US electronic surveillance in Mexico reportedly targeted top officials, including both current and previous presidents. Intelligence produced by the NSA helped Americans get an upper hand in diplomatic talks and find good investment opportunities.
The US National Security Agency was apparently very happy with its successes in America’s southern neighbor, according to classified documents leaked by Edwards Snowden and analyzed by the German magazine, Der Spiegel. It reports on new details of the spying on the Mexican government, which dates back at least several years.
The fact that Mexican President Peña Nieto is of interest to the NSA was revealed earlier by Brazilian TV Globo, which also had access to the documents provided by Snowden. Spiegel says his predecessor Felipe Calderon was a target too, and the Americans hacked into his public email back in May 2010.
The access to Calderon electronic exchanges gave the US spies “diplomatic, economic and leadership communications which continue to provide insight into Mexico’s political system and internal stability,” the magazine cites an NSA top secret internal report as saying. The operation to hack into the presidential email account was dubbed “Flatliquid” by the American e-spooks.
The bitter irony of the situation is that Calderon during his term in office worked more closely with Washington than any other Mexican president before him. In 2007 he even authorized the creation of a secret facility for electronic surveillance, according to a July publication in the Mexican newspaper, Excelsior.
The surveillance on President Nieto started when he was campaigning for office in the early summer of 2012, the report goes on. The NSA targeted his phone and the phones of nine of his close associates to build a map of their regular contacts. From then it closely monitored those individuals’ phones as well, intercepting 85,489 text messages, including those sent by Nieto.
After the Globo TV report, which mentioned spying on Mexico only in passing, Nieto stated that US President Barack Obama had promised him that he would investigate the accusations and punish those responsible of any misconduct. The reaction was far milder than that from Brazilian President Dilma Rouseff, another target of NSA’s intensive interest, who has since canceled a planned trip to the US and delivered a withering speech at the UN General Assembly, which condemned American electronic surveillance.
Another NSA operation in Mexico dubbed “Whitetamale” allowed the agency to gain access to emails of high-ranking officials in country’s Public Security Secretariat, a law enforcement body that combats drug cartels and human trafficking rings. The hacking, which happened in August 2009, gave the US information about Mexican crime fighting, but also provided access to “diplomatic talking-points,” an internal NSA document says.
In a single year, this operation produced 260 classified reports that facilitated talks on political issues and helped the Americans plan international investments.
“These TAO [Tailored Access Operations – an NSA division that handles missions like hacking presidential emails] accesses into several Mexican government agencies are just the beginning – we intend to go much further against this important target,” the document reads. It praises the operation as a “tremendous success” and states that the divisions responsible for this surveillance are “poised for future successes.”
Economic espionage is a motive for NSA spying, which the agency vocally denied, but which appears in the previous leaks. The agency had spied on the Brazilian oil giant, Petrobras, according to earlier revelations. This combined with reports that the NSA hacked into the email of Brazilian President Dilma Rouseff, triggered a serious deterioration of relations between the two countries.
While the NSA declined comment to the German magazine, the Mexican Foreign Ministry replied with an email, which condemned any form of espionage on Mexican citizens. The NSA presumably could read that email at the same time as the journalists, Der Spiegel joked.
[Note: Since the lifting of the federal court gag order on October 2, Ladar Levison and his company, Lavabit, have been getting some media attention (including a somewhat snide and incomplete story on page one of the New York Times). What follows in an effort to reconstruct at least the outline of a personal nightmare inflicted by our government on a small business owner who had done no wrong, even in the government’s eyes – at least until he started taking his constitutional rights seriously.]
The Fourth Amendment of the U. S. Constitution is anti-police-state
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” [emphasis added]
The founding document of the United States is inherently suspicious of a government’s willingness to abuse its powers, a suspicion rooted in centuries of tyranny around the world. Even the U.S. government, as well as state and local governments, have abused their powers from time to time since the country’s beginning. The drift toward an American police state intensified under the guise of anti-Communism, but that was mostly a convenient cover for state intrusion into people’s lives. The Soviet Union collapsed, but the nascent American police state kept growing. The Patriot Act of 2001, a massive assault on personal and political liberty, was largely written before 9/11 and passed, largely unexamined, in the hysterical atmosphere and raw panic of that over-hyped “new Pearl Harbor.”
Now we have a police state apparatus of almost unimagined dimension, most of which is kept secret and remains unknown, despite the efforts of a few reporters and whistle blowers, who tell the truth at their personal peril.
The “American police state” is likely an abstraction in the minds of many people, and as long as they remain unknowing and passive, it’s likely to leave them alone. But even law-abiding innocence is not a sure protection of a person’s right to be secure. And when the police state comes after you in one of its hydra-headed forms, the assault can be devastating.
For starters, the state won’t always tell you when it begins
The intrusion of the police state into your life can shatter your world even before you realize it’s begun. Fight it, or surrender to it, the cost is huge. Recovery may be possible, eventually, if it’s ever allowed, but it will be hard, and it will take time.
In May 2013, Ladar Levison was 32 when the police state first came after him. The dreaded “knock on the door” was actually only an FBI business card on his door at home. And Levison’s initial interactions with the FBI were reportedly mild and civil, at first by email and later in person. The FBI was interested in Levision because he owned and operated a secure email service called Lavabit. From the FBI point of view, Lavabit was too secure, because the NSA and the rest of the security state couldn’t get into it.
Right out of college, Levison had started Lavabit as a sole proprietorship in April 2004 (the same month Google launched Gmail at a much greater scale). Having grown up in San Francisco, Levison studied computer science at Southern Methodist University in Dallas, where he still lives. While working on his start-up, he supported himself mostly with internet security projects for financial services. He also worked as a consultant on website development for clients such as Dr Pepper, Nokia, and Adidas.
What Lavabit was selling was secure email, much more secure than anything Google, Microsoft, or most other email providers were offering. The demand was not that great at first. It took six years for Lavabit to gather enough paying subscribers to allow Levison to devote himself to the business full time in 2010. Even when the FBI became interested in Lavabit in May 2013, it was still a small company, with two employees and about 400,000 subscribers. But one of those subscribers was another American about Levison’s age, 30-year old Edward Snowden, the whistleblower whose leaked documents have added so much to our understanding of the dimensions and activities of the American police state. Snowden opened his moc.tibaval@nedwonsde email account in 2010.
Political repression may not be the government’s overt intent, but it works
At this point, there’s no indication that Levison and Lavabit ever had anything but a commercial relationship with Snowden. It’s even possible that Snowden had nothing to do with the FBI’s initial interest in Lavabit. It may be that Lavabit’s effective security was sufficient offense to the surveillance forces to make it an object of attack for its own sake. In May 2013, Levison says he had the impression the FBI agents who talked to him didn’t even know who or what was the subject of their investigation. The FBI hasn’t said.
Levison is not an obviously political person, he hasn’t been revealed to be involved in party politics or political causes. “Until last summer, Mr. Levison, a Republican of libertarian leanings, had not been active in politics,” according to the New York Times October 9. He seems to be the person he seems to be: a thoughtful, hardworking, physically fit, computer business guy who has had a dog named Princess since January 2010 and who spends a lot of his spare time keeping in shape playing beach volleyball.
Princess has her own album on his Facebook page, where the dominant theme by far is Levison’s competition in beach volleyball (with albums for Sunday Night, as well as Monday, Tuesday, Wednesday, and Thursday Nights) and there is one picture of Levison with Rep. Ron Paul. Levison’s page shows membership in just one Facebook group, “OCCUPY (Support) EDWARD SNOWDEN and All Other Whistleblowers,” to which someone else added him about two months ago. Among his 43 “Likes,” Levison lists two Interests (programming and computers), lots of volleyball Activities, and six books, including William Gibson’s Neuromancer, George Orwell’s 1984, and Dostoevski’s Crime and Punishment.
From another perspective, Levison is as political as the Fourth Amendment, which is as profoundly political as it gets. It was the Patriot Act’s assault on the Fourth Amendment, Levison says, that contributed to his decision to start Lavabit in 2004, when the act was up for renewal and much in the news. Among the many objections to the act was that it gave to federal agents excessive authority to, in effect, write their own search warrants on no other authority but their own. In the Orwellian language of the act, these personal searched warrants are known as “national security letters.” Levison designed the security architecture of the Lavabit email and storage services to be beyond the reach of unwarranted searches, even in national security letters. As Levison recalled on Democracy Now! in August:
“And as I was designing and developing the custom platform, it was right around when the PATRIOT Act came out. And that’s really what colored my opinion and my philosophy, and why I chose to take the extra effort and build in the secure storage features and sort of focus on the privacy niche and the security focus niche…. [for] people who want email but don’t necessarily want it lumped in and profiled along with their searches or their browsing history or any of their other Internet activities.”
You can’t reveal what you don’t know – and that provides more security
During May 2013, Levison met for “a couple hours” with FBI agents at his office, where he explained how his security system and his business operated. As Levison told Democracy NOW! the service included his personal pledge of security:
“I’ve always liked to say my service was by geeks, for geeks. It’s grown up over the last 10 years, it’s sort of settled itself into serving those that are very privacy-conscious and security-focused. We offered secure access via high-grade encryption. And at least for our paid users, not for our free accounts—I think that’s an important distinction—we offered secure storage, where incoming emails were stored in such a way that they could only be accessed with the user’s password, so that, you know, even myself couldn’t retrieve those emails.
“And that’s what we meant by encrypted email. That’s a term that’s sort of been thrown around because there are so many different standards for encryption, but in our case it was encrypted in secure storage, because, as a third party, you know, I didn’t want to be put in a situation where I had to turn over private information. I just didn’t have it. I didn’t have access to it.”
Over the years, Lavabit has received and complied with “at least two dozen subpoenas” from the local sheriff’s office to the federal courts, Levison says, “I’ve always complied with the law.” Each of those subpoenas targeted a specific individual and appeared to Levison to be consistent with the Fourth Amendment. As recently as June 2013, he complied with an unrelated subpoena seeking information on one of his subscribers accused of violating child pornography law.
A secret subpoena from the American police state is different
On June 6, 2013, the Guardian began publishing surveillance state revelations based on documents from Edward Snowden, the Lavabit.com email subscriber. On June 9, Snowden revealed that he was the whistlblower who leaked documents to the Guardian and others. The first secret court order against Lavabit came the next day.
On or about June 10, the Justice Dept., on behalf of the FBI, went to federal court to compel Lavabit to provide information “relevant and material to an ongoing criminal investigation” involving someone with a single Lavabit email account. The FBI has not identified the subject of this investigation, but it is widely believed to be Snowden.
The United States District Court for the Eastern District of Virginia (the Fourth Circuit) granted the FBI’s request and issued the disclosure order against Lavabit that same day. A one-page, single-spaced attachment to the order listed the categories of information to be disclosed, including names, addresses, phone records, other subscriber identities, billing records, activity records, and “information about each communication” – in other words, everything about the email account “not including the contents of communications.” The order did not mention encryption keys, SSL keys, or the like. These are closely guarded secrets in a security business like Lavabit.
The U.S. Magistrate Judge who signed the initial order gave Lavabit 10 days to comply. He also sealed the court records from public view and further ordered that Lavabit “shall not disclose the existence of the application of the United States, or the existence of this order” to anyone except “an attorney for Lavabit.” In other words, Levison was subject to a gag order before he ever found out the FBI was definitely coming after him.
In the meantime, on June 14, the Justice Dept. filed a sealed criminal complaint against Snowden, who was then in Hong Kong. The government accused him of three offenses – theft of government property and two forms of “unauthorized communication” the Espionage Act of 1917. The criminal complaint, which was made public a week later, gave the government 60 days to file a formal indictment.
Getting unsatisfying compliance, the FBI decided to raise the stakes
According to a later Justice Dept. filing: “Mr. Levison received that order on June 11, 2013. Mr. Levison responded by mail, which was not received by the government until June 27, 2013. Mr. Levison provided very little of the information sought….” [emphasis added]
On June 28, the day after getting Levison’s belated response to the June 10 order, the Justice Dept. went back to the Fourth Circuit Court in Alexandria seeking an order “authorizing the installation and use of a pen register/trap device on an electronic mail account” – an FBI wiretap on email. Levison had no notice of the government motion and no opportunity to contest it. A new judge on the case, Magistrate Judge Theresa Buchanan, promptly ordered the wiretap installed on the basis that the government “has certified that the information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation….” Like the first order, this order did not mention encryption keys, SSL keys, or the like.
FBI special agents met with Levison in Dallas the same day to discuss the new order, which Levison had not yet received, as well as a prior summons to appear before a grand jury. The agents presumably explained to Levison that the court had issued a secret order based on a secret motion, itself based on secret evidence (or none at all) and that Levison was not only compelled to comply but was also still under court order to keep the whole secret process a secret, this time with no exception even for his attorney.
According to a later government filing, “Mr. Levison told the agents that he would not comply with the pen register order and wanted to speak to an attorney. It was unclear whether Mr. Levison would not comply with the order because it was technically not feasible or difficult or was not consistent with his business practice of providing secure, encrypted email service for his customers.”
As Levison months later explained to reporters about Lavabit: “We’re wholly focused on secure email. Without it, we have no business.” In Levison’s view, breaking Lavabit’s security without the right to tell his customers would have been to commit commercial fraud.
Judge Buchanan keeps the pressure on Levison and Lavabit
Following this meeting, the Justice Dept. immediately went before Judge Buchanan seeking an order to compel Lavabit to comply with the other Magistrate’s earlier order and install the FBI wiretap and to “furnish agents from the Federal Bureau of Investigation, forthwith, all information, facilities, and technical assistance necessary to accomplish the installation and use of the pen/trap device…” as ordered pursuant to federal law [U.S. Code, Title 18, sec. 3123].
Judge Buchanan immediately granted the “Order Compelling Compliance Forthwith,” based in part on her findings that “Lavabit informed the Federral Bureau of Investigation that the user of the account had enabled Lavabit’s encryption services and thus the pen/trap device would not collect the relevant information” and that “Lavabit informed the FBI that it had the technological capability to obtain the information but did not want to ‘defeat [its] own system’…”
Judge Buchanan ordered Lavabit to provide “unencrypted data pursuant to the Order.” Noting that failure to comply “forthwith” would subject Lavabit to “any penalty within the power of the court,” Judge Buchanan added in her own handwriting, “including the possibility of criminal contempt of court.” This order was issued under seal.
Previously, Levison faced the possibility of being fined for civil contempt if he failed to comply. Now he also faced going to jail. And the court’s most recent orders, in their plain language, prevented Levison from discussing his situation with anyone, not even an attorney.
According to the FBI, agents “made numerous attempts, without success, to speak and meet directly with Mr. Levison” during the next ten days. On July 9, the Justice Dept. returned to the Fourth Circuit court seeking an order for Lavabit to show cause why it “has failed to comply with the orders entered June 29” by Magistrate Buchanan, and why Lavabit should not be held in contempt of court for its failure to comply.
Judge Hilton decides a hearing with the parties present might help
Judge Claude Hilton issued the show cause order the same day, including a summons for Lavabit to appear at a hearing a week later. Judge Hilton is a secrecy case veteran, having served on the secretive FISA (Foreign Intelligence Surveillance Act) court from 2000 to 2007. The Judge continued to keep the Lavabit case under seal, but reinstated Lavabit’s exception to the gag rule when consulting with an attorney.
The next day, Levison went to the FBI field office in Dallas for a meeting/conference call that included prosecutors and FBI agents in Washington and his attorney in San Francisco, convened “to discuss Mr. Levison’s questions and concerns… [that] focused primarily on how the pen register device would be installed on the Lavabit LLC system, what data would be captured by the device, what data would be viewed and preserved by the government… [and] whether Mr. Levison would be able to provide ‘keys’ for encrypted information.”
The parties did not reach an agreement at the meeting and the next day, July 11, Levison’s attorney informed the FBI that she no longer represented Levison or Lavabit. The same day, Levison “indicated that he would not come to court [for the July 16 show cause hearing] unless the government paid for his travel,” according to a government filing.
Rather than engage in a dispute over travel expenses, the FBI served Levison with a subpoena to appear before a Fourth Circuit grand jury, also on July 16. The government is responsible for the travel arrangements of grand jury witnesses, and the FBI so advised Levison by email. The grand jury subpoena left little wriggle room in its effort to force Lavabit to surrender the encryption keys that were essential to its business:
“In addition to your personal appearance, you are directed to bring to the grand jury the public and private encryption keys used by lavabit.com in any SSL (Secure Socket Layer) or TLS (Transport Security Layer) sessions, including HTTPS sessions with clients using lavabit.com website and encrypted SMTP communications (or Internet communications using other protocols) with mail servers;
“Any other information necessary to accomplish the installation and use of the pen/trap device ordered by Judge Buchanan on June 28….”
“I don’t trust you, but you should trust me” and vice-versa
Levison responded on July 13 with an email to the U.S. Attorney’s office, offering an alternative to the FBI-operated wiretap. Levison proposed that he would collect the court-designated data himself. While he didn’t state it in the email, this would address one of Levison’s primary concerns, that there was no effective oversight to prevent the FBI from gathering more data than the court had allowed. Levison proposed to design and implement the solution, gather the data manually, and provide it to the FBI at the end of the 60-day court order – for a price of $2,000. For another $1,500, he offered to provide data “more frequently,” which would require implementing an automated system.
The U.S. Attorney chose not to explore the offer. In a brusque and internally contradictory reply email the same day, an assistant U.S. Attorney explained “that the proposal was inadequate because, among other things, it did not provide for real-time transmission of results, and it was not clear that Mr. Levison’s request for money constituted the ‘reasonable expenses’ authorized by the statute.” The government later admitted to the court that it was “unclear” as to precise details of the proposal. The clear implication of Levison’s proposal is a willingness to provide real-time transmission for reasonable compensation. But that would leave Levison in control. The government didn’t consider that a useful compromise.
On July 15, Levison flew to Washington for his show cause hearing at 10 the next morning, although he thought it was set for 10:30 and arrived late. He was appearing pro se, representing himself without an attorney.
Even a federal court hearing can be a comedy of errors
The government goal for the July 16 hearing remained unchanged: “Lavabit LLC may comply with the pen register order by simply allowing the FBI to install the pen register devise and provide the FBI with the encryption keys.” Lacking compliance, the government asked the court to impose a civil contempt sanction of $1,000 a day until Lavabit complied.
The government also requested a search warrant for the encryption keys. Judge Hilton granted the search warrant before the hearing began.
As it turned out, the 20-minute hearing resulted in no change in the legal standing of the parties, but did produce a transcript with moments of unintentional hilarity.
Present in the courtroom were Judge Hilton and the court staff. U.S. Attorney James Trump represented the government, along with three other lawyers and an FBI agent. Levison was alone.
The U.S. Attorney wanted to know if Levison was going to comply with the wiretap order, but Judge Hilton wouldn’t ask and Levison wouldn’t say. Or rather, Levison said he had always been ready and willing to comply with installation of the wiretap, but he was reluctant to give up the encryption codes, which would give the FBI access to all 400,000 of his subscribers even though the court order named only one. “There was never an explicit demand that I turn over those keys,” Levison said.
The U.S. Attorney argued that Judge Buchanan had effectively if not specifically ordered Levison to turn over the encryption keys. Judge Hilton wasn’t touching that: “I’m not sure I ought to be enforcing Judge Buchanan’s order.” Judge Hilton said that his order was to install the wiretap and Levison had said he’d do that, so – “You’re trying to get me to deal with a contempt before there’s any contempt, and I have a problem with that.”
Levison moved to unseal all but the sensitive information in the proceedings. Judge Holton denied the motion, based on the underlying criminal investigation. Levison asked the judge to order “some sort of external audit to ensure that your oders are followed to the letter” as to FBI data collection. The judge refused. Levison moved to continue the hearing to allow him to retain counsel. Judge Hilton granted the continuance.
Levison and Lavabit get legal representation from a Virginia firm
Levison’s new attorney is Jesse Binnall of Bronley & Binnall PLLC in Fairfax, Virginia. Binnall, 34, was a communication major at George Mason University and graduated from the Law School there in 2009. Binnall and Levison would later be among the first guests on the New Ron Paul Channel in mid-August.
On July 25, Binnall filed under seal a “Motion to quash” the outstanding grand jury subpoena and the search warrant against Lavabit. The motion requested “that this Court direct that Lavabit does not have to produce its Master Key. Alternatively, Lavabit and Mr. Levinson request that they be given an opportunity to revoke the. current encryption key and reissue a new encryption key at the Government’s expense. Lastly, Lavabit and Mr. Levinson request that, if they are required to produce the Master Key, that they be reimbursed for its costs which were directly incurred in producing the Master Key….”
In support of his motion, Binnall made a number of arguments against the actions of the government, which had not faced serious legal opposition up to this point.
Binnall pointed out that giving the government access to Lavabit’s Master Key is tantamount to giving the government access to all of Lavabit’s 400,000 users. That amounts to a general warrant that is unconstitutional, Binnall wrote, and:
“It is axiomatic that the Fourth Amendment prohibits general warrants [with Supreme Court cases cited]…. The Fourth Amendment’s particularity requirement is meant to ‘prevent the seizure of one thing under a warrant describing another’ [citation omitted]. This is precisely the concern with the Lavabit Subpoena and Warrant and, in this circumstance, the particularity requirement will not protect Lavabit. By turning over the Master Key, the Government will have the ability to search each and every ‘place,’ ‘person [and] thing’ on Lavabit’s network…. Additionally, the Government has no probable cause to gain access to the other users accounts.”
The government seemed unconcerned about Levison’s business survival
Bindall also argued that the court should quash the subpoena and search warrant as creating an “undue burden” on Lavabit as defined by law [U.S. Code Title 18, sec. 2703]:
“Not only has Lavabit expended a great deal of time and money in attempting to cooperate with the Government thus far, but, Lavabit will pay the ultimate price –the loss of its customers’ trust and business – should the Court require that the Master Key be turned over. Lavabit’s business, which is founded on the preservation of electronic privacy, could be destroyed if it is required to produce its Master Key.”
Also on July 25, Binnall filed a motion to unseal court records and to lift the gag order on his client, since the “gag order infringes upon freedom of speech under the First Amendment, and should he subjected to constitutional case law. “
Unsurprisingly, the U.S. Attorney filed a motion in opposition.
At the motion hearing on August 1, Judge Hilton engaged in lengthy colloquy with attorney Binnall. Before the 25-minute hearing was half over, the judge had denied both motions and the U.S. Attorney had said little more than “Good morning.” Judge Hilton gave Levison and Lavabit until 5 p.m. Dallas time on August 2 to comply.
Levison’s compliance took an unexpected form
The next day in Dallas, at about 1:30 p.m., Levison provided information that purported to be full compliance with the court’s orders. Whether it was actual compliance remains uncertain. The government was not happy and engaged with attorney Binnall to achieve satisfactory compliance, without success. On August 5 the government filed a motion for sanctions against Levison, calling his apparent compliance “unworkable” and describing it as follows:
“Mr. Levison gave the FBI a printout of what he represented to be the encryption keys needed to operate the pen register. This printout, in what appears to be 4-point type, consists of 11 pages of largely illegible characters. See Attachment A. (The attachment was created by scanning the document provided by Mr. Levison; the original document was described by the Dal!as FBI agents as slightly clearer than the scanned copy but nevertheless illegible.) Moreover, each of the five encryption keys contains 512 individual characters — or a total of 2560 characters. To make use of these keys, the FBI would have to manually input all 2560 characters, and one incorrect keystroke in this laborious process would render the FBI collection system incapable of collecting decrypted data.”
When this compliance effort became public two months later, TechCrunch called it “an epic troll.” At the time, the government was not amused and called for the court to sanction Levison $5,000 a day, beginning at noon August 5. The court promptly granted the motion, while reminding the parties that all aspects of the matter remained under seal. Known only to the participants and some court employees, the case was still unknown to the public.
Levison makes a tantalizing public announcement
That secrecy ended on August 8, when Ladar Levison shut down Lavabit, posting a short notice on the Lavabit.com website, together with a link to the Lavabit Legal Defense Fund. As Levison explained:
“I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on – the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.
“What’s going to happen now? We’ve already started preparing the paperwork needed to continue to fight for the Constitution in the Fourth Circuit Court of Appeals. A favorable decision would allow me resurrect Lavabit as an American company.
“This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States.”
Also on August 8, Levison fully complied with the Fourth Circuit courts orders, turning over the encryption keys to a now defunct service. He had incurred 2 days of sanctions – owing the government $10,000 – which remains pending.
The next day, Silent Circle, a global encrypted communications service, stayed in business but preemptively wiped out its email service (about 5 per cent of its customers) in anticipation of a government request that the company wouldn’t want to have to obey. “Meanwhile, Silent Circle is working on replacing its defunct e-mail service with a system that doesn’t rely on traditional e-mail protocols and keeps no messages or metadata within the company’s grasp. It is based on a protocol often used for instant messages and other applications. [CEO Mike] Janke says the goal is for this to not be e-mail, but ‘for all intents and purposes it looks, feels, and acts like e-mail,’” according to MIT Technology Review.
Lavabit’s closing drew some news coverage over the next week, but any story was hampered by the gag order that severely limited what Levison and Binnall could safely say. As Levison told Forbes the day after shutting down Lavabit:
“This is about protecting all of our users, not just one in particular. It’s not my place to decide whether an investigation is just, but the government has the legal authority to force you to do things you’re uncomfortable with….The fact that I can’t talk about this is as big a problem as what they asked me to do…. The methods being used to conduct those investigations should not be secret.”
The FBI and the Justice Dept. Have not commented publicly about the Lavabit case beyond their court filings.
Being secret, federal court appeal gets no news coverage
On August 15, Lavabit attorney Binnall filed notice – under seal – that he was appealing the federal district court’s rulings of August 1 and August 5 to the United States Court of Appeals for the Fourth Circuit. In other words, the government can not only keep the public ignorant of what it’s doing, it can also prevent the public from knowing that anyone objects to the government’s actions as unconstitutional.
In the Lavabit case, at least, this changed abruptly on October 2, when Judge Claude Hilton ordered a censored version of 23 documents (162 pages) made public. The redactions in these documents appear, from context, to be intended mostly to conceal details of the criminal investigation into Snowden or some other lavabit.com user. Since the unsealing of the court documents, news coverage had expansed, and Levison and Binnall have appeared in public across the country to argue their cause. As Levison put it on his Facebook page October 2:
“If the Obama administration feels compelled to continue violating the privacy rights of the masses just so they can conduct surveillance on the few then he should at least ask Congress for laws providing that authority instead of using the courts to force businesses into secretly becoming complicit in crimes against the American people.”
In 2005, a U.S. Senator addressed a similar concern, when Congress was about to pass a law creating the “national security letter,” a secret government process much more intense and unforgiving than what Levison went through last summer:
“This is legislation that puts our own Justice Department above the law. When national security letters are issued, they allow federal agents to conduct any search on any American, no matter how extensive, how wide-ranging, without ever going before a judge to prove that the search is necessary. All that is needed is a sign-off from a local FBI agent. That’s it.
“Once a business or a person receives notification that they will be searched, they are prohibited from telling anyone about it, and they’re even prohibited from challenging this automatic gag order in court. Even though judges have already found that similar restrictions violate the First Amendment, this conference report disregards the case law and the right to challenge the gag order.
“If you do decide to consult an attorney for legal advice, hold on. You will have to tell the FBI that you’ve done so. Think about that. You want to talk to a lawyer about whether or not your actions are going to be causing you to get into trouble. You’ve got to tell the FBI that you’re consulting a lawyer. This is unheard of. There is no such requirement in any other area of the law. I see no reason why it’s justified here.
“And if someone wants to know why their own government has decided to go on a fishing expedition through every personal record or private document, through the library books that you read, the phone calls that you’ve made, the emails that you’ve sent, this legislation gives people no rights to appeal the need for such a search in a court of law. No judge will hear your plea; no jury will hear your case. This is just plain wrong.”
The question is: how much of a police state do we have already?
That Senator was concerned eight years ago, and that Senator was Barack Obama. Today, national security letters are part of the law of the land, the Obama administration uses them, and if you get one, talking about it is against the law. In that context, since Ladar Levison apparently did not get a national security letter, he was lucky. The country, not so much.
On October 10, in the United States Court of Appeals for the Fourth Circuit, Lavabit filed the opening brief of its appeal of the lower court’s orders. The United States has until November 4 to file its answer. This will take awhile, it will take effort to follow, but it matters.
President Barack Obama has chosen a former Pentagon attorney who defended the extrajudicial killing of American citizens to man the helm of the United States Department of Homeland Security and replace outgoing Secretary Janet Napolitano.
Jeh Johnson, a general counsel for the Pentagon during the president’s first term in office, was named by Mr. Obama as his choice for new DHS secretary during a Friday afternoon press conference.
“The president is selecting Johnson because he is one the most highly qualified and respected national security leaders,” a senior administration official told the Washington Post on Thursday while speaking condition of anonymity. “During his tenure at the Department of Defense, he was known for his sound judgment and counsel.”
Johnson, 56, served as a special counsel during John Kerry’s unsuccessful 2004 run for the presidency before assisting with Obama’s campaign four years later. During his first week in office, Obama nominated Johnson as DoD general counsel and he was confirmed by the Senate in Feb. 2009.
Up until his resignation from Defense Department attorney in December 2012, Johnson advised the largest military in the world, including during historic matters regarding the repeal of the Pentagon’s ban on openly gay troops and the reform of military commissions.
That same span in the Pentagon was also marred by Obama administration decisions that opponents of the president’s latest pick have been quick to pounce on.
While working as one of the top attorneys for the US military, Johnson authorized the execution of Anwar al-Awlaki, an American citizen and suspected senior figure in Al-Qaeda who was killed by a drone strike in Yemen in late 2011. That slaying was carried out by an operation conducted by the Pentagon in cooperation with the Central Intelligence Agency and has drawn immense criticism directed at the White House and the president’s extrajudicial killing of an American citizen.
The New York Times reported shortly after that Johnson told attendees at a speech at Yale Law School that “Belligerents who also happen to be US citizens do not enjoy immunity where non-citizen belligerents are valid military objectives.”
The president postponed offering full justification for the attack until this past May when he said, “I do not believe it would be constitutional for the government to target and kill any US citizen — with a drone, or with a shotgun — without due process . . . But when a US citizen goes abroad to wage war against America and is actively plotting to kill US citizens, and when neither the United States, nor our partners are in a position to capture him before he carries out a plot, his citizenship should no more serve as a shield than a sniper shooting down on an innocent crowd should be protected from a SWAT team.”
Johnson also served as general counsel during the height of the WikiLeaks scandal that involved the unauthorized disclosure of hundreds of thousands of sensitive documents. In a letter to the whistleblower organization published in August 2010, Johnson blamed WikiLeaks for their “illegal and irresponsible actions,” and said that the leaking of classified materials aided America’s enemy in “their own terrorist aims.” Earlier this year, a military judge said that Chelsea Manning, the Army analyst who admitted to giving those files to WikiLeaks, did not aid Al-Qaeda by supplying the website with documents.
Johnson said in the same letter that the Pentagon “demands that NOTHING further be released by WikiLeaks, that ALL of the US Government classified documents that WikiLeaks has obtained be returned immediately and that WikiLeaks remove and destroy all of these records from its databases.”
Mr. Obama officially nominated Johnson at a 2 p.m. meeting, paving the way for the Senate to formally decide if they will appoint the president’s pick.
“If confirmed by the Senate, I promise all of my energy, focus and ability towards the task of safeguarding our nation’s national and homeland security,” Johnson said after being introduced by the president.
The NSA has attacked key European institutions such as the EU parliament and banking system, using malware to find out all there is to know about other countries in a power game, Andy Mueller-Moguhn, founder of Buggedplannet.info, tells RT.
He says that in a world where so many communications go over the web we all have something to protect rather than something to hide, as proponents of mass surveillance often argue.
RT:No matter what precautions companies take or measures to protect the privacy of subscribers isn’t the agency [NSA] capable of bypassing all these routes?
Andy Mueller-Moguhn: I would say it like this; unfortunately in Germany we have a situation that the trustworthiness or our foreign and interior intelligence service watching their high level of cooperation with the NSA and GCHQ does not make them trustworthy at all. If they can intercept the stuff, they might hand it over in a bargain to the Americans, which is not helpful.
So this means that what is to be done, is to ensure on whatever level in whatever country that encryption for the end user is becoming available like easy to use and as a standard tool, because you send your postal letters in an envelope so should you do with your emails.
RT:Let’s look at the situation from both sides. On the one hand we have the privacy of citizens that has of course to be respected, but on the other hand there are some companies who are fighting hard to protect their privacy. Doesn’t that give us a cause for concern, that they have something to hide, some skeletons in the closet as they say?
AMM: The point is that we have seen that installations of the United States National Security Agency, attacking also carriers in Europe, as we’ve seen with things that have nothing to do with terrorism or with fighting terrorism. They have a lot to do with power games or with knowing everything about other countries, about business, about embassies, about other country’s governments as we also see with the Brazilian presidential interception.
So obviously the thing that you have nothing to hide is totally wrong in the case that everybody has something to protect and in the days where everything, cultural, economic, political, things go over the internet and advance knowledge of a political decision, which can have for example an impact on stock rates, on currencies, on country’s reputations and so on. This is worth a lot of money and we have not really come to the bottom, we have seen a big part of this NSA approach, we have seen a lot of money, a lot of effort internationally to intercept all communications, but we have not yet come to the question, who is the customer, in the sense who are the guys ordering this, getting the product and using that.
That it is still a very interesting question where we come to monetary, political and other influences being taken with blackmailing, with greymailing, with advanced knowledge about what other people think, act and do.
RT:You mentioned an interesting point here saying that it’s not the point whether we have something to hide, but it’s what we have to protect. In that case what’s your take on the role of America as a global policeman? Does it have any moral authority to conduct global surveillance?
AMM: The point is that we have seen attacks, not passive interception but buggedplannet.info was subject to an attack in the sense that there was malware installed in the system, there were exploits used, the NSA literally took control over the network. This cannot be excused with fighting terrorism at all. This obviously was targeting the European parliament, it was targeting the European airspace control, it was targeting the SWIFT network or the banking network, so obviously there is no moral excuse here in terms of this being to do with fighting terrorism or ensuring security. This is about the global interest of the United States against other European and other peaceful acting countries and democratic organized entities.
On September 30th, as he was about to fly from Brazil to Denver, Colorado, where he had been invited to attend and address a German Studies conference, the German novelist Ilija Trojanow (pronounced “llya Troyanov”) was informed that he would not be allowed to board the flight on which he was booked.
He was told, after some 45 minutes of waiting while his passport and various computer screens were examined, that his case was “special” and that no further explanation was available. To this date, none has been offered.
But the explanation was and is obvious to anyone aware of Mr. Trojanow’s recent political history, in the context of the Obama administration’s increasingly jaundiced and vehement campaign against whistleblowers and critics of its surveillance-state apparatus. Despite the President’s absurdly facile talk of “welcoming the debate” on NSA data-gobbling and Orwellian tactics, the war on internet freedom is reaching a new high point. The US government is determined to achieve full access to all digital data, and has no intention of compromising with its critics, of which internationally known intellectuals appear to represent a particularly worrisome species.
Asked how the scholars at the conference in Denver had reacted to the government’s action in blocking his entry, Trojanow said that they were “…enormously angry. A great deal of prepared work was carried out in vain. Now they want to write an open letter. It is, obviously, ironic that this should happen in connection with – of all things — an event that was intended to bring the USA and Germany together. The theme of the seminar was ‘transnationalism’”.
Less than two weeks earlier, on September 18th, an open letter to German Chancellor Angela Merkel accompanied by the signatures of 67,000 supporters — including a number of prominent literary and legal figures – had been delivered to the Chancellery in Berlin by Trojanow’s friend and fellow novelist Juli Zeh, its initiator. One of the first signatures was Trojanow’s. The two are co-authors of the book “Angriff auf die Freiheit” (“Freedom Under Attack”), published in 2010 by DTV Deutscher Taschenbuch, the subtitle of which translates to “Security Madness, Surveillance State and the Dismantling of Civil Rights.” Three years before the Snowden revelations, Mr. Trojanow, a native Bulgarian whose family fled political persecution there in the dark ages of Eastern Bloc state repression, had become a prominent critic of policies in the West that had an all-too-familiar smell. The Snowden documents and emerging NSA scandal now brought new urgency to this work.
The German Chancellor and leader of the Christian Democratic Union, who as opposition leader during the Social Democratic/Green Party coalition government,and later as Chancellor, had given George W. Bush uncritical support for his Iraq policies among many others, was staying true to form in the face of Snowden’s assertion that Germany’s intelligence services were deeply involved in the surveillance scandal. After weeks of evasion and “salami” tactics by which admissions regarding the Snowden charges were made piecemeal once they could no longer be denied; after a highly-publicized trip to Washington by her Interior Minister (analogous to Minister of Homeland Security in the USA), who was photographed at the table with top American intelligence officials, and returned to assure Germans that the US took the issue very seriously and had guaranteed him that no German laws were being broken; after an appearance by Merkel’s Minister of the Chancellery before a special investigative committee to which he had been summoned by an outraged opposition in the German Bundestag (an appearance generally assessed to have been characterized by flippant and insubstantial responses to penetrating questions regarding German complicity alleged by Snowden); after a press conference in which the Chancellor blithely declared that she “preferred to wait and see” what the truth about the allegations might be; and after declaring in a vaguely irritated tone in a TV debate with her Social Democratic challenger in the eminent election – on almost the same day that the letter and petition were presented in Berlin — that she “had no reason to mistrust the NSA,” Merkel was comfortably reelected on September 22nd despite the fact that more than two-thirds of Germans had been polled as being unsatisfied with the government’s response to the scandal. While the conservatives in Berlin and the Obama administration may have breathed a sigh of relief, someone in Washington was apparently not yet ready to forget about Trojanow’s work in the actions which had produced the following document (translated from the original German for Mr. Trojanow by myself):
Honored Madame Chancellor,
Since Edward Snowden made public the existence of the PRISM program, the media have turned their attention to the biggest wiretapping scandal in modern German history. We citizens have, through published reports, become aware that foreign intelligence services — even in the absence of any concrete grounds for suspicion – skim and record our telephone and electronic communications. Through the storage and evaluation of metadata, our contacts, friendships and relationships are apprehended. Our political positions, our “movement profiles” and, in fact, even our daily moods and emotional status are transparent to the security authorities. The “transparent man” has thus become reality.
We have no defenses. There is no means of redress or airing of grievances, no opportunity for access to the files. While our private lives are made transparent, the secret services assert a right to a maximum of opacity regarding their methods. In other words: we are experiencing an historic attack upon our democratic rule of law, namely, the reversal of the principle of a “presumption of innocence” into a millionfold general suspicion.
Madame Chancellor, you stated in your summer press conference that Germany is “not a surveillance state.” Since the Snowden revelations, however, we have no choice but to say: unfortunately, it is. In the same connection you summarized your approach to the investigation of the PRISM affair with the apt phrase: “I prefer to wait and see what happens.”
But we do not wish to wait. It is increasingly difficult to avoid the impression that this behavior by the American and British intelligence services is tacitly accepted by the German government. For that reason we ask you: is it politically desirable that the NSA conducts surveillance of German citizens in a manner that is forbidden to the German authorities by the constitution and the German Federal Constitutional (Supreme) Court? Do the German intelligence services profit from information received from the US authorities, and is that the reason for your hesitant reaction? How can it be justified that the BND (“Bundesnachrichtendienst”, federal intelligence authority) and the Verfassungsschutz (“Constitutional Protection”, federal domestic intelligence agency) deploy the NSA spy-program XKeyScore, for which there is no legal basis, in the surveillance of search engines? Is the German Federal Government in the process of taking a detour around the rule of law, instead of defending it?
We call upon you to tell the people of this nation the full truth about the electronic spying. And we want to know what the federal government proposes to do against it. You are charged by the constitution with protecting Germany’s citizens from harm. Madame Chancellor, what is your strategy?
/ Juli Zeh / Ilija Trojanow / Carolin Emcke / Friedrich von Borries /Moritz Rinke / Eva Menasse / Tanja Dückers / Norbert Niemann / Sherko Fatah / Angelina Maccarone / Michael Kumpfmüller / Tilman Spengler / Steffen Kopetzky / Sten Nadolny / Markus Orths / Sasa Stanisic / Micha Brumlik / Josef Haslinger / Simon Urban / Kristof Magnusson / Andres Veiel / Feridun Zaimoglu / Ingo Schulze / Falk Richter / Hilal Sezgin / Georg Oswald
(Translation from the German original: Gregory Barrett)
Trojanow was awarded the 2006 Prize of the Leipzig Book Fair for his adventure novel “Der Weltensammler” (“The Collector of Worlds”). He delivered the laudatory speech for the Nobel Prizewinner Herta Müller at the ceremony marking her acceptance of the Franz Werfel Human Rights Prize. In Salvador da Bahia, Brazil, he had been a guest writer at the invitation of the Goethe Institute. On October 5th he was to speak at the conference of the German Studies Association in Denver about his most recent novel “EisTau” (“Ice Thaw”). Ms. Zeh is best known to the German-speaking public as the author of several novels including “Adler und Engel” (“Eagles and Angels”), which has been translated into 31 languages, and “Nullzeit” (“Zero Hour” or “Out of Time”), but also holds impressive law degrees and has worked at the United Nations. The forum afforded the two highly-respected intellectuals in various media, from the powerful news magazine “Der Spiegel,” to the national public radio network Deutschlandradio, to popular national television talk shows may well be making the Merkel government nervous about the possibility that the surveillance issue — which had appeared to be fading in the public consciousness as the Chancellor and her allies had hoped — could still catch fire with the help of the continued revelations being parceled out by Snowden, Glenn Greenwald and a growing network. Such coverage has given the German writers’ campaign a visibility seldom granted to the usual suspects on the German left.
Appeals to the German government for mediation and clarity following the US refusal to allow Mr. Trojanow’s entry into the land of the free have, predictably, been without success at this writing. The novelist himself immediately applied for a new US visa and is determined to elicit a clear statement about the grounds for the ban.
Meanwhile, Trojanow and Zeh are working on a new international appeal, with which they hope to generate broad-based resistance to the massive destruction of civil- and privacy rights worldwide represented by the NSA’s new technological might. There are links already in place to the London-based group “Index on Censorship” and many other groups including Amnesty International, Liberty, the Electronic Frontier Foundation and the Russian PEN Center. The German writer-activists hope to bring more Americans into their network as well. The signs may be auspicious, too, for legislative activity at the European level: in late September a 36-page report prepared for the European Union stated that “…Prism seems to have allowed an unprecedented scale and depth in intelligence gathering, which goes beyond counter-terrorism and beyond espionage activities carried out by liberal regimes in the past. This may lead towards an illegal form of total information awareness where data of millions of people are subject to collection and manipulation by the NSA.” It went on to point out that “…there are no privacy rights for non-Americans under Prism and related programmes” and that the US probably places “no limitations on exploiting or intruding a non-US person’s privacy.” However, those of us who have watched for many years as the European Parliament and EU Commission have taken one principled position after another against US policies, only to buckle later under pressure, are under no illusion that things will be much different this time. The stark contrast between the Merkel government’s initial protestations of concern over PRISM and other NSA programs for public consumption, and its subsequent low-to-no profile on the issue, demonstrates that below the surface, the European interest in maintaining its often obsequious posture as regards its mighty ally will once again trump other concerns in the absence of a public outcry. Ilija Trojanow and his partners, however, hope to keep the urgency of the issue alive in the international political and literary spheres.
“It is more than ironic that an author who for years has been speaking out about the dangers of surveillance and the secret state within the state should be denied entry into the ‘land of the brave and the free,’ ” writes Trojanow. “No more than a minor, individual case, to be sure: but it’s indicative of the consequences of a disastrous development and it reveals the naivety of the attitude of many citizens who comfort themselves with the mantra, ‘But it’s got nothing to do with me’. That might still be the case – however, the net is tightening. For these citizens the secret services are still just a rumor, but in the not-so-distant future the knock on the door will be very real indeed.”
Gregory Barrett is a translator and musician living in Germany.
The US National Security Agency is collecting hundreds of millions of contact lists from personal email and instant messaging accounts around the world, according to a new report.
Many of the contacts belong to American citizens, The Washington Post reports, citing senior intelligence officials and documents provided by former NSA contractor Edward Snowden.
According to the report, the super spy agency intercepts millions of email address books every day from private accounts on Yahoo, Gmail, Facebook, and Hotmail that move through global data links. The agency also collects a half million buddy lists from live chat services and email accounts.
It is the latest revelation of the NSA’s practices to be disclosed by Snowden, who lives in Russia, where he has been granted temporary asylum. The leaker is wanted in the US for espionage charges.
NSA’s analysts of the collected data can search for hidden connections and map relationships within a much smaller universe of foreign intelligence targets, according to the report.
“The collection depends on secret arrangements with foreign telecommunications companies or allied intelligence services in control of facilities that direct traffic along the Internet’s main data routes,” it says.
Although the collection takes place overseas, the NSA sweeps in the contacts of many Americans too. The agency collects as many as 250 million contacts per year, many them US citizens.
The NSA’s collection of all US call records has already generated controversy in the country since the agency’s program was first revealed in June. NSA officials have defended bulk collection as an essential tool to counter terrorism.
Germany’s largest telecom provider, Deutsche Telekom, is looking to introduce a “national routing” service which would keep German internet traffic out of the hands of foreign spies.
The former state-owned communications giant outlined the plans at a secret meeting in the Economy Ministry, business weekly Wirtschaftswoche reported.
Currently, email data is exchanged between users worldwide via international Internet exchange points; physical structures through which Internet service providers (ISPs) exchange Internet traffic between their networks.
The company hopes to hammer out an agreement with other national Internet providers which would guarantee that “while being transported from the sender to the receiver in Germany… no single byte leaves Germany,” Thomas Kremer, a board member of Telekom’s data privacy, legal affairs and compliance, told the magazine.
To put the plan into effect, Deutsche Telekom must secure the support of all its competitors, including Telefonica and Vodafone.
While Vodafone and Telefonica are currently mulling the initiative, another competitor – Internet service provider QSC – has questioned the efficacy of the plan, saying it was not possible to determine with certainty whether data is being routed nationally or internationally.
“In a next step, this initiative could be expanded to the Schengen area,” the spokesman said, referring to the group of 26 European countries – excluding Britain – that have removed border controls for participating countries.
Deutsche Telekom first began leading the charge for to protect its users’ privacy from foreign intelligence agencies in August when they rolled out ‘Email Made in Germany’, an encrypted email service that only uses German servers to process and store all domestic email traffic.
The move followed revelations that the US National Security Agency (NSA) collects 500 million pieces of phone and email metadata from Germany each month — more than in any other EU country.
“Germans are deeply unsettled by the latest reports on the potential interception of communication data,” said Rene Obermann, head of Deutsche Telekom.
“Now, they can bank on the fact that their personal data online is as secure as it possibly can be.”
Experts do not believe the move will stop governments from getting their hands on information, although it might complicate efforts to do so.
“Of course the NSA could still break in if they wanted to, but the mass encryption of emails would make it harder and more expensive for them to do so,” Sandro Gaycken, a professor of cyber security at Berlin’s Free University, said when the idea was first proposed.
As debate over the merits of “stop and frisk” policing continues, a new YouTube video has added fuel to the fire by revealing the disturbing tactics of two Philadelphia officers.
Titled “Police unlawful harassment and racial profiling,” the video is dated Sept. 27 and shows two pedestrians being stopped by police officers after saying “hi” to a third, unseen individual on the street.
“You don’t say ‘Hi’ to strangers,”one officer, identified as Philip Nace by the Philadelphia Daily News, said as he confronts the two pedestrians and pushes one against the car. The other individual is recording the scene on his smartphone as it unfolds.
After Nace tells the man to put his phone away because he’s “under investigation,” the phone is set down but continues to record.
“Investigation of what? I was walking,” the man said, to which the officer replies, “That’s not what I saw … if you keep running your mouth I’ll split your wig open.”
The two go back and forth, with the man asking Nace why he’d been stopped, and Nace offering that he doesn’t know what information the police have on them.
“Are you accusing me of robbing somebody?” the pedestrian asks.
“I didn’t accuse you of anything,” Nace said.“I said we could’ve got a call, that somebody wearing the clothes you’re wearing just robbed somebody. That’s why we stopped you. Is that wrong of us?”
When asked if he’s permitted to grab pedestrians in this manner, Nace replies,“I’ll grab you any way I got to… Why don’t you shut up? Everyone thinks they’re a [expletive] lawyer and they don’t know jack [expletive].”
At one point, the officers attempt to justify their actions by claiming the two pedestrians were jaywalking. Nace also accuses the two pedestrians of “weakening the country” by “freeloading.”
The race of the two pedestrians is not clear in the video, but “stop and frisk” tactics are increasingly coming under fire as demeaning, and for unfairly targeting minorities without sufficient cause.
“This is exactly what the city of Philadelphia says its cops don’t do,” Mary Catherine Roper, senior staff attorney for the state chapter of the American Civil Liberties Union, told the Daily News. “The only way we stop it from happening is if the police department acknowledges that it does happen and takes steps to root it out.”
In August, a federal judge ruled New York City’s “stop and frisk” policy unconstitutional on the grounds that it is a form of racial profiling.
Meanwhile, a new study released in September revealed that “stop and frisk” tactics are causing a large proportion of the public to mistrust the police. The lack of faith can become so severe that even those who are victimized become reluctant to report crimes.
Lawmakers in Oakland intend to spend millions of dollars awarded to the California city in a federal grant to a police dragnet that promises to examine surveillance footage, riling critics who assert the intention of the grant was to stop terrorism.
When the new program debuts in approximately one year police will be able to track drivers as they travel through tolls, scan license plates with the roughly 3,000 surveillance cameras placed throughout the city, and monitor social media platforms to learn about crimes before they occur.
The Oakland program, officially referred to as the Domain Awareness Center, according to the New York Times, comes at a time when police departments across the US are using federal money to launch similar surveillance efforts modeled after the New York Police Department. The NYPD, which operates within New York City as well as far outside, has used federal grants to build a massive surveillance network capable of linking cameras and license plate readers to criminal and suspected terrorist databases.
The Domain Awareness Center also plans to plant gunshot detection sensors through Oakland, which is consistently ranked among the most dangerous cities in the US. Forbes magazine reported that violent crime affects 1,683 of every 100,000 residents in the city, making it the third most dangerous city in America with a population between 100,000 and 499,000 in 2013.
The Oakland City Council voted unanimously on July 31 to adopt the plan to build the surveillance center, which officials have said will be staffed 24 hours a day. Lawmakers voted at the same meeting to ban hammers and spray paint cans at protests in fear that the items will be used as weapons. Waiting outside, protesters admonished council members with chants of “Shame! Shame! Shame!”
“The Domain Awareness Center is the guard tower which will watch over every person in the city of Oakland,” shouted demonstrator Mark Raymond, as quoted by the San Francisco Chronicle. “This program is an attempt to criminalize and imprison all people who live and pass through Oakland.”
All told, the surveillance center’s costs are expected to total $10.2 million in federal grants, and while legislators said they were cognizant of residents’ security while drafting the bill some representatives were shouted down.
“We have tried our best to find the sweet spot where are going to take advantage of the tools that we have at hand to make our city safe… We have done everything we can to safeguard privacy,” said councilwoman Libby Schaaf before she was cut off by jeers and one protester who suggested she “go home to your mansion and kill yourself.”
Schaaf did admit that, while police have traditionally needed just a small evidence sample to arrest a suspect, the new center will have the capability to “paint a pretty detailed picture of someone’s personal life, someone who may be innocent.”
Oakland was awarded a federal grant to ramp up security near the Port of Oakland, a thriving cargo center that is one of the busiest in the US. The 19-mile waterfront is the fifth-busiest container port in the US, with 1,800 ships arriving every year, according to the San Francisco Chronicle. Over $14 billion in goods were exported from the bustling hub in 2012.
To protect the port, and watch civilians throughout the region, Oakland signed a contract with Science Applications International Corporation (SAIC) to build the Domain Awareness Center. The company, which earns most of its $12 million in annual revenue from military contracts, also worked with the NYPD but later paid $500 million to avoid a federal prosecution for receiving illegal kickbacks.
The Times reported that this project is not the first time Oakland has sought to develop such technology. A city audit viewed by the paper revealed that lawmakers spent nearly $2 million in 2012 alone on police tools that did not work or could not be used for a variety of reasons.
Linda Lye, an attorney with the American Civil Liberties Union, said this project might work as intended, but that mere intention already creates a scary problem.
“What they did is approve a vast surveillance center without understanding the implications,” she said earlier this year. “The privacy policies would be drafted only after the center is built. At that point, what opportunity will there be for to determine if the safeguards are sufficient?”
There had been some buzz a while back when Digital Music News published an entire iTunes Radio contract, which was targeted at smaller indie labels, showing how Apple got to throw its weight around, presenting terms that were very much in Apple’s favor over the labels if they wanted to participate in iTunes Radio. However, while it took a few months, Apple’s lawyers finally spotted this and they have apparently made a copyright claim to get the contract taken down. I wonder how the small group of indie musicians who always fight for stronger copyrights feel about Apple using copyright to take down rather important information that they should know concerning the sort of deal Apple offers them….
While this may be possibly legal under the law, it demonstrates how the law can be used in ways that really have absolutely nothing to do with copyright’s purpose. Apple didn’t need copyright’s incentives to create this contract. There is no market for the contract itself. The purpose in flexing the copyright claim here is one thing and one thing only: censorship. As law professor Eric Goldman explained:
“It’s not out of legal bounds to do this. It’s just kind of a jerk move. We all know what’s happening here. Apple doesn’t care about protecting the copyright of contracts. It’s using copyright to try and suppress information that it doesn’t want made public.”
That said, I question whether or not this really is a legit takedown. While Apple can claim a copyright on the contract, it seems that DMN has a really strong fair use claim. The purpose was for reporting (a key purpose that supports fair use). The publication was in the public interest. The type of work is a “contract” for which copyright tends to mean very little. Finally, there’s no “market” for the contract itself, and thus the impact on the market or the value of the copyright in the item is nothing. The only factor that weighs against it is the fact that the entire contract was used — but as we’ve pointed out many times in the past, plenty of cases have been deemed fair use where the “entire work” has been used. This seems like a perfectly strong fair use case, though it might not be worth the legal cost to fight Apple over this, given the company’s historical willingness to go absolutely bonkers against publications it doesn’t like.
There are times you just shake your head and wonder who the NSA top officials think they’re kidding with their statements. Take, for example, some recent comments from the NSA’s number two guy in charge, Chris Inglis, the Deputy Director, who gave an interview to the BBC where he tried to paint the NSA as not being quite as bad as everyone says, but admitted that there could be more transparency. That’s all the usual stuff, but the following tidbit caught my eye:
The job of the NSA, Mr Inglis said, was to exploit networks to collect intelligence in cyberspace and to defend certain networks – but not carry out destructive acts.
“NSA had a responsibility from way back, from our earliest days, to both break codes and make codes,” he said. “We have a responsibility to do intelligence in a space we once called the telecommunications arena – now cyberspace – and the responsibility to make codes or to defend signals communications of interest.
“That’s different than what most people conceive as offence or attack in this space.”
That task of destructive cyber attack, if ordered, lies with the US military’s rapidly expanding Cyber Command.
Except, as we’ve noted more than a few times, US Cyber Command is the NSA. It’s run by Keith Alexander, the director of the NSA, and it’s housed in the same place as the NSA. For all intents and purposes, US Cyber Command is the NSA, and Alexander has no problem at all swapping hats depending on what’s most convenient. He regularly tries to talk about “protecting the network” when it suits him, ignoring that the same efforts he’s looking at (greater access to corporate networks) would also make it much easier for the NSA and US Cyber Command to launch offensive attacks — which Snowden’s leaks proved the NSA did hundreds of times.
Pretending the two are different, and that the NSA only focuses on “breaking codes and making codes” is yet another bogus claim from an NSA official, adding to a very long list.
As Philip Zelikow prepares to teach an online history course, we peel back the layers of propaganda from the former Executive Director of the 9/11 Commission. From cover up to predictive programming, we examine the ways that Zelikow helped to shape (and write) the history he’s now teaching.
Stark Realities with Brian McGlinchey | April 4, 2024
A principal goal of Stark Realities is to “expose fundamental myths across the political spectrum” — and few myths are as universally embraced as the notion that US participation in World War II (1941-1945) lifted the American economy out of the Great Depression.
This myth is dangerous not only because it leads citizens and politicians to see a bright side of war that doesn’t really exist, but also because it helps foster a belief that government spending is essential to countering economic downturns. That belief, in turn, has helped propel us to a point where the national debt now exceeds $34.6 trillion, with interest payments alone on pace to reach $1 trillion a year in 2026, inviting financial catastrophe. … continue
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.