Aletho News

ΑΛΗΘΩΣ

Why The NSA Must Be Reined In — For Democracy’s Sake

By Glyn Moody | Techdirt | September 13, 2013

In the wake of the continuing leaks about the NSA’s activities, most commentators are understandably still trying to get to grips with the enormity of what has been happening. But John Naughton, professor of the public understanding of technology at the UK’s Open University, tackles a very different question on his blog: what is likely to happen in the future, if things carry on as they are?

Naughton notes that the NSA’s mission statement includes the following phrase: “to gain a decision advantage for the Nation and our allies under all circumstances.” “Under all circumstances” means that as the Internet grows — and as we know, it is currently growing rapidly — so the NSA will naturally ask for resources to allow it to do tomorrow what it is doing today: monitoring more or less everything that happens online. Naughton then asks where that might lead if the political climate in the US remains sufficiently favorable to the NSA that it does, indeed, get those resources:

The obvious conclusion therefore, is that unless some constraints on its growth materialise, the NSA will continue to expand. It currently has 35,000 employees. How many will it have in ten years’ time? Who can say: 50,000, maybe? Maybe even more? So we’re confronted with the likelihood of the growth of a bureaucratic monster.

How will such a body be subjected to democratic oversight and control? Let me rephrase that: can such a monster be subjected to democratic control?

Although optimists might answer ‘yes’, Naughton points to the FBI as an example of what has already happened in this area:

those with long memories recall the fear and loathing that J. Edgar Hoover, the founder — and long-term (48 years) Director — of the FBI aroused in important segments of the American polity. The relatively restrained Wikipedia entry for him claims that even US presidents feared him and quotes Harry Truman as saying that “Hoover transformed the FBI into his private secret police force”. “We want no Gestapo or secret police”, Truman is reported as saying. “FBI is tending in that direction. They are dabbling in sex-life scandals and plain blackmail. J. Edgar Hoover would give his right eye to take over, and all congressmen and senators are afraid of him.”

He then goes on to draw the obvious parallel with a possible tomorrow:

Now spool forward a decade or so and imagine a Director of the NSA, a charismatic ‘securocrat’ imbued with a mission to protect the United States from terrorists and whatever other threats happen to be current at the time. He (or she) has 50,000+ operatives who have access to every email, clickstream log, text message, phone call and social-networking post that every legislator has ever made. S/he is a keystroke away from summoning up cellphone location logs showing every trip a lawmaker has made, from teenager-hood onwards, every credit- and debit-card payment. Everything.

And then tell me that lawmakers will not be as scared of that person as their predecessors were of Hoover.

Think that could never happen? Are we sure…?Follow me @glynmoody on Twitter or identi.ca, and on Google+

September 13, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Timeless or most popular | , , , , , | Leave a comment

Ex-FBI counsel implicated in surveillance abuses nominated to crucial federal bench

RT | September 11, 2013

The former top lawyer at the FBI deeply implicated in surveillance abuses revealed before and by Edward Snowden’s leaks was confirmed as a federal judge in a top court for terrorism cases this week.

The US Senate voted 73-24 on Monday in approving Valerie Caproni, Federal Bureau of Investigation general counsel from 2003 to 2011, to the Southern District of New York, one of the country’s most important federal courts for terrorism cases.

Caproni has received bipartisan criticism for allowing and defending surveillance abuses both found to be overbroad during her tenure and those not disclosed when she was counsel but later revealed to be inappropriate or illegal. For example, the Snowden leaks showed Caproni mischaracterized the limits of the Patriot Act during her term.

A 2010 report by the Department of Justice revealed the FBI inappropriately used non-judicial subpoenas called “exigent letters” to gather phone numbers of over 5,550 Americans until 2006.

“The FBI broke the law on telephone records privacy and the general counsel’s office, headed by Valerie Caproni, sanctioned it and must face consequences,” said John Conyers in April 2010 as chairman of the House Judiciary Committee.

Conyers called for Caproni’s firing at the time over the use of the non-judicial subpoenas, according to the Guardian.

“It’s not in the Patriot Act. It never has been. And its use, perhaps coincidentally, began in the same month that Ms Valerie Caproni began her work as general counsel,” Conyers said in 2010.

Caproni told House lawmakers in 2008 if phone numbers — acquired from telephone companies by the FBI via the non-judicial subpoenas evidently sanctioned in the Patriot Act — were not related to a “currently open investigation, and there was no emergency at the time we received the records, the records are removed from our files and destroyed.”

Yet revelations found in documents supplied by Snowden outlined how the National Security Agency stores phone records on all Americans for up five years no matter if they are associated with an open investigation or not. In addition, it’s been found that the NSA has the capability to feed the FBI phone records if there is a “reasonable articulable suspicion” they are related to terrorism.

“Caproni knew that the Bush administration could use or was using the Section 215 provision in the Patriot Act to obtain Americans’ phone records on a broad scale, an issue that has recently been documented by the whistleblower material first printed in the Guardian,” Lisa Graves, a former deputy assistant attorney general who dealt with Caproni while working on national security issues for the ACLU, told the Guardian.

In 2007, DOJ’s Inspector General Glenn Fine found the FBI was serially abusing National Security Letters — a demand regarding national security independent of legal subpoenas– to obtain business records, including “unauthorized collection of telephone or internet email transactional records.” While the larger collection of phone records was still not exposed at the time, Caproni called the inappropriate collection a “colossal failure on our part.”

“Government officials that secretly approved of overbroad surveillance programs the public is only seeing now because of leaks, and whose testimony on the issue obscured rather than revealed these abuses, should be held to account for their actions in a public forum,” former FBI agent Mike German told the Guardian.

Caproni’s nomination to the federal bench had some bipartisan opposition, but not enough to block her appointment.

“She is a woman with impeccable credentials,” Sen. Kirsten Gillibrand (D-N.Y.) said on the Senate floor Monday. “This country needs more women like her.”

September 12, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , , , | 1 Comment

US spying violated Brazil’s sovereignty: Brazilian minister

Press TV – August 30, 2013

Brazil has criticized the United States for spying on Brazilian companies and individuals, saying the electronic surveillance is a violation of the South American country’s sovereignty.

“We expressed Brazil’s unhappiness on learning that data was intercepted without the authorization of Brazilian authorities, for the use of US intelligence,” Brazilian Justice Minister Jose Eduardo Cardozo said on Thursday, the last day of his two-day visit to the US.

“The acts imply a violation of human rights, violation of Brazilian sovereignty and rights enshrined in our constitution,” he added.

Last month, Brazilian Foreign Minister Antonio Patriota expressed serious concerns over a report, which said the US National Security Agency (NSA) has been spying on Brazilian companies and individuals for a decade.

Brazil’s O Globo newspaper reported on July 7 that the NSA had collected data on billions of telephone and email conversations in the country.

The report said that information released by US surveillance whistleblower Edward Snowden reveals that the number of telephone and email messages logged by the NSA in the 10-year period was near to the 2.3 billion captured in the US during the same period.

During his visit to Washington, the Brazilin justice minister met US Vice President Joe Biden, US Attorney General Eric Holder and White House counter-terrorism adviser Lisa Monaco.

Cardozo said US officials could not allay his country’s concerns.

“We made a proposal to move toward an agreement to establish the rules on procedures in the interception of data. They told us the United States would not sign an agreement under those terms with any country in the world,” he said.

Cardozo said US officials claimed that the spying was used for counter-terrorism purpose.

“But for us it was clear that there was collection of data to deal with organized crime and drug-trafficking, but what is worse, also Brazilian diplomatic actions,” he said.

The chairman of the US Joint Chiefs of Staff, Gen. Martin Dempsey, admitted in July that Snowden’s exposés have seriously damaged US ties with other countries. “There has been damage. I don’t think we actually have been able to determine the depth of that damage.”

Snowden, a former CIA employee, leaked two top secret US government spying programs under which the NSA and the Federal Bureau of Investigation (FBI) are eavesdropping on millions of American and European phone records and the Internet data from major Internet companies such as Facebook, Yahoo, Google, Apple, and Microsoft.

The NSA scandal took even broader dimensions when Snowden revealed information about its espionage activities targeting friendly countries.

August 30, 2013 Posted by | Corruption, Deception, Economics | , , , , , , | Leave a comment

NSA has ability to read 75% of all US internet traffic – report

RT | August 21, 2013

Newly unveiled National Security Agency programs detail how the US government has the ability to monitor approximately 75 per cent of American internet traffic, and further discloses how telecommunications companies are compelled to provide such data.

The programs – known as Blarney, Fairview, Oakstar, Lithium, and Stormbrew – are able to monitor the writing of emails, not just a message’s metadata, according to The Wall Street Journal. The programs also affect digital phone calls placed inside the US.

Among other capabilities, the systems can “reach roughly 75 per cent of all US internet traffic, including a wide array of communications by foreigners and Americans.”

The NSA commands internet service providers (ISPs) to send “various stream internet traffic it believes most likely to contain foreign intelligence,” then copies that data and searches through it.

NSA officials have claimed in recent weeks that the intelligence agency “touches” a mere 1.6 percent of internet traffic, although TechCrunch speculated that rhetoric refers to information that has been sent to the NSA and “culled to their liking.”

Perhaps the most disturbing news is that the NSA worked in conjunction with the FBI to monitor all email and text messages for the six month period surrounding the 2002 Olympic Games in Salt Lake City, Utah.

One NSA official, who wished to remain anonymous, told The Wall Street Journal that the NSA is “not wallowing willy-nilly” through Americans’ communications. “We want high-grade ore.”

The WSJ report is based on interviews with current and former government officials familiar with the NSA’s tactics. They claim the filtering was designed to identify communications that either begin or end outside the US, although the “broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected,” not foreign ones.

NSA spokeswoman Vanee Vines said that oversight is in place in the event that domestic communication is inadvertently recorded, including “minimization procedures that are approved by the US attorney general and designed to protect the privacy of United States persons.”

While lawmakers have asserted that NSA surveillance is necessary to protect national security, Blarney is known to have been in use since before the September 11, 2001 terrorist attacks. The program was operating near important fiber-optic landing points, including one in San Francisco, California and another in New Jersey, with the intention of intercepting foreign communications entering and exiting the US.

Such laws are permitted under Section 702 of the Foreign Intelligence Surveillance Act (FISA), which was expanded in 2008. Section 702 grants the NSA and the FBI the ability to monitor people who are “reasonably believed” to be located outside the US. Before FISA was expanded, it allowed the government to track targets if there was “probable cause” that they were an “agent of a foreign power.”

The PRISM surveillance program is also permitted under Section 702. One of the first Edward Snowden leaks to be published, an internal NSA document described PRISM’s method of collecting stored internet communications as “the number one source of raw intelligence used for NSA analytic reports.”

Multiple telecommunications companies have denied that PRISM requests administered by the government require bulk data turnovers – an indication that they are more precise than the internet filtration systems under Barney and other newly disclosed programs.

August 21, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Timeless or most popular | , , , , , , , , , | Leave a comment

Cellphone tracking cases highlight privacy concerns in digital age

Rt | August 20, 2013

In recent weeks, two cert petitions were filed seeking review of whether the Fourth Amendment covers police searches of cellphone records upon arrest.

From mobile phone and GPS tracking to license plate reading and domestic surveillance drones — not to mention recent revelations of widespread abuse of surveillance capabilities by the National Security Agency — these cases and many others highlight major questions that remain unanswered regarding how privacy rights of Americans can co-exist with the use of rapidly evolving technologies.

State and federal law enforcement agencies have wasted no time seizing on gaps and omissions in established legal precedent to justify vast, routine surveillance of the American public which tests Fourth Amendment rights.

On July 30, a petition was filed in Riley v. California challenging a previous ruling in a California appellate court that affirmed the petitioner’s convictions, which stemmed in part from a questionable search of his smartphone in 2009 following a traffic stop for expired license plates. And late last week, the US Department of Justice filed a petition in United States v. Wurie asking for review of a First Circuit Court of Appeals ruling that police needed a warrant to access a suspect’s phone records. Regarding Wurie, the government contends a cell phone is no different from any other item on a suspect at the time of arrest. The search pertaining to Wurie occurred in 2007.

On the surface, the two cases have much in common. But in Riley, the phone in question is a smartphone – a Samsung Instinct M800. In Wurie, the cellphone was a Verizon LG flip-phone incapable of maintaining the breadth of information – including internet searches, email, photos and other media – that a smartphone can store.

As of May, Pew Research Center found that 91 percent of Americans own cellphones, and 61 percent of those cellphones are smartphones.

GPS technology has received more scrutiny from courts than cellphones have in recent years. Last week, the Justice Department appeared before a federal court defending its right to shield legal memos that provide guidance to federal prosecutors and investigators for how to use GPS devices and other surveillance technologies from the public. In a sense, the memos were released upon a Freedom of Information Act request by the American Civil LIberties Union (ACLU), though their contents were heavily redacted.

The memos (read here and here) were legal interpretations of a January 2012 Supreme Court ruling in United States v. Jones in which the court ruled the use of GPS technology to track a car’s movements constitutes a “search” within the parameters of the Fourth Amendment. Upon release of the indecipherable legal memos, the ACLU filed a lawsuit seeking the full, uncensored guidelines.

“While we agree that executive branch lawyers should be able to freely discuss legal theories, once those opinions become official government policy the public has an absolute right to know what they are,” wrote Brian Hauss, legal fellow with the ACLU’s Speech, Privacy and Technology Project. “Otherwise, the government is operating under secret law that makes accountability to the people impossible.

The ruling in United States v. Jones left many unanswered questions regarding the use of other location-monitoring technologies pertaining to, for example, the tracking of cellphones or the use of license-plate readers – not to mention the use of surveillance drones in the US. In addition, the Jones ruling fell short of even determining whether a warrant is necessary to use GPS devices.

Building on the Jones decision, New Jersey recently became a state ahead of the curve in defining rules for law enforcement and privacy rights in the digital age. The New Jersey Supreme Court ruled in July that state police must have a search warrant before obtaining tracking information from cellphone providers.

“Using a cellphone to determine the location of its owner can be far more revealing than acquiring toll billing, bank, or internet subscriber records,” Chief Justice Stuart Rabner wrote in the case’s opinion. “Details about the location of a cellphone can provide an intimate picture of one’s daily life and reveal not just where people go – which doctors, religious services and stores they visit – but also the people and groups they choose to affiliate with. That information cuts across a broad range of personal ties with family, friends, political groups, health care providers and others.”

In June, Montana became the first state to require police to obtain a warrant before tracking a suspect’s cellphone.

In March 2012, the ACLU reviewed records from over 200 local police departments, finding vast, aggressive use of cellphone tracking for emergency and nonemergency uses.

Another ACLU report, released in July of this year, queried around 600 local and state police departments (and other state and federal agencies) via public records requests to assess how these agencies use automatic license plate readers. The civil liberties organization found massive databases of innocent motorists’ location information gleaned through hundreds of millions of “plate reads” by the ubiquitous readers. Data is often stored for an indefinite period of time, revealing just how easy it is for law enforcement – as well as many private companies – to track any license plate with few legal restrictions in place to stop them.

For example, for every one million plates that were read in the state of Maryland in the first half of 2012, 2000 (0.2 percent) were hits, mostly regarding registration or emissions issues. Of those 2000 hits, less than 3 percent (47) were potentially connected to more serious crimes.

In addition, much of this network of readers throughout the nation is in place thanks to a large amount of federal funding – $50 million in the last five years.

Approval of licenses for domestic drones has begun, as RT has reported, even though solid rules for their eventual use in American skies have yet to materialize from either Congress or the Federal Aviation Administration. The FAA expects as many as 30,000 drones in American airspace by 2020.

For now, many local law enforcement agencies are leading the quest for drone-use approval, though requests for commercial drones are mounting. As of February 15, 2013, there were 327 active drone certifications despite there being no regulatory framework in place. However, the FAA did get around to certifying two types of unmanned aircraft for civilian use in the US in late July.

In the meantime, federal government agencies have used drones domestically both out in the open and in secret. The Federal Bureau of Investigation has admitted to already using surveillance drones despite no established law or guidelines for their use. The US Department of Homeland Security has used surveillance-capable drones along the border for years, even allowing other federal agencies to use its fleet to the tune of 250 times in 2012 alone, The New York Times reported.

August 20, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , , , | Leave a comment

Focusing on the Core Harms of Surveillance

By Frank Pasquale | Balkinization | August 16, 2013

The “summer of NSA revelations” rolls along, with a blockbuster finale today. In June, Jennifer Granick and Christopher Sprigman flatly declared the NSA criminal. Now the agency’s own internal documents (leaked by Snowden) appear to confirm thousands of legal violations.

Legal scholars will not be surprised by the day’s revelations, just as few surveillance experts were all that shocked by the breadth and depth of PRISM, PINWALE, MARINA, and other programs. Ray Ku called warrantless surveillance unconstitutional in 2010. Civil liberties groups and legal scholars warned us repeatedly about where Bush-era executive power theories would lead. As anyone familiar with Bruce Ackerman’s work might guess, pliable attorneys have rubber-stamped the telephony metadata program with a “white paper” that “fails to confront counterarguments and address contrary caselaw” and “cites cases that [are] relatively weak authority for its position.” There are no meaningful penalties in sight (perhaps because the OLC has prepared documents that function as a “get out of jail free” card for those involved).

Like the data mining they employ, the NSA surveillance programs are hard to govern democratically (or cabin legally) because of the speed, scale, and secrecy of the problems they address. They fall into “black holes” of administrative review, where the inclination of judges to review them is at lowest ebb. Even if judges find “ticking time bomb” scenarios unlikely in the extreme, the surveillance apparatus can evoke plenty of other existential risks to demand deference. If you were on the FISA court and the NSA told you that they needed to collect everyone’s data because they were trying to track down a swarm of poison-bearing microdrones, how long would you delay them to “dig into the substance” before approving the request? As Desmond Manderson has argued, “Trust Us Justice” is the order of the day.

Real Harms

Nevertheless, the long-term danger of an unaccountable surveillance state is probably much greater than that posed by any particular terror threat.* Both Julie Cohen and Neil Richards have explained the many dangers arising out of pervasive surveillance. As Richards observes,

[The] special harm that surveillance poses is its effect on the power dynamic between the watcher and the watched. This disparity creates the risk of a variety of harms, such as discrimination, coercion, and the threat of selective enforcement, where critics of the government can be prosecuted or blackmailed for wrongdoing unrelated to the purpose of the surveillance.

To make this more concrete: note that the US’s intelligence apparatus has already extensively monitored libertarians and peace activists. According to the Partnership for Civil Justice Fund, “from its inception, the FBI treated the Occupy movement as a potential criminal and terrorist threat.” During Occupy Wall Street, investigative journalists uncovered command centers advised by federal and local officials and banks. Skeptics wondered whether banks’ lucrative “private detail pay” and donations for police helped motivate multiple, brutal crackdowns on peaceful (if unorthodox) protesters. Homeland security officials may have advised local police on containment of the hundreds of “Occupy” encampments that arose in the fall of 2011. And in terms of selective enforcement: one has to wonder why police decided to care about a six-year-old open container violation at the homes of activists one day before May Day protests.

For a concrete example of how an activist deals with this type of news, consider the story of one Daytona woman:

[She] is a 45-year-old married mother of two young children. She is a homeowner, a taxpayer and a safe driver. She votes in every election. She attends a Unitarian Universalist church on Sundays. She is also, like nearly all who have a relationship with the Occupy movement in the United States, being monitored by the federal government. . . . McLeish worries about how being a target of FBI attention will affect her life. “Can the inclusion of my name and information on a federal law enforcement domestic terrorist watch list impact my ability to make a living and provide for my children?” she asked.

This is not a purely speculative concern, however much the SCOTUS majority in Clapper v. Amnesty may dismiss such worries as the fruit of a “chain of contingencies.” FBI screens are used to deny persons jobs, now. Many applicants have no idea they are even part of the hiring process:

Updating the records of those who fall through the cracks can be confusing and cumbersome. FBI regulations say that employers and licensing agencies should give applicants time to challenge and correct their records, either by contacting the FBI or the jurisdiction that collected the data. But applicants are not always given a copy of their report or told why they were disqualified. Often, the burden is on them to prove an error was made.

Even if the databases don’t include those who are not arrested, what stops law enforcement agencies from including “suspects” in related databases? Employers may not want to have anything to do with someone “under watch” by the government. Moreover, even being arrested can be a form of speech: consider the Moral Monday protesters in North Carolina.

Speculative No More

In his press conference last week, President Obama stated, “If you look at the reports, even the disclosures that Mr. Snowden’s put forward, all the stories that have been written, what you’re not reading about is the government actually abusing these programs and, you know, listening in on people’s phone calls or inappropriately reading people’s e-mails.” In Clapper v. Amnesty Int’l, Justice Alito trivialized the plaintiffs’ concerns as mere conjecture. Surveillance promoters on both left and right argue that privacy activists haven’t demonstrated any concrete harms. The former NSA director has dismissed those concerned as “nihilists, anarchists, activists, Lulzsec, Anonymous, twentysomethings who haven’t talked to the opposite sex in five or six years.”

Implications of paranoia (among those worried about surveillance) now themselves appear fantastical. The Supreme Court’s bizarre decision in Clapper v. Amnesty International, that respondents’ claims about being monitored were “too speculative” to merit judicial review, now deserves not merely rebuke, but reconsideration. Unless the surveillance apparatus wants to claim that Greenwald, the ACLU, EPIC, and PCJF are making up documents out of whole cloth, it has to acknowledge that not only have laws been violated, but exactly the types of harms those laws were designed to stop have indeed occurred. This is not just a matter of legalist punctilio or nihilist skepticism.

Tragically, the core surveillance harms are not likely to provoke much political pushback against the NSA. Unlike the Framers, who wrote the Constitution shortly after risking their lives for their political commitments, most Americans have little respect for the political targets of NSA/DHS/FBI/Police/DEA surveillance and information sharing.** For the average voter, about the only thing more suspect than the two major parties are political activists who operate outside their ken. Justice Roberts’s FISA Court, and the dozens of appellate judges like them, are unlikely to have more enlightened views. A movement to make the surveillance apparatus more accountable will need to achieve its goals indirectly, focusing on the costs, creepiness, or crony capitalism of mass surveillance. I hope to elaborate on each of these issues in future posts.

*Though perhaps not greater than the sum of terror threats—a question presently explored via cost-benefit analysis, but probably better addressed in scenario planning.

**To preempt the comment “you’re mixing up different programs:” please take a look at this article on vertical and horizontal fusion of data sources in the new Information Sharing Environment. For the TL;DR crowd, there’s this.

August 19, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , , , | Leave a comment

Federal Appeals Court Lets FBI off the Hook after It Lied to a Judge

By Ken Broder | AllGov | August 12, 2013

Yes, the FBI was spying on the Muslim community in Southern California and, yes, it lied to a federal judge about the existence of documents relevant to a case regarding that   surveillance.

But, no, the FBI shouldn’t be sanctioned for its behavior.

That was the ruling by the U.S. Ninth Circuit Court of Appeals, which disagreed with U.S. District Judge Cormac J. Carney, who ordered the government in 2011 to pay court costs for those bringing suit on behalf of the Islamic Shura Council of Southern California, an umbrella organization of mosques and Muslim organizations that has operated in Southern California since 1995.

The civil liberties case before the District Court alleged that U.S. authorities illegally spied on mosques in 2006 and 2007. The FBI was accused of sending an undercover informant into several Orange County mosques as part of Operation Flex and may have collected information on hundreds of people. The FBI admitted that it used the informant, but demanded that the case be tossed for national security reasons.

Lawyers for the mosques demanded to see surveillance records on the plaintiffs. The FBI told the judge it had provided all the information within the scope of the plaintiffs’ original Freedom of Information Act request. That wasn’t true and an incensed Judge Carney sanctioned the FBI.

“The Government cannot, under any circumstance, affirmatively mislead the Court,” Judge Carney wrote.

But the Ninth Court of Appeals said that wasn’t true and reversed his ruling. You can, apparently lie to a judge if later on you admit you lied.

The FBI had initially released eight heavily-redacted pages of information in response to the lawsuit brought against them and said that was all there was. But eventually they coughed up another 100 pages of equally heavily-redacted documents that they showed the judge privately in camera. Then, later, the FBI produced yet more documents.

In response to the serial deception, Carney wrote in his 2011 ruling, “The court must impose monetary sanctions to deter the government from deceiving the court again.”

The three-judge appellate panel disagreed, cited what is known as a safe harbor provision of the law, and reversed on procedural grounds, saying what counted was the fact that the judge eventually got the documents.

A frustrated Judge Carney tossed out the spying lawsuit against the FBI in August 2012 for national security reasons, likening himself to a fictional Greek hero who must save all those around him at the expense of a few. “Odysseus opted to pass by the monster and risk a few of his individual sailors, rather than hazard the loss of his entire ship to the sucking whirlpool,” the apologetic judge wrote.

To Learn More:

No Sanctions for FBI’s Evasive Court Tactics (by Tim Hull, Courthouse News Service)

Judge Sanctions FBI for Hiding Info from Him (by Tim Hull, Courthouse News Service)

Mosques Will Not Get Day in Court to Contest U.S. Spying (by Ken Broder, AllGov California)

Federal Court Sanctions FBI for Lying about Surveillance Records (by Noel Brinkerhoff and David Wallechinsky, AllGov)

Islamic Shura Council of Southern California et al v. Federal Bureau of Investigation  (U.S. Ninth Circuit Court of Appeals) (pdf)

August 13, 2013 Posted by | Civil Liberties, Deception | , , , | Leave a comment

IRS gets help from DEA and NSA to collect data

By Robert Bridge | RT | August 8, 2013

The Internal Revenue Service reportedly received incriminating information on US citizens from the Drug Enforcement Agency, with the assistance of the National Security Agency, before concealing the paper trail from defendants.

Details of a Drug Enforcement Administration (DEA) program that provides tips to the Internal Revenue Service (IRS) and then advises them to “recreate the investigative trail” were published in a manual used by IRS agents for two years, Reuters revealed.

The practice of concealing the source of information has attracted the scrutiny of legal experts and is now under review by the US Justice Department.

A brief entry in the Internal Revenue Manual instructed agents of the US tax agency to omit any reference to information provided by the DEA’s Special Operations Division, especially with regard to “affidavits, court proceedings or investigative files.”

The entry was published and posted online in 2005 and 2006, and removed in early 2007.  An IRS spokesman had no comment on the entry or on why it was removed from the manual, Reuters reported.

The IRS publication provides some further detail on the parallel construction concept.

“Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects,” the IRS manual says. “SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations.”

According to the document, IRS agents are directed to use the intelligence as a starting point for unearthing new, “independent” evidence: “Usable information regarding these leads must be developed from such independent sources as investigative files, subscriber and toll requests, physical surveillance, wire intercepts, and confidential source information. Information obtained from SOD in response to a search or query request cannot be used directly in any investigation (i.e. cannot be used in affidavits, court proceedings or maintained in investigative files).”

In addition to the IRS, the Special Operations Division cooperates with a number of government agencies, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.

The way the intelligence-gathering system worked is as follows: The Special Operations Division of the DEA channels secret data from overseas NSA intercepts, domestic wiretaps, informants and a large DEA database of telephone records to authorities nationwide to assist them with criminal investigations of US citizens, according to the Reuters report.

The DEA telephone database is different from the NSA database that was revealed by former NSA contractor Edward Snowden, who is now living in Russia under asylum.

The DEA, which works behind the scenes to investigate drug dealers, money launderers and other criminals, argues that the practice does not violate the law and has been in “near-daily use since the 1990s.” The agency said the reason it directs federal agents to recreate the investigation trail is to “protect sources and methods, not to withhold evidence.”

Judicial hurdles ahead

Legal experts, however, say that concealing potential evidence from defendants violates the US Constitution. According to documents and interviews obtained by Reuters, federal agents use a procedure called “parallel construction” to conceal the tracks of the investigative trail. For example, agents could say that an investigation was launched due to a traffic violation as opposed to an SOD tip.

House Intelligence Committee Chairman Mike Rogers expressed concern with the parallel construction program.

“If they’re recreating a trail, that’s wrong and we’re going to have to do something about it,” Rogers, a former FBI agent, said on the Mike Huckabee Show radio program. “We’re working with the DEA and intelligence organizations to try to find out exactly what that story is.”

Spokespeople for the DEA and the Department of Justice declined to comment.

Sen. Rand Paul, a member of the Homeland Security and Government Affairs Committee, said he was troubled that DEA agents have been “trying to cover up a program that investigates Americans.”

“If the Constitution still has any sway, a government that is constantly overreaching on security while completely neglecting liberty is in grave violation of our founding doctrine,” Paul added

The NSA database contains data about every telephone call made inside of the United States. This information, according to a NSA official, as quoted by Reuters, “is not used for domestic criminal law enforcement.”

The DEA database, or DICE for short, consists largely of phone log and internet data gathered legally by the DEA through “subpoenas, arrests and search warrants nationwide.” DICE has on file “about 1 billion records,” which are stored for about one year before being destroyed, DEA officials said.

August 8, 2013 Posted by | Civil Liberties, Deception, Timeless or most popular | , , , , , , , , , , , , | Leave a comment

ACLU Calls for New Investigations into Todashev Death

Abdulbaki Todashev, Ibraghim's father, holds up photos of his dead son at a press conference at the RIA Novosti headquarters in Moscow on May 30.
RIA NovostiJuly 23, 2013

WASHINGTON – The American Civil Liberties Union (ACLU) wants two US states, Florida and Massachusetts, to open their own investigations into the Federal Bureau of Investigation (FBI) shooting death of a Chechen immigrant acquainted with one of the Boston Marathon bombing suspects.

“A person was shot and killed at the hands of law enforcement in Florida. That alone should require Florida officials to investigate, and explain to the public what happened,” said Howard Simon, Florida Executive Director for the nonprofit civil liberties organization, in an ACLU press release.

The FBI and the Department of Justice are conducting an internal inquiry into the death of 27-year-old Ibragim Todashev, who was shot and killed by a Boston-based FBI agent during an interrogation with several different law enforcement agencies at his Orlando, Florida apartment on May 22.

Todashev was being questioned about a triple murder in the Boston area and his link to suspected marathon bomber Tamerlan Tsarnaev, who was killed during a shootout with police in the Boston suburb of Watertown four days after the bombings.

There have been varying reports about exactly what happened when Todashev was killed.

“Florida officials are simply deferring to the FBI, allowing the FBI to investigate itself, but it is difficult to accept the FBI’s honesty in this matter,” the ACLU wrote in a letter to Commissioner Gerald Bailey of the Florida Department of Law Enforcement, adding, “Now, more than eight weeks later, the public has very little information about this incident… Officials in both states should conduct their own investigations.”

In a similar letter to Massachusetts Attorney General Martha Coakley, the ACLU of Massachusetts (ACLUM) pointed to a New York Times analysis that found “FBI shooting reviews… virtually always clear the agency of wrongdoing.”

Last week the FBI blocked the release of Todashev’s autopsy by the Florida medical examiner’s office.

Carol Rose, ACLUM executive director, wrote, “It seems unlikely that the FBI investigation will meaningfully inform Massachusetts residents about what happened.”

Coakley’s office does not plan to open a new investigation.

“While the use of deadly force by law enforcement should be appropriately investigated, this particular incident happened in another state, which is outside our jurisdiction,” Coakley spokesman Brad Puffer told RIA Novosti.

Officials in Florida did not immediately respond to a request for comment from RIA Novosti.

July 24, 2013 Posted by | Civil Liberties, Deception, False Flag Terrorism | , , , , , | 1 Comment

Barrett Brown Prosecution Threatens Right to Link, Could Criminalize Routine Journalism Practices

By Hanni Fakhoury and Trevor Timm | EFF | July 19, 2013

Twitter was abuzz yesterday when an unknown person published what were alleged to be a group of passwords for the email accounts of Congressional staffers. Multiple journalists, including reporters from the Daily Beast and Buzzfeed, commented on the list while linking to it.

While one would assume linking to the list is a First Amendment-protected activity—given the journalists had nothing to do with stealing the passwords—Barrett Brown is currently under indictment, in part, for remarkably similar behavior. And if he is convicted, it could have dire consequences for press freedom.

Brown, who has written for Vanity Fair and the Guardian among other publications, started a website called “Project PM” in 2009, which crowdsourced public information about security contractors who worked with government agencies like the NSA. Part of what Brown and other Project PM users investigated were leaked emails from security contractors like HB Gary and Stratfor.

Now, it’s important to note that, despite his fascination with Anonymous, Brown has never been accused of participating in any hacking. In fact, he lacks the expertise to even do so. Northwestern professor Peter Ludlow described what happened after Stratfor emails were leaked online by Anonymous: “When the contents of the Stratfor leak became available, Brown decided to put ProjectPM on it. A link to the Stratfor dump appeared in an Anonymous chat channel; Brown copied it and pasted it into the private chat channel for ProjectPM, bringing the dump to the attention of the editors.”

The link, it turned out, contained credit card numbers, among the wealth of information on the company itself. But by merely transferring the link from one chat room to another, Brown was indicted for trafficking in stolen authentication features (specifically the credit card verification values (“CVV”), or the three-digit number on the back of a credit card), access device (i.e., credit card) fraud and aggravated identity theft. (He is also indicted in two separate criminal cases with making online threats to an FBI agent and obstruction of justice, but those have no bearing on the charges being discussed here.)

The government’s prosecution theory isn’t limited to credit card numbers. The same theory could potentially be used against the Daily Beast or Buzzfeed journalists yesterday, or against any journalist that has linked to stolen material of a similar nature. That’s because the federal identity theft statute, 18 USC § 1028, is remarkably broad.

The statute criminalizes knowingly transferring an “authentication feature” known to be stolen or taken without lawful authority. “Authentication feature” means any “symbol,” “code” or “sequence of numbers or letters” used to authenticate a means of identification. And “means of identification” is defined as “any name or number that may be used alone or in conjunction with any other information, to identify a specific individual” including a “unique electronic identification number, address, or routing code.” The government has argued before—specifically in its prosecution of Andrew “Weev” Auernheimer—that this definition covers email addresses.

Under the government’s theory in Barrett Brown’s case, all journalists (and anyone else for that matter) tweeting out the link to the list of Congressional staffer email addresses and passwords were trafficking in authentication features and are guilty of a felony. While it turns out that many of the passwords in this case may not have been accurate, this lesson holds true anytime someone links to groups of stolen passwords posted online, which seems to happen fairly frequently.

And in this situation, under the Justice Department’s theory, those linking to the list violated the aggravated identity theft statute too because during that crime, they knowingly transferred “without lawful authority, a means of identification of another person”—the email addresses. These are serious charges; aggravated identity theft alone carries a mandatory two-year prison sentence that must run consecutively to any other sentence imposed.

It bears repeating: the government does not allege Brown participated in the hacking of Stratfor at all. Here, Brown didn’t even publish anything, he merely directed other people to where information was already published via a standard hyperlink. The right of journalists—or anyone for that matter—to link to already-public information, including sensitive information, is in serious jeopardy if Brown is convicted.

We’ll have more on the dangers of the Barrett Brown prosecution to both the press and public soon. In the meantime Brown’s case and the massive linking to the Congressional e-mail addresses and passwords that occurred yesterday emphasize why journalists should be worried when the right to link is threatened.

July 20, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , | Leave a comment

Killing terror witnesses: Bin Laden, Todashev cover-ups discredit US

By Dr. Kevin Barrett | Press TV | July 18, 2013

The FBI apparently wanted Ibragim Todashev to sign a false witness statement implicating the Tsarnaev patsies. Todashev refused, presumably because he (like everyone else who knew the brothers) was convinced of their innocence. So the FBI murdered Todashev, execution-style, as a message to others involved in the case: “Cooperate with our frame-up of the Tsarnaevs, or else…”

The US government wants us to believe its tales about the deaths of Boston bombing witness Ibragim Todashev and terror boogieman Osama Bin Laden. So why is it hiding key information about both cases?

Yesterday the Boston Globe reported, “A Florida medical examiner’s office said Tuesday that the FBI has ordered the office not to release its autopsy report of a Chechen man fatally shot by a Boston FBI agent in May…”

Why would the FBI cover up the Todashev autopsy report? Because it showed that FBI agents murdered Todashev in cold blood, execution style.

Todashev’s father has obtained sixteen detailed photographs of his son’s body. They show six gunshot wounds to the torso – and an execution-style blowout to the back of the head.

Why would FBI agents stage the execution-style murder of an important witness in the Boston bombing case? If they were trying to solve the bombing, they would obviously do everything humanly possible to keep all witnesses alive. When the FBI starts killing witnesses – or helping other agencies and criminal organizations kill witnesses, as in the JFK cover-up – it means they are trying to cover up the crime, not solve it.

What is the FBI covering up? The truth. The Boston bombing was obviously a poorly-executed false-flag operation.

Prior to the bombing, the authorities repeatedly announced that a terror drill was taking place. They told participants not to worry, it was only a drill.

Rooftop “spotters” were running the bombing. Witnesses report that suspicious figures, apparent paramilitary professionals, were overseeing the bombing from neighboring rooftops. These “spotters” were captured in photographs, as reported by Science Times in the article “Mystery Man On Roof Sparks Boston Marathon Explosion Conspiracies.”

The spotters were giving orders to the Craft International operatives who planted the bombs, as proved beyond a reasonable doubt by photographic evidence.

The FBI apparently wanted Ibragim Todashev to sign a false witness statement implicating the Tsarnaev patsies. Todashev refused, presumably because he (like everyone else who knew the brothers) was convinced of their innocence. So the FBI murdered Todashev, execution-style, as a message to others involved in the case: “Cooperate with our frame-up of the Tsarnaevs, or else…”

The FBI’s lies about the Todashev killing are similar to US government lies about the alleged killing of Osama Bin Laden. In both cases, it seems that critically-important witnesses were murdered rather than kept alive – which makes absolutely no sense.

If the US government was really trying to solve the crimes of 9/11, and if it really believed that Osama Bin Laden was a terrorist mastermind, it would have done everything possible, including sacrificing the lives of as many soldiers as necessary, to take Bin Laden alive.

If he was really an al-Qaeda mastermind, Bin Laden would have possessed critically important information about his terrorist network. If government conspiracy theories are true, Bin Laden’s organization might even have obtained WMD and targeted American cities. By killing Bin Laden rather than taking him alive and interrogating him, the US might have condemned hundreds of thousands or even millions of Americans to death by al-Qaeda WMD attack. And even if this were only a 1% possibility, as Dick Cheney tells us, the government would have to treat it as if it were definitely going to happen.

So when the US government tells us it made no real effort to capture Bin Laden alive, but instead just staged an execution-style killing of the most important terror witness in history, it is obviously lying.

The story of the alleged Bin Laden killing is full of contradictions and absurdities. First we were told that Obama and his cabinet watched the killing as it happened; we were even shown photos of Hillary Clinton shrieking in pleasure at the sight. Then we were told that this never happened.

We were shown a fake photo purporting to show Bin Laden’s corpse. It turned out to be a bad photoshop hoax.

In fact, there are no photos of Bin Laden’s body. There was no autopsy. There was no positive identification that it was Bin Laden, no transparent, public DNA evidence with a chain of custody, no witnesses… no evidence at all, in fact. And nobody saw the body being thrown into the ocean, “in accordance with Islamic burial custom” !

The Associated Press and the London Daily Mail recently published an article headlined:  

“Pentagon DELETES files about Osama bin Laden raid after transferring them to CIA where they can’t be made public
– Military files about the Navy SEAL raid on Osama bin Laden’s hideout have been purged from Pentagon computers
Associated Press requested information on the raid some 20 times in 2011 but requests were rejected
– A line in an inspector general’s draft report states the files were purged from the defense department to another government department to prevent certain information about the raid being made public
– The sentence was removed from the final report released weeks ago”

If the government account is true, the secrecy makes no sense. If they really killed Bin Laden, every scrap of information about the raid – every second of video, every photograph, every memo, every DNA test, every autopsy file, every debriefing – would be proudly waved before the world.

If the government account were true, there would be no need to “prevent certain information about the raid being made public.”

So what are they covering up? Did they kill a Bin Laden double rather than Bin Laden himself, who (according to numerous reports) died in December, 2001? Or was the whole raid just a drill – a theatrical staged event like the Boston bombings… and like 9/11 itself?

July 19, 2013 Posted by | Deception, False Flag Terrorism, Timeless or most popular | , , , , , , | 2 Comments

US reviews 27 death penalty convictions due to FBI errors

RT | July 18, 2013

The FBI has reviewed thousands of criminal cases and suspects that 27 death penalty convictions may have been secured by using faulty and exaggerated testimonies that may have wrongfully linked defendants to crimes.

A joint review by the Federal Bureau of Investigation and the Justice Department was launched after the Washington Post last year reported that flawed forensic work by FBI hair examiners might have led to the convictions of innocent people. The article suggested that Justice Department officials knew of the flaws, but failed to acknowledge them.

Last July, federal officials announced that they would investigate old criminal cases to see if faulty testimonies influenced death penalty convictions. More than 21,700 FBI Laboratory files are being examined, and at least 120 convictions have already been identified as potentially suspicious. Of these, about 27 were death penalty convictions, the Post reports.

Investigators suspect that these convictions may have been influenced by FBI hair examiners who exaggerated the significance of their findings. These experts linked defendants to crimes based on “matches” from microscopic analysis of hair found at crime scenes. Many of these experts claimed that their hair analysis tests definitively confirmed the identity of the offender.

But such statements were often misleading: since the 1970s, FBI reports have usually stated that hair tests are not adequate proof to link a suspect to a crime, since these tests can be flawed.

In cases where solely a hair analysis led to a suspect’s conviction, US courts may have mistakenly locked up innocent people – or in some cases, sentenced them to death.

“One of the things good scientists do is question their assumptions,” David Christian Hassell, director of the FBI Laboratory, told the Post. “No matter what the field, what the discipline, those questions should be up for debate. That’s as true in forensics as anything else.”

The federal review of convictions has raised awareness about the problems that hair tests can pose when there is no other evidence to prove a suspect’s guilt. Texas executes more inmates than any other US state, and its Forensic Science Commission on Friday decided to scrutinize hair cases at all labs under its jurisdiction.

The review also led to a stay of execution in May. Willie Jerome Manning, a 44-year-old man convicted of murdering two college students in 1992, was scheduled to die by lethal injection in Mississippi. But the Justice Department discovered flaws in the forensic testimony that led to his conviction, which halted the execution pending further investigation.

It is unclear how many inmates are on death row or may have been executed already as a result of faulty hair tests, but the FBI says it will announce partial results of its examination later this summer. The review is currently prioritizing cases in which defendants can be punished by execution. Once that review is complete, the agency will examine cases in which defendants are currently imprisoned.

July 19, 2013 Posted by | Civil Liberties, Corruption, Deception, Timeless or most popular | , , , , , , , , , | Leave a comment