Spy agencies seek to store Aussies’ web-browsing histories, end encryption
RT | March 18, 2014
The Australian Security Intelligence Organization (ASIO) is pushing for laws that would make telecommunications companies retain their customers’ web-browsing data, as well as forcing web users to decrypt encrypted messages.
In these post-Snowden times, when people around the world are furious over revelations that their communications’ ‘metadata’ has been scooped up by a vast, US-built surveillance network, Australia’s ASIO is looking to further bolster its phishing powers, as opposed to scaling them back as many people clearly favor.
With no loss of irony, the agency is pointing to the sensational case of Edward Snowden – the former NSA contractor-turned-whistleblower who last year departed from US shores with thousands of files on the American spy program – to expedite the process of creating a data-retention regime that would store users’ data for two years, or possibly longer.
“These changes are becoming far more significant in the security environment following the leaks of former NSA contractor Edward Snowden,” ASIO said in its parliamentary submission to modify the Telecommunications Interception and Access Act.
Although retaining ‘content’ data has been declared off-limits to the surveillance program, several security agencies, including the Northern Territory Police and Victoria Police, want web-browsing histories stored.
Metadata gathered on web-browsing would include an IP address and the IP addresses of web servers visited, or uniform resource locators (URLs) and the time at which they were visited. Email metadata, meanwhile, might include information such as addresses, times and the subject field.
Australia’s intelligence agencies accessed metadata 330,640 times during criminal and financial investigations in 2012-13, according to The Sydney Morning Herald.
Northern Territory Police said in its submission that meta-data found in browser histories were “as important to capture as telephone records”.
Additionally, the agency is calling for enhanced powers to sift intelligence data from emails and social media sites, as well as forcing web users to decrypt encrypted material if requested to do so by the spy agency.
“Under this approach, the person receiving a notice would be required to provide ‘information or assistance’ to place information obtained under the warrant into an intelligible form,” the submission said.
“The person would not be required to hand over copies of the communication in an intelligible form, and a notice would not compel a person to do something which they are not reasonably capable of doing. Failure to comply with a notice would constitute a criminal offense, consistent with the Crimes Act.”
ASIO points to the Snowden leaks, and the increased popularity of encryption technology on the internet, as a reason for resisting changes.
“In direct response to these leaks, the technology industry is driving the development of new internet standards with the goal of having all web activity encrypted, which will make the challenges of traditional telecommunications interception for necessary national security purposes far more complex.”
However, a number of organizations, including the Australian Mobile Telecommunications Association, the communications lobby group, warned against widening surveillance capabilities and what it means for privacy rights.
“The associations also note that a data retention scheme will involve an increased risk to the privacy of Australians and provide an incentive to hackers and criminals. Data retention is at odds with the prevailing policy to maximize and protect privacy and minimize the data held by organizations,” the submission said.
“Industry believes it is generally preferable for consumers that telecommunications service providers retain the least amount of data necessary to provision, maintain and bill for services.”
ASIO is not only fighting back against any restrictions on its work, it is actually calling for more spying powers.
For example, when the Australian Law Reform Commission argued for the creation of a “public interest monitor” to assert some guidelines on intelligence gathering, ASIO said it “has reservations about this, if the effect would be simply to insert yet another approval step into the authorization of a TI warrant.”
Meanwhile, the Australian Federal Police said it wanted to store data “to ensure a national and systematic approach is taken to safeguarding the ongoing availability of telecommunications data for legitimate, investigative purposes.” At the same time, however, it admitted work needed to be done to understand what type of data got retained and for how long.
Electronic Frontiers Australia, the online rights group, is lobbying against the amendments, arguing that storing web meta-data was “an ineffective method to curb terrorism.”
“The ease with which data retention regimes can be evaded is grossly disproportionate to the cost and security concerns of the data retention regime,” it said.
Meanwhile, the Coalition government’s Attorney-General George Brandis said on Monday that the government was “not currently considering any proposal relating to data retention” despite the push from the country’s intelligence agencies.
Shadow Attorney-General Mark Dreyfus said Labor was waiting for the Coalition’s response to an inquiry that had opened in June of last year before it announces its position.
“There was insufficient time while Labor was in office to formulate a considered response to the matters discussed in the Committee’s report, including the merits of a data retention scheme,” Dreyfus said, as quoted by the paper.

RT’s YouTube channel ‘suspended’ for 3 hours
RT | March 18, 2014

RT’s YouTube channel, which in June last year became the first-ever TV news channel to reach 1 billion views, experienced a temporary shutdown of services on Tuesday, exactly two years after a similar incident.
Google Russia has apologized after a ‘technical mistake’ suspended RT’s YouTube channel Tuesday.
“Access to RT was blocked due to a technical error. The problem has now been resolved, and the channel reopened to users,” said a statement from the company’s Russian office.
Viewers attempting to access the RT YouTube channel were denied access and told: “This account has been suspended due to multiple or severe violations of YouTube’s policy against spam, gaming, misleading content, or other Terms of Service violations.”
Front end services were suspended from around 0700 GMT until shortly before 1000 GMT. The back end administration remains, as of 1300 GMT, inaccessible.
A similar incident, exactly two years ago, kept RT’s YouTube channel offline for about eight hours. YouTube confirmed then it was their mistake and apologized for the incident.
Head of Social Media at RT Ivor Crotty added “As a world leading news producer on YouTube we value timely information and regret the service fail to the half-million people logging on this morning. We look forward to full functionality to this key channel in due course.”
RT began broadcasting in 2005 – the same year YouTube came online – disrupting broadcast news media consensus and creating a savvy online viewer community.

Against Ukraine War? Obama May Seize Your Assets
By Daniel McAdams | Ron Paul Institute | March 14, 2014
Do you, like 56 percent of the US population, believe that the US should “not get too involved” in the Ukraine situation? Do you think that the US administration putting us on a war footing with Russia is a bad idea? Are you concerned that the new, US-backed leaders of Ukraine — not being elected — might lack democratic legitimacy? Are you tempted to speak out against US policy in Ukraine; are you tempted to criticize the new Ukrainian regime?
Be careful what you say. Be careful what you write. President Obama has just given himself the authority to seize your assets.
According to the president’s recent Executive Order, “Blocking Property of Certain Persons Contributing to the Situation in Ukraine”, the provisions for seizure of property extend to “any United States person.” That means “any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.”
Declaring a “national emergency” over the planned referendum in Crimea to determine whether or not to join Russia, the US president asserts that asset seizure is possible for any US person “determined by the Secretary of the Treasury, in consultation with the Secretary of State”:
(i) to be responsible for or complicit in, or to have engaged in, directly or indirectly, any of the following:
(A) actions or policies that undermine democratic processes or institutions in Ukraine;
(B) actions or policies that threaten the peace, security, stability, sovereignty, or territorial integrity of Ukraine; or
(C) misappropriation of state assets of Ukraine or of an economically significant entity in Ukraine;
The Executive Order is, as usual, so broadly written that it leaves nearly everything open to interpretation.
For example, what are “direct or indirect…actions or policies that threaten the peace, security, stability, sovereignty, or territorial integrity of Ukraine”? Could that be someone writing an article that takes issue with the US policy that the Crimea referendum is illegal and illegitimate? Could it be standing up in a public meeting and expressing the view that Ukraine would be better off with nationwide referenda to determine whether other regions should become autonomous or joined to neighboring countries? What if a Polish-American appears on a radio or television program suggesting that parts of Poland incorporated into Ukraine after WWII should be returned to Polish authority?
Probably the president will not seize the assets of Americans in the scenarios above. But he says he can.
As the US government moves ever-closer to war with Russia, it is reasonable to expect these attempts to squash dissent and to remove “threats” to the administration’s position. The historical pattern is clear.
Recall Eugene V. Debs sentenced to ten years in prison for his opposition to US involvement in WWI. Recall Japanese-Americans interned in camps during WWII because their loyalty to the United States was deemed suspect.
The stage is being set to silence dissent. It sounds alarmist to read this, agreed.
Probably the president will not use his Executive Order to seize the assets of Americans who disagree with his Ukraine policy. But he says he can.

Law Enforcement Agencies All Over California Have Been Secretly Using Stingray Devices
By Tim Cushing | Techdirt | March 14, 2014
More documents have been uncovered (via FOI requests) that show local law enforcement agencies in California have been operating cell phone tower spoofers (stingray devices) in complete secrecy and wholly unregulated.
Sacramento News10 has obtained documents from agencies in San Jose, Oakland, Los Angeles, San Francisco, Sacramento and Alameda County — all of which point to stingray deployment. As has been the case in the past, the devices are acquired with DHS grants and put into use without oversight or guidelines to ensure privacy protections. The stingrays in use are mainly limited to collecting data, but as the ACLU points out, many manufacturers offer devices that also capture content.
Some of these agencies have had these devices for several years now. Documents obtained from the Oakland Police Dept. show the agency has had stingrays in use since at least 2007, citing 21 “stingray arrests” during that year. This is hardly a surprising development as the city has been pushing for a total surveillance network for years now, something that (until very recently) seemed to be more slowed by contractor ineptitude than growing public outrage.
The device manufacturer’s (Harris) troubling non-disclosure agreement (which has been used to keep evidence of stingray usage out of court cases as well as has been deployed as an excuse for not securing warrants) rears its misshapen head again, mentioned both in one obtained document as well as by a spokesperson reached for comment. One document states:
“The Harris (REDACTED) equipment is proprietary and used for surveillance missions,” the agreement reads. “Its capabilities can only be discussed with sworn law enforcement officers, the military or federal government. This equipment’s capabilities are not for public knowledge and are protected under non-disclosure agreements as well as Title 18 USC 2512.”
The Sacramento County Sheriff’s Dept. had this to (not) say when asked about its stingray usage:
“While I am not familiar with what San Jose has said, my understanding is that the acquisition or use of this technology comes with a strict non-disclosure requirement,” said Under sheriff James Lewis in an emailed statement. “Therefore it would be inappropriate for us to comment about any agency that may be using the technology.”
Law enforcement agencies are conveniently choosing to believe a manufacturer’s non-disclosure agreement trumps public interest or even their own protection of citizens’ Fourth Amendment rights.
The devices aren’t cheap, either. Taxpayers are shelling out hundreds of thousands of dollars for these cell tower spoofers, and the agencies acquiring them are doing very little to ensure the money is spent wisely. ACLU’s examination of the documents shows that many of the agencies purchased devices without soliciting bids.
It’s hard to know whether San José or any of the other agencies that have purchased stingray devices are getting good value for their money because the contract was “sole source,” in other words, not put out to competitive bidding. The justification for skirting ordinary bidding processes is that Harris Corporation is the only manufacturer of this kind of device. (We are aware of other surveillance vendors that manufacture these devices, though a separate Freedom of Information Request we submitted to the Federal Communications Commission suggests that, as of June 2013, the only company to have obtained an equipment authorization from the FCC for this kind of device is Harris.)
With Harris effectively locking the market down, buyers are pretty much ensured prices far higher than the market would bear if opened to competition. (Not that I’m advocating for a robust surveillance device marketplace, but if you’re going to spend taxpayers’ money on products to spy on them, the least you can do is try to get the best value for their money… ) Using federal grants also allows these departments to further avoid public scrutiny of the purchase and use by circumventing the normal acquisition process.
Beyond the obvious Fourth Amendment concerns looms the very real threat of mission creep. These agencies cite combating terrorism when applying for federal funds, but put the devices to use for ordinary law enforcement purposes. The documents cite stingray-related arrests, but since so little is known about the purchase, much less the deployment, there’s really no way to tell how much data and content totally unrelated to criminal investigations has been collected (and held) by these agencies.

Chicago’s Columbia College cancels class because of 5 Broken Cameras screening
Petition
This petition is in protest of Columbia College’s decision, following a student complaint about “bias,” to cancel one of the two sections of a course about the history of the Israeli-Palestinian conflict. The course is well grounded in fact and presents a diverse overview of Israeli/Palestinian history, including interviews with both Israelis and Palestinians. The class receives overwhelmingly positive evaluations by students, and many report having to wait to get in to the class. After registration opened last November, however, Columbia College removed its second section of the course only hours after it was posted.
After Professor Chehade’s in-class screening of the Oscar-nominated film 5 Broken Cameras, which depicts life under and popular resistance to Israeli military occupation, a student complained about “bias.” Dr. Steven Corey, the chair of the Department of Humanities, History, and Social Sciences, then held a meeting with Professor Chehade informing him that he should address the subject matter in a more “balanced” way.
Showing a movie depicting popular resistance to Israeli occupation does not constitute bias, and retaliating against a professor for engaging students about pressing social issues is a blatant violation of academic freedom. Furthermore, professors are not obligated to present an opposing view to every opinion or fact presented in class. Columbia College’s own academic freedom policies protect professors against such interference. The cancelation also restricts Columbia students from participating in learning and discussion about Israel-Palestine, a topic for which they have demonstrated a clear interest.
Help defend academic freedom by signing this petition telling Columbia College to reinstate and maintain the course offerings of Professor Chehade’s Israeli-Palestinian Conflict class.
To: Dr. Louise Love, Provost, Columbia College
Dr. Deborah Holdstein, Dean, School of Liberal Arts and Sciences
Dr. Steven Corey, Chair, Dept. of Humanities, History, & Social Sciences
We, the undersigned, wish to express our grave concern about Columbia College’s retaliation against Professor Iymen Chehade for the content of his course, The Israeli-Palestinian Conflict.
The circumstances suggest that the college’s decision was not based on legitimate academic considerations, but rather avoidance of controversy and the desire to keep Columbia courses from straying from the mainstream discourse.
This attempt to stifle the discussion of Israel and Palestine is a violation of academic freedom and a disservice to the academic community and to Columbia’s students. As such, we, the undersigned, urge the administration at Columbia College to uphold its commitment to academic freedom and to its students by reinstating and maintaining the course offerings of Professor Chehade’s Israeli-Palestinian Conflict course.

CIA: We Only Spied On Senate Intelligence Committee Because They Took Classified Documents That Prove We’re Liars
By Mike Masnick | Techdirt | March 7, 2014
Earlier this week, we wrote about the accusations that the CIA was spying on Senate staffers on the Senate Intelligence Committee as they were working on a massive $40 million, 6,300-page report condemning the CIA’s torture program. The DOJ is apparently already investigating if the CIA violated computer hacking laws in spying on the Senate Intelligence Committee computers. The issue revolved around a draft of an internal review by the CIA, which apparently corroborates many of the Senate report’s findings — but which the CIA did not hand over to the Senate. This internal report not only supports the Senate report’s findings, but also shows that the CIA has been lying in response to questions about the terror program.
In response to all of this, it appears that the CIA is attempting, weakly, to spin this as being the Senate staffers’ fault, arguing that the real breach was the fact that the Senate staffers somehow broke the rules in obtaining that internal review. CIA boss John Brennan’s statement hints at the fact that he thinks the real problem was with the way the staffers acted, suggesting that an investigation would fault “the legislative” branch (the Senate) rather than the executive (the CIA).
In his statement on Wednesday Brennan hit back in unusually strong terms. “I am deeply dismayed that some members of the Senate have decided to make spurious allegations about CIA actions that are wholly unsupported by the facts,” Brennan said.
“I am very confident that the appropriate authorities reviewing this matter will determine where wrongdoing, if any, occurred in either the executive branch or legislative branch,” Brennan continued, raising a suggestion that the Senate committee itself might have acted improperly.
A further report detailed what he’s talking about. Reporters at McClatchy have revealed that the Senate staffers working on this came across the document, printed it out, and simply walked out of the CIA and over to the Senate with it, and the CIA is furious about that. Then, in a moment of pure stupidity, the CIA appears to have confronted the Senate Intelligence Committee about all of this… directly revealing that they were spying on the Committee staffers.
Several months after the CIA submitted its official response to the committee report, aides discovered in the database of top-secret documents at CIA headquarters a draft of an internal review ordered by former CIA Director Leon Panetta of the materials released to the panel, said the knowledgeable person.
They determined that it showed that the CIA leadership disputed report findings that they knew were corroborated by the so-called Panetta review, said the knowledgeable person.
The aides printed the material, walked out of CIA headquarters with it and took it to Capitol Hill, said the knowledgeable person.
“All this goes back to what is the technical structure here,” said the U.S. official who confirmed the unauthorized removal. “If I was a Senate staffer and I was given access to documents on the system, I would have a laptop that’s cleared. I would be allowed to look at these documents. But with these sorts of things, there’s generally an agreement that you can’t download or take them.”
The CIA discovered the security breach and brought it to the committee’s attention in January, leading to a determination that the agency recorded the staffers’ use of the computers in the high-security research room, and then confirmed the breach by reviewing the usage data, said the knowledgeable person.
There are many more details in the McClatchy report, which I highly recommend reading. And, yes, perhaps there’s an argument that Senate staffers weren’t supposed to take such documents, but the CIA trying to spin this by saying it was those staffers who were engaged in “wrongdoing” is almost certainly going to fall flat with Congress. After all, the intelligence committee is charged with oversight of the CIA, not the other way around. “You stole the documents we were hiding from you which proved we were lying, so we spied on you to find out how you did that” is not, exactly, the kind of argument that too many people are going to find compelling.
Still, the latest is that the CIA has successfully convinced the DOJ to have the FBI kick off an investigation of the Senate staffers, rather than of the CIA breaking the law and spying on their overseers.
Of course, the CIA may still have one advantage on its side: there are still some in Congress who are so supportive of the intelligence community itself that even they will make excuses for the CIA spying on their own staff. At least that seems to be the response from Senate Intelligence vice chair Senator Saxby Chambliss, one of the most ardent defenders of the intelligence community he’s supposed to be watching over. When asked about all of this, he seemed to be a lot more concerned about the staffers supposedly taking “classified” documents than about the CIA spying on those staffers:
“I have no comment. You should talk to those folks that are giving away classified information and get their opinion,” Intelligence Committee Vice Chairman Saxby Chambliss (R-Ga.) said when asked about the alleged intrusions.
Related articles

Bringing SOPA to the Trans-Pacific Partnership
Robert Holleyman in the Seat
By Binoy Kampmark | Dissident Voice | March 6, 2014
The machinery to dominate global intellectual property by American fiat was further tightened by the announcement of Robert Holleyman as deputy US trade representative. President Obama’s announcement is just another reminder of what sources of inspiration are governing the drive by Washington to control the downloading and dissemination of information via the Trans-Pacific Partnership. After all, Holleyman was a former lobbyist of the Stop Online Piracy Act (SOPA), the bill introduced by US Rep. Lamar S. Smith (R-Tx) to gift US law enforcement authorities with the means to combat copyright infringements.
Indeed, Holleyman’s own blurb as an author for The Huffington Post considers him as “one of the 50 most influential people in the intellectual property world”, an individual who “was instrumental in putting into place the global policy framework that today protects software under copyright law.” Such is the nature of mislabelled internationalism – Washington’s policy by another name.
Holleyman has also been heavily involved as a former president of the Business Software Alliance, a body representing the main software vendors including Apple, IBM, and Microsoft. Through the consortium, Holleyman unintentionally put the problems of SOPA, and its sister legislation, PROTECT-IP, in the bright spotlight. He found himself fighting, at least for a time, a losing battle. Protest against them was extensive, with January 18, 2012 featuring the “largest online protest in history”. Congress took heed, shelving the bills. The vendors pondered the next move.
SOPA’s reach would have been global, enabling US law enforcement the means to target websites and individuals outside its jurisdiction. The carceral provisions of the bill were also hefty – five year prison terms for downloading unauthorised content.
It would have also been a rather formidable mechanism to insinuate censorship into the Internet. The legislation would allow the content provider or the US Justice Department to block sites hosting material supposedly in breach of copyright. Having such a provision would effectively overburden internet service providers to err on the side of caution and “over-block” material. If ever you want to enshrine censorship, a fine way of doing so is frightening the hosts into censoring themselves.
The secret negotiations of the TPP have proven to be a feast of select company. The negotiators themselves, such as Stefan Selig, nominee for under-secretary for international trade at the Commerce Department, have a direct line to the Bank of America. Selig’s accounts have been inflated to the tune of $9.1 million in bonus pay and $5.1 million in incentive pay. Happy is the bank that can sue for diminished assets and target governments in courts of law.
The clubbable ones are the software demons who have been “cleared” to have briefings, some 700 “stakeholders”. The “cleared advisors” also represent groups such as the Pharmaceutical Research and Manufacturers of America, the Entertainment Software Association, and the Recording Industry Association of America.
While the premise of having such vendors involved is ostensibly to protect innovation, the converse is true. The world of innovation does not matter to those who claim they have the ideas and want to protect them at cost. That is a recipe for sloppiness and envy.
The anti-democratic slant in the TPP process has also impressed itself upon observers. The press, and even members of Congress, have been kept at bay. Till parts of the treaty were published by WikiLeaks, elected officials could only view the document on visiting the Trade Representative Office. They would not be able to reproduce or transcribe it.
While SOPA and its twin PIPA were shelved indefinitely, the Obama administration has decided to shop in other forums to enforce some of their provisions. One way of doing so is through the faulty premise of free trade, which is simply another way of making some trade freer than others. The American firm features prominently in that guise of freedom.
Aspects of the leaked intellectual property chapter of the TPP so far indicate a model with SOPA trimmings. Provisions, for example, holding ISPs liable for hosting copyright infringement, have been preserved. The life of certain, corporate-owned copyrights will also be extended. In other words, this is SOPA by stealth, a process that “could not [be] achieved through an open democratic process.”
The fact that the Obama administration has also sought to sideline Congress in the debate is indicative of that. As Henry Farrell observed, “The United States appears to be using the non-transparent Trans-Pacific Partnership negotiations as a deliberate end run around Congress on intellectual property, to achieve a presumably unpopular set of policy goals.” Senate Democrats have been mindful of their shrinking role, and have blocked the president’s attempt to obtain “fast-track authorisation”.
The effect of such authorisation would give the administration scope to limit congressional consultation while using its prerogative powers. Congress would become, in effect, a chamber of marionettes. Appointments such as Holleyman’s show little change of heart away from that policy. The copyright vanguard, along with the dance of secrecy, is digging its heels in.
Binoy Kampmark was a Commonwealth Scholar at Selwyn College, Cambridge. He lectures at RMIT University, Melbourne and can be reached at: bkampmark@gmail.com.
Related articles

GCHQ Oversight Tribunal Has To Ask GCHQ’s Permission To Reveal GCHQ’s Wrongdoing
By Glyn Moody | Techdirt | March 7, 2014
One of the key themes to emerge in the debate about surveillance is the oversight of the agencies involved, and to what extent it is effective. In the US, that has been put into stark relief by news that the committee that is supposed to keep an eye on the spies was itself spied upon. And now over in the UK, we learn that things are just as bad when it comes to the equivalent oversight body, the Investigatory Powers Tribunal (IPT). Its powers sound impressive:
The Tribunal can investigate complaints about any alleged conduct by, or on behalf of, the Intelligence Services – the Security Service (sometimes called MI5), the Secret Intelligence Service (sometimes called MI6) and GCHQ (Government Communications Headquarters).
The scope of conduct the IPT can investigate concerning the Intelligence Agencies is much broader than it is with regard to the other public authorities. The IPT is the only Tribunal to whom complaints about the Intelligence Services can be directed
Unfortunately, the IPT’s credibility as the public’s watchdog for the intelligence services has just been seriously undermined by the following information published by The Guardian :
A controversial court that claims to be completely independent of the British government is secretly operating from a base within the Home Office, the Guardian has learned.
The Investigatory Powers Tribunal, which investigates complaints about the country’s intelligence agencies, is also funded by the Home Office, and its staff includes at least one person believed to be a Home Office official previously engaged in intelligence-related work.
It gets worse:
the IPT will not say whether GCHQ had disclosed the existence of its bulk surveillance operations, which attempt to capture the digital communications of everybody — including those people who complain to the tribunal.
Nor will it disclose whether it has issued any secret ruling on the lawfulness of those operations, on the grounds that the rules under which it operates stipulate that it cannot do so without the permission of GCHQ itself. It has not sought that permission on grounds it knows it would not be given.
So the body tasked with overseeing GCHQ has to get GCHQ’s permission before it can reveal any wrongdoing by GCHQ, which it doesn’t bother doing when it knows it would be refused. Isn’t oversight a wonderful thing? Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Homeland Security Detained US Citizen Inside The US, Used Intercepted Emails To Quiz Her About Her Sex Life
By Mike Masnick | Techdirt | March 6, 2014
Just recently, we wrote about how the Department of Homeland Security’s (DHS) Customs and Border Patrol (CBP) has been increasingly detaining and harassing people at the border (or near the border) under highly questionable circumstances — and then refusing to comment on any of it. Instead, CBP has relied on a cloak of secrecy to live outside the law, acting out what we’ve come to expect from authoritarian police states. Recently, the ACLU filed a lawsuit on behalf of a woman, Christine Von Der Haar, who is a senior lecturer at Indiana University, after CBP detained her at the airport.
She was not entering or leaving the country. She was not even boarding a flight. She merely accompanied a friend to the airport so that he could retrieve some computer equipment that he had shipped separately a few days earlier. After detaining Von Der Haar, CBP officials, who clearly had access to some of the emails Von Der Haar and her friend had sent back and forth, quizzed her about her sex life and if she was planning to marry the friend.
CBP appeared to be concerned that the friend, a Greek national named Dimitris Papatheodoropoulos, was trying to stay in the country illegally. Von Der Haar had first met Papatheodoropoulos 40 years earlier while studying abroad, and the two had recently reconnected thanks to the internet. Papatheodoropoulos had obtained a B1/B2 business/leisure visa to the US which actually let him enter and leave the country for a period of 10 years. He came to the US for business, but while there also wished to visit Von Der Haar since they’d been catching up online.
After detaining and questioning Papatheodoropoulos for some time, CBP officials took Von Der Haar into another room and started asking questions specific to the emails between the two of them. According to the lawsuit:
Given that Mr. Papatheodoropoulos had retained his hard drive that contained the emails, the only way that the Customs and Border Protection Agents could have reviewed the emails is for someone to have surreptitiously monitored the communications between Dr. Von Der Haar and Mr. Papatheodoropoulos and reported those communications to the agents questioning her. Defendant Lieba admitted that employees of the United States had read email communications between Dr. Von Der Haar and Mr. Papatheodoropoulos.
This raises all sorts of serious questions. As the post at Papers Please (linked above) notes:
CBP officers grossly exceeded their jurisdiction. Dr. Dr. Von Der Haar’s US citizenship was never questioned; she wasn’t trying to enter, leave, or ship and goods in or out of the country; and she was never accused of any crime. In general, immigration (as distinct from customs) offenses are handled by Immigration and Customs Enforcement (ICE) and the Border Patrol, not CBP. We’re curious what basis CBP will claim for its officers’ authority to detain and interrogate Dr. Dr. Von Der Haar or obtain her email.
The post also wonders how or why CBP got access to those emails, wondering if they were shared by the NSA. There are, of course, other possible explanations as various investigations may have resulted in CBP getting access to the emails separately, but it still raises serious questions about under what authority those emails were obtained and why she was then quizzed about her sex life.
The claims that officials made about Papatheodoropoulos were equally questionable. Again, from the lawsuit:
Customs and Border Protection agents seized Mr. Papatheodoropoulos’ passport.
On June 8, 2012, Mr. Papatheodoropoulos was served with notice that a proceeding was initiated against him for removal from the United States. The notice stated, in relevant part:
You obtained your B1/B2 visa by misrepresenting your intentions to come to the United States to wit; It is your intention to immigrate to the United States, you abandoned your foreign residence, you intend to overstay your admission to the United States.
None of this was true.
Mr. Papatheodoropoulos consulted with lawyers and the Greek Consulate in Chicago and the removal action did not proceed.
His passport was returned to him and he left the United States at the end of August of 2012 and has not returned
The whole thing seems ridiculous yet again, and you can expect DHS to use its standard cloak of secrecy. I’m sure they’ll argue some sort of state secrets or national security claim to try to get the entire case thrown out.

CIA Probed for Possibly Spying on Congress
ACLU | March 5, 2014
WASHINGTON – The CIA’s inspector general is investigating whether the agency may have been monitoring the computer usage of Senate Intelligence Committee staff members, according to articles today by The New York Times and McClatchy. The inspector general’s office has reportedly referred the matter to the Justice Department for criminal investigation.
Christopher Anders, senior legislative counsel with the American Civil Liberties Union, had this reaction:
“If it turns out that the CIA was spying on the Senate committee that oversees the agency, it would be an outrageous violation of separation of powers. The CIA is prohibited from spying in the United States itself, and there can be few greater violations of that rule than spying on congressional staff carrying out the constitutional duty of being a check on the CIA’s powers. CIA surveillance of Congress would be another sign that the intelligence community has come to believe that they are above the law, and should get only deference from the other branches of government, not the meaningful oversight that’s required by the Constitution. Checks and balances, especially for agencies like the CIA and NSA that have many secret operations, are essential for democratic government. At the very least, these reports should spur the committee to vote quickly for the declassification and release of its full report into the CIA’s torture program so the American people can see what it is that the CIA is so eager to hide.”
In December 2012, the committee adopted a 6,000-page report on the CIA’s Bush-era rendition, secret detention, and torture program. The report concluded that abusive methods were ineffective, and the CIA wrote an extensive response, countering many of the Senate report’s conclusions. There is also a secret CIA report commissioned by former CIA Director Leon Panetta, which is reportedly consistent with the Senate report findings and contradicts the CIA’s response to the Senate report. All three reports are classified.
Related articles

Remove children of suspected radical Muslims: Boris
Press TV – March 5, 2014
London Mayor Boris Johnson says Muslim children with suspected radical parents must be removed from their families, causing controversy amongst the city’s Muslim community.
The London mayor made the remarks in his weekly Daily Telegraph column published on Monday.
He alleged that some Muslim children were being “taught crazy stuff” similar to the views expressed by the two men who killed British soldier Lee Rigby on a south-east London street in May 2013.
In a later interview however, when asked if the children of the UK’s far-right British National Party (BNP) activists should also be removed from their families, Johnson said this should be done in “extreme” cases.
The Muslim Council of Britain warned that Johnson’s remarks risked provoking anti-Muslim sentiment across the UK.
“The people responsible for the murder of Lee Rigby were not sons of radical extremists, nor were those who committed previous atrocities. To tackle their extremism we need to look beyond the need to generate easy headlines,” the council said.
Britain’s largest force, the Metropolitan Police, recorded 500 anti-Muslim crime cases across the country in 2013.
Attacks against Muslims have soared in the UK since the murder of Rigby by Michael Adebolajo and Michael Adebowale, who reportedly killed the soldier in “retaliation for the deaths of Muslims in Afghanistan at the hands of British troops.”







Leftist commentators consistently push a shallow and economically reductive narrative that frames American foreign policy as the sole domain of greedy White capitalists while choosing to ignore the obvious Jewish power structure directing these events. When the veneer of this supposed corporate imperialism is stripped away, it becomes clear that the United States has often served as a vehicle for the specific goals of organized Jewry. The life of Samuel Zemurray stands as prime evidence of this hidden mechanism.