported.

Bamford cited a memorandum of understanding between the NSA and Unit 8200 outlining transfers that have occurred since 2009.

Snowden, a former NSA contractor, is wanted by the US on espionage charges after leaking thousands of secret NSA documents.

He claimed asylum in Russia, where he has been granted a three-year residency that allows him to travel abroad.

September 18, 2014 Posted by | Civil Liberties, Deception, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance, Progressive Hypocrite | , , , , | Leave a comment

A Principled Fight Against Surveillance

 Global Information Society Watch | September 2014

sticker-chicoYears before Edward Snowden leaked his first document, human rights lawyers and activists have been concerned about a dramatic expansion in law enforcement and foreign intelligence agencies’ efforts to spy on the digital world. It had become evident that legal protections had not kept pace with technological – that the state’s practical ability to spy on the world had developed in a way that permitted it to bypass the functional limits that have historically checked its ability to spy. These concerns culminated in the International Principles on the Application of Human Rights to Communications Surveillance, a set of principles intended to guide policymakers, activists and judges to better understand how new surveillance technologies have been eating away at our fundamental freedoms and how we might bring state spying back in line with human rights standards.

Over a year and a half in the making, the final version of the Principles appeared on July 20, 2013, the first weeks of what we might call the Snowden era. An updated version was issued in May 2014. The Snowden revelations, once they started rolling in, affirmed the worst of our concerns. Intelligence services as well as law enforcement had taken it upon themselves to spy on us all, with little consideration for the societal effects. Lawmakers and even the executive had little comprehension of the capabilities of their own spymasters, and how our digital networks were being turned against all individuals everywhere. The need for the Principles was confirmed in spades, but the long and difficult job of applying them to existing practices was just beginning.

Since then, the Principles have, we hope, been a lodestar for those seeking solutions to the stark reality exposed by Snowden: that, slipping through the cracks of technological developments and outdated legal protections, our governments have adopted practices of mass surveillance that render many of our most fundamental rights effectively meaningless. The Principles have been signed by over 470 organizations and individual experts, by over 350,000 individuals throughout the world, and endorsed by the United Kingdom’s Liberal Democratic Conference, as well as European, Canadian, and German parliamentarians.The Principles have played a central guiding role in a number of the rigorous debates on the need to limit states’ increasingly expansive surveillance capacities. Their impact is already evident in, for example, the United States’ President Review Group on Intelligence and Communications Technologies report, the Inter-American Commission on Human Rights report and the the United Nations High Commissioner for Human Rights’ recent report on the right to privacy in the digital age. Their influence has also manifested in some of the administrative, legislative and administrative attempts to address surveillance problems post-Snowden. Perhaps most importantly, they have functioned as a rallying point for campaigning and advocacy initiatives around the world.

Below, we spell out some of the key features of the Principles. A more detailed explanation of the legal grounding for our conclusions in human rights jurisprudence can be found in a Legal Analysis and Background Materials document generated in support of the Principles.

Core Definitions in International Human Rights Law

The Principles begin with defining two core concepts that spell out the “what” and the “how” of measured surveillance. The first concept focuses on the type of data to be protected, while the second one ensures that a broad range of surveillance activity constitutes an interference with privacy rights. Outdated definitions of these two terms have led to expansive surveillance practices, as wide swaths of sensitive data or surveillance activities have been deemed outside the scope of legal protections. These definitional changes are designed to re-focus privacy protections away from artificial examinations of the kind of data or method of interference, and back on the ultimate effect on the privacy of the individual.

Protected Information

The Principles make clear that it’s time to move beyond the fallacy that information about communications does not pose as serious a threat to privacy as the content of communications. Information about communications, also called metadata, subscriber information or non-content data, can include the location of your cell phone, clickstream data, search logs, or anonymous online activity. Individually, these can be just as invasive as reading your email or listening to your phone calls. When combined and analyzed en masse, the picture painted by such data points can be far more revealing than the content of the communications they accompany. In spite of this reality, pre-Internet age (in fact, postal service-based!) legal conceptions have persisted in some legal systems, offering less or, in some instances, no protection at all to information that is not classified as ‘content’. What is important is not the kind of data is collected, but its effect on the privacy of the individual.

As explained in Legal Analysis and Background Materials which have been prepared for the Principles:

“The Principles use the term “protected information” to refer to information (including data) that ought to be fully and robustly protected, even if the information is not currently protected by law, is only partially protected by law, or is accorded lower levels of protection. The intention, however, is not to make a new category that itself will grow stale over time, but rather to ensure that the focus is and remains the capability of the information, alone or when combined with other information, to reveal private facts about a person or her correspondents. As such, the Principles adopt a singular and all-encompassing definition that includes any information relating to a person’s communications that is not readily available to the general public.”

This concern has been addressed by the latest report of the Office of the High Commissioner for Human Rights, who made clear that:

“From the perspective of the right to privacy, this distinction between [content and metadata] is not persuasive. The aggregation of information commonly referred to as “metadata” may give an insight into an individual’s behaviour, social relationships, private preferences and identity that go beyond even that conveyed by accessing the content of a private communication.”

Given the revealing nature of metadata and content alike, states should be restrained from unchecked interference with any protected information: from revealing a speaker’s identity if it is not public; from wantonly vacuuming up the websites or social media one has visited; from stockpiling information on all the people one has communicated with; and tracking the ‘when’, ‘from where’, and ‘for how long’ of all our digital activities. In the pre-Internet age, the much more limited amount and kind of “metadata” available to law enforcement was treated as less sensitive than content, but given current communications surveillance capabilities, this can no longer be the case.

Communication Surveillance: Much of the expansive state surveillance practices confirmed during the past year depend on confusion over whether actual “surveillance” has occurred and thus whether human rights obligations even apply. Some have suggested that if information is merely collected and kept but not looked at by humans, no privacy invasion has occurred. Others argue that computers analysing all communications in real-time for key words and other selectors does not amount to “surveillance” for purposes of triggering legal privacy protections. Still others seek to reduce privacy protections to ‘harmful uses’ of information. Such legal variations can mean the difference between reasonable and carefully targeted investigations and a surveillance state built on the continuous mass surveillance of everyone.

In the digital age, where the most sensitive portions of our lives are constantly communicated over digital networks, it has never been more important to ensure the integrity of our communications. It means little whether the interference takes the form of real-time monitoring of Internet transmission, hacking into individuals’ mobile devices, or mass harvesting of stored data from third party providers. The mere recording of Internet transactions – even if ultimately unviewed – can have serious chilling effects on the use of our most vital interactive medium. We have to ensure that all acts of communications surveillance are within the scope of human rights protections and, hence, are “necessary and proportionate”.

On this front, the Office of the High Commissioner for Human Rights (OHCHR) report, made clear that:

“any capture of communications data is potentially an interference with privacy and, further, that the collection and retention of communications data amounts to an interference with privacy whether or not those data are subsequently consulted or used. Even the mere possibility of communications information being captured creates an interference with privacy, with a potential chilling effect on rights, including those to free expression and association.”

To remedy this issue, the Principles define “communications surveillance” as encompassing the monitoring, interception, collection, analysis, use, preservation and retention of, interference with, or access to information that includes, reflects, or arises from or a person’s communications in the past, present or future.

Scope of Application

The Principles also address a long-standing problem arising from narrow interpretations adopted by some states regarding the extraterritorial application of their human rights obligations. Some have argued that the obligation to respect privacy and other human rights of individuals effectively stops at their national borders. In a world of highly integrated digital networks, where individual interactions and data routes defy any semblance of territorial correspondence, such distinctions are meaningless. The Principles therefore apply to surveillance conducted within a state or extraterritorially, and regardless of the purpose for the surveillance – including enforcing law, protecting national security, gathering intelligence, or another governmental function.

The OHCHR’s report explicitly underscores the principle of non-discrimination:

“Article 26 of the International Covenant on Civil and Political Rights provides that all persons are equal before the law and are entitled without any discrimination to the equal protection of the law” and, further, that “in this respect, the law shall prohibit any discrimination and guarantee to all persons equal and effective protection against discrimination on any ground such as race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status.”

In this regard, the OHCHR’s report has underscored its importance:

“measures to ensure that any interference with the right to privacy complies with the principles of legality, proportionality and necessity regardless of the nationality or location of individuals whose communications are under direct surveillance.”

The 13 Principles

The substantive Principles are firmly rooted in well-established human rights law. Generally, any limits on human rights should be necessary, proportionate and for a set of permissible purposes. These limits must be set out in law, and cannot be arbitrary.

Under international human rights law, each right are divided in two parts. The first paragraph sets out the core of the right, while the second paragraph sets out the circumstances in which that right may be restricted or limited. This second paragraph is usually called the “permissible limitations” test.

Regarding the right to privacy, the UN Special Rapporteur on Counter-Terrorism and the UN Special Rapporteur on Freedom of Expression have stated that the “permissible limitations” test under Article 19 of the International Covenant on Civil and Political Rights among other articles are equally applicable to Article 17 of the International Covenant on Civil and Political Right

The OHCHR report has neatly summarized these obligations with respect ot Article 17 of the International Covenant on Civil and Political Rights (ICCPR), which prohibits the arbitrary or unlawful interference with privacy rights

“To begin with, any limitation to privacy rights reflected in article 17 must be provided for by law, and the law must be sufficiently accessible, clear and precise so that an individual may look to the law and ascertain who is authorized to conduct data surveillance and under what circumstances. The limitation must be necessary for reaching a legitimate aim, as well as in proportion to the aim and the least intrusive option available…Any limitation placed on the right (an interference with privacy, for example, for the purposes of protecting national security or the right to life of others) must be shown to have some chance of achieving that goal. The onus is on the authorities seeking to limit the right to show that the limitation is connected to a legitimate aim. Furthermore, any limitation to the right to privacy must not render the essence of the right meaningless and must be consistent with other human rights, including the prohibition of discrimination. Where the limitation does not meet these criteria, the limitation would be unlawful and/or the interference with the right to privacy would be arbitrary.”

Legality – No Secret Laws: The principle of legality is a fundamental aspect of all international human rights instruments and the rule of law. It is a basic guarantee against the state’s arbitrary exercise of its powers. For this reason, any restriction on human rights must be prescribed by law. The meaning of “law” implies certain minimum qualitative requirements of clarity, accessibility, and predictability. Laws limiting human rights cannot be secret or vague enough to permit arbitrary interference.

On that front, the Office of the High Commissioner on Human Rights made clear that:

“To begin with, any limitation to privacy rights reflected in article 17 must be provided for by law, and the law must be sufficiently accessible, clear and precise so that an individual may look to the law and ascertain who is authorized to conduct data surveillance and under what circumstances.”

The need to meaningfully and publicly explain rights-infringing practices—while important in all contexts—is key to any effective check on communications surveillance as such practices tend to be surreptitious and difficult to uncover. Given the highly technical and rapidly evolving nature of communications surveillance, it is also incumbent that laws are interpreted publicly and not through secret processes effectively free from public scrutiny. The state must not adopt or implement a surveillance practice without public law defining its limits. Moreover, the law must meet a standard of clarity and precision that is sufficient to ensure that individuals have advance notice of, and can foresee, its application. When citizens are unaware of a law, its interpretation, or the scope of its application, it is effectively secret. A secret law is not a legal limit on human rights.

In her landmark report Pillay made clear that:

“Secret rules and secret interpretations even secret judicial interpretations of law do not have the necessary qualities of “law”. Neither do laws or rules that give the executive authorities, such as security and intelligence services, excessive discretion; the scope and manner of exercise of authoritative discretion granted must be indicated (in the law itself, or in binding, published guidelines) with reasonable clarity. A law that is accessible, but that does not have foreseeable effects, will not be adequate. The secret nature of specific surveillance powers brings with it a greater risk of arbitrary exercise of discretion which, in turn, demands greater precision in the rule governing the exercise of discretion, and additional oversight.”

Legitimate Aim

Laws should only permit communications surveillance by specified State authorities to achieve a Legitimate Aim that corresponds to a predominantly important legal interest that is necessary in a democratic society.

Under international human rights law, any restriction on our fundamental freedoms must generally pursue a permissible purpose or “legitimate aim.” These purposes or aims are often enumerated within the Article itself. The Principles therefore require that communications surveillance only be undertaken in pursuit of a predominantly important legal interest. Such interests have been described by Germany’s highest court as “the life, limb and freedom of the individual or such interests of the public a threat to which affects the basis or continued existence of the state or the basis of human existence.”

Regarding the right to privacy, the UN Special Rapporteur on Counter-Terrorism and the UN Special Rapporteur on Freedom of Expression have stated that the “permissible limitations” test under Article 19 of the International Covenant on Civil and Political Rights among other articles are equally applicable to Article 17 of the International Covenant on Civil and Political Rights, which prohibits arbitrary interference with the right to privacy.

The Office of the High Commissioner on Human Rights has similarly affirmed, in its 2014 Report, that “any limitation to privacy rights reflected in article 17 must be necessary for reaching a legitimate aim”. The Report elaborates:

“Surveillance on the grounds of national security or for the prevention of terrorism or other crime may be a “legitimate aim” for purposes of an assessment from the viewpoint of article 17 of the Covenant. The degree of interference must, however, be assessed against the necessity of the measure to achieve that aim and the actual benefit it yields towards such a purpose.”

Finally, communications surveillance cannot be employed in a manner that discriminates on the basis of grounds such as race, colour, sex, language religion or national origin, as such discrimination constitutes an illegitimate purpose.

Necessity, Adequacy and Proportionality

International human rights law makes clear that any interference with our fundamental freedoms must be “necessary in a democratic society”. In its General Comments No. 27, the Human Rights Committee clearly indicates that it is not sufficient that such restrictions serve a legitimate aim, they must also be necessary to it. Restrictive measures must also be adequate or appropriate to achieving their protective function. They must also be the least intrusive options amongst those which might be expected to achieve the desired result, and they must be proportionate to the interest to be protected. Finally, any restrictive measure which undermines the essence or core of a right is inherently disproportionate and a violation of that right.

Applying these foundational principles to the context of communications surveillance, the Principles affirm that:

Necessity: Often, a surveillance objective might be achieved using far less intrusive mechanisms. While it is by no means necessary to exhaust other options, it should be recognized the communications surveillance is inherently invasive and should not be a tool of first recourse.

Adequacy: It is not sufficient to show that a given surveillance practice is necessary for achieving a given objective, it must also be adequate and appropriate to it. As noted by the High Commissioner, at minimum, communications surveillance which interferes with privacy “must be shown to have some chance of achieving [its] goal.”

Proportionality: Communications surveillance should be regarded as a highly intrusive act that interferes with human rights and poses a threat to the foundations of a democratic society. Communications surveillance for investigative purposes, in particular, should only occur once the state has convinced an objective third party – a judge – that a serious threat to a legitimate interest exists and that the communications mechanism in question will yield information that will assist with that serious threat.

No voluntary cooperation:

Current digital networks and interactions entrust vast amounts of personal and sensitive data in the hands of a wide range of third party intermediaries, including ISPs, email providers, hosting companies and others. Through their discretionary decisions to comply (or not) with state surveillance requests, these intermediaries can dramatically impact on the privacy rights of all. Such voluntary sharing bypasses due process and poses a serious threat to the rule of law. The Necessary and Proportionate principles therefore prohibit any state communications surveillance activities in the absence of judicial authorization.

No repurposing

Contrary to many official statements, the modern reality is that state intelligence agencies are involved in a much broader scope of activities than simply those related to national security or counterterrorism. The Necessary and Proportionate Principles state that communications surveillance (including the collection of information or any interference with access to our data) must be proportionate to the objective they are intended to address. And equally importantly, even where surveillance is justified by one agency for one purpose, the Principles prohibit the unrestricted reuse of this information by other agencies for other purposes.

The Office of the High Commissioner for Human Rights report also emphasized that point:

“The report explained that the absence of effective use limitations has been exacerbated since September 11, 2001, with the line between criminal justice and protection of national security blurring significantly. The resultant sharing of data between law enforcement agencies, intelligence bodies and other State organs risks violating Article 17 of the Covenant on Civil and Political Rights, because surveillance measures that may be necessary and proportionate for one legitimate aim may not be so for the purposes of another.”

Integrity of Communications And Systems:

No law should impose security holes in our technology in order to facilitate surveillance. Undermining the security of hundreds of millions of innocent people in order to ensure surveillance capabilities against the very few bad guys is both overbroad and short-sighted, not least because malicious actors can use these exploits as readily as state agents. The assumption underlying such provisions—that no communication can be truly secure—is inherently dangerous, akin to throwing out the baby with the bathwater. It must be rejected.

The Office of the High Commissioner for Human Rights report supports that conclusion, stating that:

“The enactment of statutory requirements for companies to make their networks “wiretap-ready” is a particular concern, not least because it creates an environment that facilitates sweeping surveillance measures.”

Notification And Right To An Effective Remedy

Notification must be the norm, not the exception. Individuals should be notified that access to their communications has been authorized with enough time and information to enable them to appeal the decision, except when doing so would endanger the investigation at issue. Individuals should also have access to the materials presented in support of the application for authorisation. The notification principle has become essential in fighting illegal or overreaching surveillance. Any delay in notification has to be based upon a showing to a court, and tied to an actual danger to the investigation at issue or harm to a person.

Before the internet, the police would knock on a suspect’s door, show their warrant, and provide the individual a reason for entering the suspect’s home. The person searched could watch the search occur and see whether the information gathered went beyond the scope of the warrant. Electronic surveillance, however, is much more surreptitious. Data can be intercepted or acquired directly from a third party such as Facebook or Twitter without the individual knowing. Therefore, it is often impossible to know that one has been under surveillance, unless the evidence leads to criminal charges. As a result the innocent are the least likely to discover their privacy has been invaded. Indeed, new technologies have even enabled covert remote searches of personal computers and other devices. Any delay in notification has to be based upon a showing to a court, and tied to an actual danger to the investigation at issue or harm to a person.

The OHCHR report lays out four characteristics that effective remedies for surveillance-related privacy violations must display:

“Effective remedies for violations of privacy through digital surveillance can thus come in a variety of judicial, legislative or administrative forms. Effective remedies typically share certain characteristics. First, those remedies must be known and accessible to anyone with an arguable claim that their rights have been violated. Notice (that either a general surveillance regime or specific surveillance measures are in place) and standing (to challenge such measures) thus become critical issues in determining access to effective remedy. States take different approaches to notification: while some require post facto notification of surveillance targets, once investigations have concluded, many regimes do not provide for notification. Some may also formally require such notification in criminal cases ; however , in practice , this structure appears to be regularly ignored.”

The 2014 OHCHR report continues, stressing the importance of a “prompt, thorough and impartial investigation”; a need for remedies to actually be “capable of ending ongoing violations”; and noting that “where human rights violations rise to the level of gross violations…as criminal prosecution will be required”.

Safeguards for International Cooperation:

Privacy protections must be consistent across borders at home and abroad. Governments should not bypass national privacy protections by relying on secretive informal data sharing agreements with foreign states or private international companies. Individuals should not be denied privacy rights simply because they live in another country from the one that is surveilling them. Where data is flowing across borders, the law of the jurisdiction with the greatest privacy protections should apply.

More to Be Done: The Necessary and Proportionate Principles provide a basic framework for governments to ensure the rule of law, oversight and safeguards. They also call for accountability, with penalties for unlawful access and strong and effective protections for whistleblowers. They are starting to serve as a model for reform around the world and we urge governments, companies, NGOs and activists to use them to structure necessary change.

But while the Principles are aimed at governments, government action isn’t the only way to combat surveillance overreach. All of the communications companies, Internet and telecommunications alike, can help by securing their networks and limiting the information they collect and retain. Online service providers should collect the minimum amount of information for the minimum time that is necessary to perform their operations, and to effectively obfuscate, aggregate and delete unneeded user information. This helps them in their compliance burdens as well: if they collect less data, there is less data to hand over to the government. Strong encryption should be adopted throughout the entire communications chain and, where possible, for data in storage.

It’s clear that under the cloak of secrecy, malfunctioning oversight and the limited reach of outdated laws, the practice of digital surveillance in countries from the far north to the far south, have overrun the bounds of human rights standards. We all hope to see activists around the world showing exactly where a country has crossed the line, and how its own policymakers and the international community might rein it back. We must call for surveillance reform to ensure that our national surveillance laws and practices comply with human rights standards and to ensure cross-border privacy are in place and effectively enforced. Working together, legal plus technical efforts like deploying encryption, decentralization of services and limiting information collected, can serve as a foundation for a new era of private and secure digital communications.

References:

September 15, 2014 Posted by | Civil Liberties, Full Spectrum Dominance | , , , | Leave a comment

ECHR case challenges UK government over surveillance of journalists’ communications

Bureau of Investigative Journalism | September 15, 2014

The Bureau of Investigative Journalism is asking a European court to rule on whether UK legislation properly protects journalists’ sources and communications from government scrutiny and mass surveillance.

The Bureau’s application was filed with the European Court of Human Rights on Friday. If the court rules in favour of the application it will force the UK government to review regulation around the mass collection of communications data.

The action follows concerns about the implications to journalists of some of the revelations that have come out of material leaked by Edward Snowden.

These have made it clear that by using mass surveillance techniques, government agencies can not only collect, store and scrutinise the content of electronic communications but also analyse masses of metadata – the details about where digital communications such as emails originate and the subject area of those communications.

Gavin Millar QC, who is working on the case with the Bureau, believes UK authorities are routinely carrying out such data collection and analysis and says this enables a sophisticated picture to be developed of a journalist’s or organisation’s network of contacts, sources and lines of enquiry as well as materials, subjects and persons of interest to them.

Click here for a summary of the case.

Why data harvesting is a human rights issue – find out why we’re doing this.

Gavin Millar QC: A breach of international law.

September 15, 2014 Posted by | Civil Liberties, Full Spectrum Dominance, Mainstream Media, Warmongering | , | Leave a comment

A Modest Proposal to Zionize American Academia

By Richard Silverstein | Tikun Olam | September 13, 2014

In the true spirit of capitalism, I’ve identified a niche in the academic market and plan to fill it. First, let’s state the problem: the recent spate of campus firings from Yale to the University of Illinois (with earlier episodes at Princeton, Brooklyn College and other institutions) have left schools in the messy position of having to rid themselves of controversial, undesirable prospective faculty and, God knows, sometimes even chaplains. The ensuing bad publicity generated by activist troublemakers too often gives these institutions a black eye they don’t deserve.

Wouldn’t it be better if schools could vet job candidates with a group of trusted consultants who would explore their background (especially their Twitter feeds), seeking embarrassing material and ideologically suspect expression in order to save administrators the trouble of learning about it when it’s too late? I call this new product I plan on offering, ZioCredit. It’s based on the model of accreditation committees which travel the country examining the fitness of universities to call themselves legitimate academic institutions.

In my case, for a small fee, schools throughout the United States (but especially in communities with large pro-Israel markets) may hire my company to ensure peace of mind. A few of the more cynical among you may liken what I propose to protection rackets in which the Mafia offered businesses protection from assault. Those who refused often met unpleasant ends. If that’s what you’re thinking, you can put your mind at ease. This is the 21st century after all. Not Little Italy in the 1950s. We don’t operate that way. We’re as clean and classy as our clients and sport academic pedigrees to prove it.

So this is how the process works: if we find a candidate in the ideologically lower-tier it would be best to be rid of him or her immediately. We can take care of that for you (no, you won’t find him at the bottom of the East River in cement shoes–I kid!). Why should you get your hands dirty?

We will accredit your university, department by department to ensure each one hews to a proper line. We will even examine course curricula and weed out overly contentious books, essays and ideas.  We will examine individual job candidates and prepare them and their case files for presentation to hiring committees and boards of trustees. Earning our accreditation (hence the company name, ZioCredit), is the pro-Israel Good Housekeeping seal of approval. Working with us will guarantee that you will never face the unwanted attention of the Israel Lobby because after all, we are the Israel Lobby! But we’re a manageable and cooperative version.  We don’t aim to embarrass you publicly. And we ask for so little in return.

There may be a few of you Old School academics worried about values like free speech and academic freedom. I can assure you that your concerns are unwarranted. After all, these values are overrated. Like tenure, they’ve outlived their usefulness in the modern age.

The premise behind ZioCredit is that in this new academic age what students really want is comfort. They want to enjoy their academic experience. They want civility. They don’t want unpleasant interactions with alien groups they’ve never met in their life. Ideas should be challenging but not too challenging. After all, you don’t want to scare off your students by forcing them to face realities better off avoided.

We will help transform the campus environment from a raucous free-for-all, in which feelings become bruised and identities confused, into a polite, civil society in which everyone takes their turn and knowledge is parceled out in nice, bite-sized packages.

Back to my product, it takes into account that there may be some candidates who, though suspect, are still for various reasons beneficial to the faculty. They may fill an unspoken race or gender quota; or even an ideological quota. They may help promote the school within certain demographic profiles and market niches.

For an extra fee, my company will work with such candidates to reframe academic interests so as to be acceptable within the community. After all, academics are such unusual individuals raised like hothouse flowers in intellectual environments so alien to the average person (by which I mean any supporter of Israel). They need to be coaxed into the real world, to be shown proper manners and etiquette, if you will. In particularly awkward situations, we may even be engaged to cleanse reputations and eliminate particularly egregious examples of anti-Israel hate speech from a candidate’s internet identity.

If the University of Illinois had only had such a product available, it could’ve avoided all that Steve Salaita unpleasantness. So messy and so unnecessary.

Now I can hear a skeptic or two among you (a small minority of course) wondering how this consultancy will be structured. I assure you we will engage some of the foremost experts in the field of internet surveillance and Zionist identity politics. These will be individuals with impressive resumes and who are lionized by everyone who matters. Discussions have already commenced to hire such luminaries as Ayan Hirsi Ali, Carey Nelson and Alan Dershowitz.  They know what a good candidate should bring to the table. Either they will help your job seeker to become the best pro-Israel candidate he can be; or they will tell you in no uncertain terms to toss him aside. After all, who wants to waste time on hopeless causes?

Since there is a growing acknowledgement that the customer should be represented at the table, we’re engaging students too, who’ve proven their allegiance to the cause, to sit on these vetting committees. Two of the stars of the field are Daniel Mael and Chloe Valdary. It’s a pretty tough environment for hiring such stellar young people. They have offers of employment at FoxNews and the Wall Street Journal respectively.  But we hope to lure them with promises they will make the campuses of America safe for Israel. A more sacred mission I can’t conceive.

Though we believe this is a lucrative field we’re entering (creating, really), we don’t want our clients to think of us as money-grubbing capitalists. To that end, we plan on donating 5% of our net revenues (you didn’t think we were nuts enough to base this on gross revenues, did you?) to various worthy, non-political causes like Scholars for Peace in the Middle East, Daniel Pipes’ Middle East Forum, and one of our sister Israeli organizations, Im Tirzu. We’re proud of our association with our Israeli brethren who are bringing a “second Zionist revolution” to Israeli academe.

Please don’t get the idea that any of this is political.  Zionism, after all, knows no denominations or sects. There are Christian, Jewish and heck, even Muslim Zionists. It’s entirely non-partisan. And that’s as it should be. There are so many enemies of the Jewish people out there flapping their mouths. God knows what they might say.  But we know what’s right.  And there isn’t a political bone in our body.

Don’t get the idea that we’re affiliated with one Israel Lobby group like Aipac. After all, how would it sound to say: Aipac Certified?  That’s thinking too small. No, we’re going big. We want the whole enchilada. That’s why we call our process Zio Certification.

There may be a few holdout institutions who think they can do things the old-fashioned way. They can honor all the old cliches like academic freedom and pay the price by standing by faculty who speak inconveniently in public settings. To them I say, God speed.  You don’t need our help. You need a time machine. You’ll find that you’re dinosaurs and this Brave New World we’re entering will soon pass you by.

My message to academe is: we’re ready to go–are you? Zionize or die.

September 13, 2014 Posted by | Corruption, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance, Timeless or most popular | , | Leave a comment

The Personnel is Political

By Corey Robin | September 11, 2014

The University of Illinois Board of Trustees today voted 8-1 not to reinstate Steven Salaita.

Trustee James Montgomery, who last Friday publicly broached his misgivings about the university’s decision to hirefire Salaita, was the sole vote on behalf of Salaita. Though Montgomery had originally signed a statement supporting Chancellor Wise, he said, “I’m just someone who has the humility to be able to say that I think I made a mistake and I don’t mind saying it.” Here is his eloquent testimony.

Needless to say, the vote today sucks, and there is no use sugar-coating it. While it’s testament to the movement we’ve mounted that the Board was forced to publicly confront this issue, and that we managed to persuade one trustee to change his mind (from reports I’ve heard, other trustees did as well, but they are student trustees who have no voting power), our power and our principles proved in the end not to be enough to match the donors’ purse strings.

So it looks like a legal remedy will now be pursued. I’m using the passive voice because I have no idea what Salaita and his lawyers are planning, though the Center for Constitutional Rights, which is representing Salaita, did put out a statement after the Board vote. And the ever charming Chair of the Board of Trustees had this to say:

“I assume the attorneys will reach out and work something out or understand their position more clearly. We are not looking to be held up. We want to be fair but we don’t want to be pushovers,” board Chairman Christopher Kennedy said after the meeting. “Either they will sue or we will settle. It is hard to predict what another party will do. … Am I going to give you my playbook on a negotiating matter?”

The legal route is one path, an important path, but it’s not the only path, and more important, it’s not our path. That is, the path of all of us who have spoken out on this case.

Our path is not legal; it is political. It’s not about lawyers, it’s not about courtrooms. It’s about principles and movements, words on the web, bodies on the ground, and voices in the street. It is about power. How we deploy that power, I don’t know. That we will deploy that power, I am sure. Now is the time to think creatively and collectively.

In the meantime, I wanted to take note of a comment Chancellor Wise made in an interview to the Chronicle of Higher Education:

People are mixing up this individual personnel issue with the whole question of freedom of speech and academic freedom.

It’s a telling statement, revealing an archipelago of assumption that I’ve been tackling in all my work since my first book. In Wise’s world, freedom of speech stands on one side, employment on the other, and never the twain shall meet. It’s almost as if, to her mind, we’re making a category error when we speak of both in the same breath.

And it’s not just Wise who thinks this way. About two weeks ago on Twitter, I heard a similar remark from a young progressive journalist (I won’t link to the comment because I don’t want to draw negative attention or criticism to this person, who went on to express a willingness to rethink her position). Rights and repression are one thing, employment sanctions another. The philosopher Gerald Dworkin voiced an attenuated version of that argument, too.

Yet as I’ve argued on this and other blogs countless times, employment sanctions are in fact one of the most common methods of political repression in this country. Remember that anecdote Tocqueville reported in his journals, about how he asked a doctor in Baltimore why in a country that had so much formal religious freedom there was such a compulsion toward orthodoxy. Without hesitating, the doctor said it was all about the making and breaking of private careers.

If a minister, known for his piety, should declare that in his opinion a certain man was an unbeliever, the man’s career would almost certainly be broken. Another example: A doctor is skilful, but has no faith in the Christian religion. However, thanks to his abilities, he obtains a fine practice. No sooner is he introduced into the house than a zealous Christian, a minister or someone else, comes to see the father of the house and says: look out for this man. He will perhaps cure your children, but he will seduce your daughters, or your wife, he is an unbeliever. There, on the other hand, is Mr. So-and-So. As good a doctor as this man, he is at the same time religious. Believe me, trust the health of your family to him. Such counsel is almost always followed.

The state needn’t punish men and women for their heresies; the private sector will do it for them. That’s why during the McCarthy years so few people went to jail. Two hundred tops. Because it was in the workplace that Torquemada found his territory: some twenty to forty percent of employees, monitored, investigated, or otherwise subject to surveillance for their beliefs. The ruling elites in this country have always understood what Hamilton wrote in Federalist 79:

In the general course of human nature, a power over a man’s subsistence amounts to a power over his will.

Which brings us back to Steven Salaita. As I argued on Labor Day, it’s easy to see his case as simply one of academic freedom or the rights of tenured professors. It is that, but it’s more. It’s about the use of employment sanctions for political ends, the peculiarities and particularities of Fear, American Style, which do not apply only to Steven Salaita. They apply to all at-will employees, to that terra incognita of private governance that is the American workplace. Salaita is but the latest in a long line of victims.

While the pro-Israel forces show no compunction about using the weapons of state to enforce their orthodoxies, the sphere of employment, particularly in the academy, where one most often hears views critical of Israel, will become increasingly the scene of the censor. It already has: as I said the other day, my first battle over Israel/Palestine was to defend an adjunct in my department who had been fired for his (mistakenly construed) views on Israel/Palestine.

The issue is not simply Israel/Palestine; it’s the growing assault on fundamental rights and the increasing push toward precarity that has become the experience of workers everywhere.

If we’re going to fight this in the academy, we’re going to have to fight it the way every worker has ever had to fight: not only in courts of law, but also in the streets; not just with the help of lawyers, but also with help of each other; not simply with our smarts, but also with our feet. With unions, strikes, boycotts—the entire repertoire of collective action and militancy that gave this country whatever minimal (and ever fading) semblance of decency it has managed to achieve.

September 12, 2014 Posted by | Civil Liberties, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance | , | Leave a comment

A Palestinian Exception to the First Amendment

By Corey Robin | September 9, 2014

Steven Salaita spoke today at the University of Illinois at Urbana-Champaign. According to the YMCA, where the event was held, some 400 students, faculty, staff, and supporters turned up.

Salaita opened with a statement. Here are some excerpts:

My name is Steven Salaita. I am a professor with an accomplished scholarly record; I have been a fair and devoted teacher to hundreds of undergraduate and graduate students; I have been a valued and open-minded colleague to numerous faculty across disciplines and universities. My ideas and my identity are far more substantive and complex than the recent characterizations based on a selected handful of my Twitter posts.

Two weeks before my start date, and without any warning, I received a summary letter from University Chancellor Phyllis Wise informing me that my position was terminated, but with no explanation or opportunity to challenge her unilateral decision. As a result, my family has no income, no health insurance, and no home of our own. Our young son has been left without a preschool. I have lost the great achievement of a scholarly career – lifetime tenure, with its promised protections of academic freedom.

Even more troubling are the documented revelations that the decision to terminate me is a result of pressure from wealthy donors – individuals who expressly dislike my political views. As the Center for Constitutional Rights and other groups have been tracking, this is part of a nationwide, concerted effort by wealthy and well-organized groups to attack pro-Palestinian students and faculty and silence their speech. This risks creating a Palestinian exception to the First Amendment and to academic freedom.

I am here to reaffirm my commitment to teaching and to a position with the American Indian Studies program at UIUC. I reiterate the demand that the University recognize the importance of respecting the faculty’s hiring decision and reinstate me. It is my sincere hope that I can – as a member of this academic institution – engage with the entire University community in a constructive conversation about the substance of my viewpoints on Palestinian human rights and about the values of academic freedom.

For me, the best part of his press conference was the Q and A with the media, which begins at 40:50 in the video below. I would encourage everyone to watch it because it gives you the best sense of Salaita the man, the thinker, and the teacher. As I’ve said, I don’t know Salaita personally, except through our interactions on Facebook and Twitter. I’ve never met him or heard him speak. I haven’t read his academic writings. But listening to and watching him field questions, it became clear to me why the American Indian Studies department was so eager to hire him.

My favorite exchange occurs at 43:30. Someone in the media asks him why he would want to still come and teach at UIUC. Looking around the room, which is filled with students, Salaita says:

The question is—and if I’m summarizing it incorrectly let me know—some people are wondering why I would want to work here after all of this has happened and whether it might be uncomfortable. The answer is… the answer is in this room.

Perfect.

One other point to note. At 55:00, one of Salaita’s attorneys is asked about what the litigation process would look like. The attorney replies:

There’s no question that if there is litigation there will be an intensive document retrieval process that will involve trying to get at the heart of exactly what the motivation was for this decision. We think, based on what is already known, the university is going to have some very hard arguments. But we will learn a lot. We will also be able to take depositions. And that is an opportunity to sit people down and ask them about their role in this process, their decision-making and other things. Again, Professor Salaita’s goal is not to have to go down that road. But he is prepared to do so if necessary.

I’ve long felt that one of the things that has to make the university nervous is the prospect of litigation. Yes, the university has tons of money and lawyers. But it also has interests. And one of those interests is protecting the privacy of its donors. I can’t for the life of me believe that the university really wants to risk the rage and rancor of donors having their names dragged into the harsh glare of the public spotlight. Once this case gets into court—and most experts, regardless of which side they fall, believe that Salaita has a good chance of getting into court—there will be discovery motions that will turn up all sorts of paper. What we’ve seen already is damning and embarrassing. But think about what could be coming down the pike: not only emails to and fro, but also records of phone calls, transcripts of meetings, and more. Even if the university were to win the case, they’d have to lose a lot in order to do so.

In other news, Chancellor Wise was interviewed by the Chicago Tribune.

On Monday, Wise acknowledged in an interview that she wished she had “been more consultative” before rescinding Salaita’s job offer, and said it could have led her to a different decision. She said the situation has been “challenging.”

She also said there was “no possibility” that he would work at the U. of I.

“I wish I had not consulted with just a few people and then written the letter to Professor Salaita,” Wise said. “I don’t know what the consultation would have led me to do.”

This is now the third time that Wise has said that she regrets not consulting with other voices on the campus. But this is the first time that she’s positively stated that not only did her firing of Salaita not reflect her own position, but also that she might have reached a different decision than the one she reached had she consulted other voices. Which is precisely the argument that so many of us have been making about whose voices Wise did and did not heed in this process. It almost seems as if she’s trying to give Salaita evidence for his case.

Last, Katherine Franke, who’s been leading the legal academic community on this issue, and Kristofer Petersen-Overton, a PhD candidate in political science at the CUNY Graduate Center, appeared today on Democracy Now.

I urge you to listen to the interview, in particular the part that begins at 47:00. There Kris, whom I know personally, speaks about his experience as an adjunct at Brooklyn College, where he was hired by my department to teach a course on Middle East politics for the spring of 2011 and then fired before the course began. Sound familiar? The reason he was fired? Pro-Israel forces objected to something he had written. Sound familiar? Here’s what one of the leaders of those forces, NYS Assemblyman Dov Hikind, said at the time about an academic paper Kris had written on suicide bombers:

Hikind, a staunch ally of Israel, sent a letter on Monday to Karen Gould, the college’s president, with a copy to CUNY Chancellor Matthew Goldstein, in which he questioned the adjunct’s appointment. Calling Petersen-Overton “an overt supporter of terrorism,” Hikind said he was “better suited for a teaching position at the Islamic University of Gaza.”

Hikind, who said he earned his master’s degree in political science from Brooklyn College, told Inside Higher Ed that he reached these conclusions after spending “countless hours” reading the newly hired adjunct’s work. This included, chiefly, his unpublished paper, “Inventing the Martyr: Struggle, Sacrifice and the Signification of Palestinian National Identity,” in which he examines martyrdom as it “embodies ideals of struggle and sacrifice” in the context of national identity. Hikind said such works reflect an effort to “understand” suicide bombers. “There’s nothing to understand about someone who murders women and children,” he said. “You condemn.”

Kris didn’t say anything about anti-Semitism becoming honorable, he didn’t say anything about settlers going missing, he didn’t say anything about necklaces of teeth. His crime was trying “to understand about someone who murders women and children.” As Dostoevsky did in Crime and Punishment. That was enough to get him fired.

This is why I come to this whole Salaita affair with a bit of skepticism about the tweets. It’s skepticism born of my own personal experience with four controversial fights over Israel/Palestine. If it’s not the tweets, it’s the grad student paper trying to understand suicide bombers. If it’s not the grad student paper trying to understand suicide bombers, it’s the Pulitzer-Prize-winning playwright who cannot receive an honorary degree because he’s voiced criticism of Israel. If it’s not the Pulitzer-Prize-winning playwright who cannot receive an honorary degree because he’s voiced criticism of Israel, it’s the New York City Council threatening CUNY’s funding because the political science department at Brooklyn College is co-sponsoring—not endorsing, not organizing, not funding, but co-sponsoring—a panel on BDS. If it’s not the New York City Council threatening CUNY’s funding because the political science department at Brooklyn College is co-sponsoring a panel on BDS, it’s the NYS Legislature threatening a college’s funding if it financially supports individual faculty membership in the American Studies Association, which supports the academic boycott of Israel.

Every time it’s the same goddam story: supporters of Israel, increasingly anxious over the way the conversation about Israel is going in this country, flexing their muscles to muzzle a voice, to stop a debate. (Just today Buzzfeed is reporting that AIPAC is looking for ways to pass federal legislation to stop BDS in its tracks.) A Palestinian exception to the First Amendment?

Thankfully, in Kris’s case, we were able to rally a national campaign of prominent academics, particularly in political science, to support his reinstatement. We made his case a national story. Sound familiar?

And here’s the best part, dear reader: We won.

Since I came onto the interwebs, I’ve been involved in five fights over the place of Israel/Palestine in academe: the Petersen-Overton fight, which we won; the Tony Kushner fight, which we won; the BDS at Brooklyn College fight, which we won, the NYS Assembly fight, which we won, and now the Salaita affair.

There is a Palestinian exception to the First Amendment. And we’re fighting to end it. Because that’s the way the First Amendment has always advanced in this country: not simply through reasoned argument, but through struggle.

September 10, 2014 Posted by | Corruption, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance | , , , , , | Leave a comment

US bans Europol from releasing its own documents to European officials

RT | September 9, 2014

The United States has instructed Europol, the European Union’s police agency, to withhold its own annual internal data-protection review from EU lawmakers because the report was written without the US Treasury Department’s permission.

Europol drafted the data-protection report “without prior written authorisation from the information owner (in this case the Treasury Department),” according to the US, violating “security protocols” that could “undermine the relationship of trust needed to share sensitive information between enforcement agencies.”

The report, drafted by Europol’s Joint Supervisory Body, outlines how data concerning EU citizens and residents is transferred to the US, according to the EUobserver. The document is mainly known to monitor implementation of the EU-US Terrorist Finance Tracking Program, or TFTP. Basically, the US Treasury Department is quite territorial about how the TFTP is adhering to European data protection compliance.

EU ombudsman Emily O’Reilly said Europol refused to allow her to see the report based on US demands. O’Reilly then confronted US ambassador to the EU Anthony Gardner in July. Gardner confirmed the order.

On Thursday, O’Reilly said she sent a letter to the European Parliament asking the body “to consider whether it is acceptable that an agreement with a foreign government should prevent the Ombudsman from doing her job.”

“If the US says ‘No disclosure’ then it won’t be disclosed, which is ridiculous because we are EU citizens, we vote, we pay taxes, we have EU laws, and we decide what happens on this continent. Nobody else,” Dutch MEP liberal Sophie In’t Veld told EUobserver. In’t Veld first requested the report in 2012.

In’t Veld said there is no top-secret information in the report that should be viewed as overly sensitive.

“There is no operational information, there is no intelligence, there is nothing in the document. So you really wonder why it is kept a secret,” she said.

The TFTP has received scrutiny in the last year after documents supplied by former US government contractor Edward Snowden showed mass spying by the US National Security Agency on citizens and officials across the world, including in the EU.

The Snowden leaks showed the NSA had gained a “back door” entrance into the SWIFT servers – SWIFT being a financial-record sharing program, which revealed the banking details of millions of European citizens, despite the fact that access to this financial data was limited by the TFTP.

September 9, 2014 Posted by | Corruption, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

Militarization, Surveillance, and Profit: How Grassroots Groups are Fighting Urban Shield

By Nadia Kayyali | EFF | September 3, 2014

While all eyes are on the disturbing evidence of police militarization in Ferguson, are you paying attention to what’s happening with law enforcement in your own back yard?

In the San Francisco Bay Area, the answer is yes. A coalition of community groups has come together to call attention to Urban Shield, a four-day long “preparedness” exercise for law enforcement and other agencies that will take place from September 4-8.  They’ve organized a week of education, including a march and demonstration outside of the event on Friday, September 5. To these community groups, Urban Shield represents state violence and political repression, not public safety.

The reasons for protesting Urban Shield are clear. It is one of the ways that local law enforcement gets access to, and romanced by, military and surveillance technologies like the ones we’ve seen turned against protesters in Ferguson, as well as low-level crimes, across the country.

Urban Shield is coordinated by the for-profit company Cytel Group, and in addition to training exercises, it also functions as a marketplace and testing site for new militarized technologies. The accompanying trade show includes exhibitors from armored vehicle manufacturers to a “counter-terrorism magazine.” In 2013, companies were encouraged “to place their products and technology directly into the hands of SWAT, Fire, EOD, and EMS professionals.” Vending at Urban Shield is touted as a way to get “invaluable real-time feedback for vendor product[s]” since “at the end of every scenario the teams are questioned concerning the benefits and drawbacks of each piece of technology used in that scenario.” It’s unsurprising that Urban Shield has a “try it out” component for law enforcement, since there is an incredible amount of profit to be made from such products, often with federal funds (i.e. taxpayer dollars) footing the bill.

The event is part of the federal Urban Areas Security Initiative (UASI). UASI is a grant program administered by the federal Department of Homeland Security’s Homeland Security Grant Program (the same program that funds fusion centers). In the San Francisco Bay Area, the grants are coordinated by the Bay Area UASI, a regional coordinating body. UASI grants are supposed to go to “planning, organization, equipment, training, and exercise needs of high-threat, high-density Urban Areas.” The grants have gone to law enforcement agencies all over the country— but the program has been the subject of scathing critique from grassroots groups and lawmakers.

Much of the criticism around UASI is that the grants enable purchases of equipment that no community should adopt without a public conversation. The obvious examples are armored vehicles and so-called “less-lethal” weapons like tear gas and rubber bullets, like those used to violently suppress demonstrators in Ferguson. But UASI funds can also be used to purchase sophisticated surveillance equipment that, absent safeguards, could allow local law enforcement to spy on activists before demonstrations ever take place, or to racially profile people of color in communities like Oakland. Senator Tom Coburn’s 2012 report “Safety at Any Price” lists some of the equipment that has been purchased with UASI money, and it reads like a laundry list of privacy advocates’ concerns: surveillance cameras, mobile fingerprinting devices, automated license plate readers, armored vehicles, and drones. To make matters worse, as Senator Coburn’s report points out, there is no evidence that these purchases make anyone safer.

It should also be noted that Urban Shield is not limited to the San Francisco area. Boston and Austin also participate in similar trainings, as has Jordan. And Jordan isn’t the only international connection. As the Urban Shield website boasts, “In 2014, teams from Singapore and South Korea will participate.” Teams in the past have included the French National Police and teams from Israel, Brazil, Jordan, and Bahrain. Police departments from across the country participate as well, including SWAT teams from Newark, Dallas, Chicago, and Travis County, Texas.

None of this has escaped the attention of organizers, who have made it clear that Urban Shield is linked to surveillance of activists and violence against communities of color across the country, but also to political repression internationally. In their words: “The line between police and military is blurring as parallel military tactics are being deployed globally to repress dissent and increase state control over people who are calling for freedom and justice.”

September 4, 2014 Posted by | Civil Liberties, Full Spectrum Dominance, Militarism, Solidarity and Activism, Timeless or most popular | , , , | Leave a comment

Fake cell phone ‘towers’ may be spying on Americans’ calls, texts

RT | September 3, 2014

More than a dozen “fake cell phone towers” could be secretly hijacking Americans’ mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company claims. It is not clear who controls the devices.

ESD America, which markets heavily-encrypted cell phones built within the body of a Samsung Galaxy S3, said it was able to locate numerous towers intercepting mobile communications – but does not know who is running them.

Speaking to Popular Science, ESD America CEO Les Goldsmith recently said that the company has used its phone – the CryptoPhone 500 – to map 17 different fake cell phone towers, dubbed “interceptors,” across the United States. Locations include New York, Chicago, Los Angeles, Seattle, and more.

“Interceptor use in the US is much higher than people had anticipated,” he told the website. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”

Although these interceptors act as fake cell phone towers, they are not necessarily large, physical structures. They could simply be small mobile devices that act exactly like a real tower, deceiving phones into giving up information. Such devices are known as “stingrays,” after the brand name of one popular type of interceptor.

Satellite dishes and cell phone towers atop a roof of a building (AFP Photo / Thomas Coex)

Once connected to a person’s phone, they can bypass the mobile device’s encryption to either listen in on calls or capture texts. In some cases, they are also powerful enough to take over a device or make it seem as if it has shut down – only to leave the microphone on in order to eavesdrop.

The American Civil Liberties Union has been attempting to pry information about government and police use of stingray equipment, but its efforts have been met with resistance from federal officials.

According to Ars Technica, the Federal Communications Commission pledged in August to investigate the “illicit and unauthorized use” of interceptors – with a primary focus on foreign governments, criminals, and terrorists – but denied a Freedom of Information Act request to reveal more data about current stingray use.

For Goldsmith, determining who is using the interceptors is important. He speculated that the operators could be American agencies or foreign governments.

“What we find suspicious is that a lot of these interceptors are right on top of US military bases. So we begin to wonder – are some of them US government interceptors? Or are some of them Chinese interceptors?” he told PopSci. “Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the US military, or are they foreign governments doing it? The point is: we don’t really know whose they are.”

Outside of national governments, local law enforcement agencies are also beefing up their stingray/interceptor capabilities. In Oakland, California, police are looking to spend hundreds of thousands of dollars to upgrade their cell phone surveillance system.

Meanwhile, police in Tacoma, Washington have caught the eye of civil liberties advocates after the News Tribune revealed they have been using interceptor equipment to catch cell phone calls for the last six years. Some, including Mayor Marilyn Strickland, said it was legitimate for police to do so as long as people’s rights were not violated. However, the ACLU disagreed, arguing it was like “kicking down the doors of 50 homes and searching 50 homes because they don’t know where the bad guy is.”

September 4, 2014 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance | , , , , | Leave a comment