Aletho News

ΑΛΗΘΩΣ

All Drone Politics Is Local

By David Swanson | November 14, 2013

What Localities and States Can Do About Drones

Charlottesville, Va., passed a resolution that urged the state of Virginia to adopt a two-year moratorium on drones (which it did), urged both Virginia and the U.S. Congress to prohibit information obtained from the domestic use of drones from being introduced into court, and to preclude the domestic use of drones equipped with “anti-personnel devices, meaning any projectile, chemical, electrical, directed-energy (visible or invisible), or other device designed to harm, incapacitate, or otherwise negatively impact a human being,” and pledged that Charlottesville would “abstain from similar uses with city-owned, leased, or borrowed drones.”

St. Bonifacius, Minn., passed a resolution with the same language as Charlottesville plus a ban on anyone operating a drone “within the airspace of the city,” making a first offense a misdemeanor and a repeat offense a felony.

Evanston, Ill., passed a resolution establishing a two-year moratorium on the use of drones in the city with exceptions for hobby and model aircraft and for non-military research, and making the same recommendations to the state and Congress as Charlottesville and St. Bonifacius.

Northampton, Mass., passed a resolution urging the U.S. government to end its practice of extrajudicial killing with drones, affirming that within the city limits “the navigable airspace for drone aircraft shall not be expanded below the long-established airspace for manned aircraft” and that “landowners subject to state laws and local ordinances have exclusive control of the immediate reaches of the airspace and that no drone aircraft shall have the ‘public right of transit’ through this private  property,” and urging the state and Congress and the FAA “to  respect legal precedent and constitutional guarantees of privacy, property rights, and local sovereignty in all matters pertaining to drone aircraft and navigable airspace.”

See full text of all resolutions at warisacrime.org/resolutions

Other cities, towns, and counties should be able to pass similar resolutions. Of course, stronger and more comprehensive resolutions are best. But most people who learned about the four resolutions above just leaned that these four cities had “banned drones” or “passed an anti-drone resolution.” The details are less important in terms of building national momentum against objectionable uses of drones.  By including both surveillance and weaponized drones, as all four cities have done, a resolution campaign can find broader support.  By including just one issue, a resolution might meet fewer objections.  Asking a city just to make recommendations to a state and the nation might also meet less resistance than asking the city to take actions itself.  Less can be more.

Localities have a role in national policy. City councilors and members of boards of supervisors take an oath to support the Constitution of the United States. Cities and towns routinely send petitions to Congress for all kinds of requests. This is allowed under Clause 3, Rule XII, Section 819, of the Rules of the House of Representatives. This clause is routinely used to accept petitions from cities, and memorials from states. The same is established in the Jefferson Manual, the rulebook for the House originally written by Thomas Jefferson for the Senate. In 1967, a court in California ruled (Farley v. Healey, 67 Cal.2d 325) that “one of the purposes of local government is to represent its citizens before the Congress, the Legislature, and administrative agencies in matters over which the local government has no power. Even in matters of foreign policy it is not uncommon for local legislative bodies to make their positions known.” Abolitionists passed local resolutions against U.S. policies on slavery. The anti-apartheid movement did the same, as did the nuclear freeze movement, the movement against the PATRIOT Act, the movement in favor of the Kyoto Protocol, etc. No locality is an island. If we become environmentally sustainable, others will ruin our climate. If we ban assault weapons, they’ll arrive at our borders. And if the skies of the United States are filled with drones, it will become ever more difficult for any city or state to keep them out.

How to pass a local resolution: Every city or county is different, but some rules of thumb are applicable. To the extent possible, build understanding of the issues.  Invite speakers, screen films, hold conferences.  To the extent possible, educate and win over elected officials.  Make the case that localities have a responsibility to speak on national issues to represent the interests of local people.  Make the case that the time to act is before the problem expands out of control. Most states are considering drone legislation, so refer to that activity in your state. Make clear that you are aware of countless benevolent and harmless uses of drones but that you are prioritizing Constitutional rights and want exceptions made for uses that do not endanger self-governance rather than drones being made the norm and restrictions the exception. The Congressional Research Service says drones are incompatible with the Fourth Amendment. The U.N. Special Rapporteur says drones are making war the norm.  If possible, propose the weakest resolution you can, and ask the local government to put it on the agenda for consideration; then propose the strongest possible resolution you dare.  You may end up with a compromise, as happened in Charlottesville. Work the local media and public. Pack the meeting(s). Take advantage of every opportunity for the public to speak. Unlike at the state or national levels, you are unlikely to face any organized opposition. Make your most persuasive case, and make a great show of public support. Equate a “No” vote with support for cameras in everyone’s windows and armed drones over picnics. Equate a “Yes” vote with prevention of racial profiling, activist profiling, and the targeting of all sorts of groups that can be recruited into your campaign.

STATES: See full text of all resolutions at warisacrime.org/resolutions

Oregon has passed a law banning weaponized drones in all cases and banning drone use by law enforcement unless they have a warrant, they have probable cause without a warrant, or for search and rescue, or for an emergency, or for studying a crime scene, or for training (and the Fourth Amendment be damned).

Virginia has passed a law banning local and state (but not federal or National Guard) government drone use for two years unless various color-coded alerts are activated or there is a search or rescue operation or for training exercises or for drone-training schools, and strictly banning (for two years) any state or local weaponized drones.

Florida has passed a law banning law enforcement agencies from using drones to gather information unless they think they have some sort of reason to do so (and the Fourth Amendment be damned).

Idaho has passed a law banning drone surveillance “absent reasonable, articulable suspicion of criminal conduct” except in pursuit of marijuana in which case no such suspicion is needed (and the Fourth Amendment be damned).

Illinois has passed a law banning drones except for law enforcement agencies that have a warrant or when the Secretary of Homeland Security shouts “terrorism!” or they are reasonably suspicious it’s needed or are searching for a missing person or are photographing a crime scene or traffic crash scene (and the Fourth Amendment be damned).

Tennessee has passed a law banning law enforcement drones unless the Sec. of Homeland Security shouts “terrorism!” or there’s a warrant or there’s suspicion without a warrant (and the Fourth Amendment be damned).

Texas has passed a law banning the capturing of images with drones except for … too many exceptions to list.

Congressman Grayson passed an amendment to a DHS funding bill banning DHS from using weaponized drones, a step that must be repeated each year for this and other agencies unless a full national or international ban is put in place.

This article as a double-sided, single-page handout: PDF.

November 17, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Solidarity and Activism, Timeless or most popular | , , , | Leave a comment

Snowden Rebuts Sen. Feinstein’s Claims That The NSA’s Metadata Collection Is ‘Not Surveillance’

By Tim Cushing | Techdirt | October 25, 2013

Ed Snowden has briefly stepped up to the mic to rebut Dianne Feinstein’s claims that the NSA’s bulk phone records collections are “not surveillance.” While he didn’t specifically name Feinstein, it’s pretty clear who his comments are directed towards, what with the senator putting in overtime over the past few weeks defending the agency’s cherished but useless Section 215 collections haystacks that are definitely not collections (according to the Intelligence Dictionary.)

“Today, no telephone in America makes a call without leaving a record with the NSA. Today, no Internet transaction enters or leaves America without passing through the NSA’s hands,” Snowden said in a statement Thursday.

“Our representatives in Congress tell us this is not surveillance. They’re wrong.”

f02ea3b63917470084142dbb21404def-e1320171727121-300x336Her op-ed for the USA Today stated the following:

The call-records program is not surveillance.

Why is it not surveillance? Feinstein claimed, in direct contradiction to someone who’s seen most of the inner workings of the agency’s programs, that because it doesn’t sweep up communications or names, it isn’t surveillance. Also, she pointed out that surveillance or not, it’s legal. So there.

Maybe Feinstein considers the term “surveillance” to mean something closer to the old school interpretation — shadowy figures in unmarked vans wearing headphones and peering through binoculars.

Of course, this kind of surveillance contained many elements completely eliminated by the combination of the PATRIOT Act, the FISA Amendments Act, and a very charitable reading of the Third Party Doctrine. You know, the sort of stuff those shadowy men used to utilize: warrants, targeted investigations, reasonable suspicion, a grudging working relationship with the Fourth Amendment…

That’s all gone now. The courts have declared that sweeping up business records on millions of Americans is no more a violation of the Fourth Amendment than gathering metadata on a single person. The NSA has warped the definition of “surveillance” just as surely as they’ve warped the definition of “relevant.” The wholesale, untargeted gathering of millions of “transactions” from internet and phone activity doesn’t seem to resemble what anyone might historically think of as “surveillance,” but it’s surveillance nonetheless.

Sure, the NSA may not look at everything it gathers, but it has the capability to do so and it shows no interest in letting any of its dragnets be taken out of commission. The NSA’s defenders downplay the agency’s many intrusions by first playing the “legal” and “oversight” cards and, when those fail to impress, belittle their critics by trotting out condescending statements like, “The NSA isn’t interested in Grandma’s birthday phone call or the cat videos you email to your friends.”

Well, no shit. We’re hardly interested in that, either. We’re not worried about the NSA looking through tons of inane interactions. We know it doesn’t have the time or inclination to do so. We’re more concerned it’s looking at the stuff it finds interesting and amassing databases full of “suspicious” persons by relying on algorithms and keywords — a fallible process that robs everything of context and turns slightly pointed hay into the needles it so desperately needs to justify its existence.

What makes this even more frightening is that the agency then hands this unfiltered, untargeted, massive collection of data off to other agencies, not only in the US but in other countries, subjecting innocent Americans’ data to new algorithms, keywords and mentalities, increasing the possibility of false positives.

But what we’re mainly concerned about is the fact that an agency that claims its doing this to combat terrorism can’t seem to come up with much evidence that its programs are working. The NSA has deprived us of civil liberties while delivering next to nothing in terms of security. Americans have been sold out to a data-hungry beast, and even if it’s not officially “surveillance,” it’s still completely unacceptable.

October 25, 2013 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance | , , , , , , , | Leave a comment

US vs. Lavabit

By William Boardman | Reader Supported News | October 14, 2013

[Note: Since the lifting of the federal court gag order on October 2, Ladar Levison and his company, Lavabit, have been getting some media attention (including a somewhat snide and incomplete story on page one of the New York Times). What follows in an effort to reconstruct at least the outline of a personal nightmare inflicted by our government on a small business owner who had done no wrong, even in the government’s eyes ­– at least until he started taking his constitutional rights seriously.]

The Fourth Amendment of the U. S. Constitution is anti-police-state

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” [emphasis added]

The founding document of the United States is inherently suspicious of a government’s willingness to abuse its powers, a suspicion rooted in centuries of tyranny around the world. Even the U.S. government, as well as state and local governments, have abused their powers from time to time since the country’s beginning. The drift toward an American police state intensified under the guise of anti-Communism, but that was mostly a convenient cover for state intrusion into people’s lives. The Soviet Union collapsed, but the nascent American police state kept growing. The Patriot Act of 2001, a massive assault on personal and political liberty, was largely written before 9/11 and passed, largely unexamined, in the hysterical atmosphere and raw panic of that over-hyped “new Pearl Harbor.”

Now we have a police state apparatus of almost unimagined dimension, most of which is kept secret and remains unknown, despite the efforts of a few reporters and whistle blowers, who tell the truth at their personal peril.

The “American police state” is likely an abstraction in the minds of many people, and as long as they remain unknowing and passive, it’s likely to leave them alone. But even law-abiding innocence is not a sure protection of a person’s right to be secure. And when the police state comes after you in one of its hydra-headed forms, the assault can be devastating.

For starters, the state won’t always tell you when it begins

The intrusion of the police state into your life can shatter your world even before you realize it’s begun. Fight it, or surrender to it, the cost is huge. Recovery may be possible, eventually, if it’s ever allowed, but it will be hard, and it will take time.

In May 2013, Ladar Levison was 32 when the police state first came after him. The dreaded “knock on the door” was actually only an FBI business card on his door at home. And Levison’s initial interactions with the FBI were reportedly mild and civil, at first by email and later in person. The FBI was interested in Levision because he owned and operated a secure email service called Lavabit. From the FBI point of view, Lavabit was too secure, because the NSA and the rest of the security state couldn’t get into it.

Right out of college, Levison had started Lavabit as a sole proprietorship in April 2004 (the same month Google launched Gmail at a much greater scale). Having grown up in San Francisco, Levison studied computer science at Southern Methodist University in Dallas, where he still lives. While working on his start-up, he supported himself mostly with internet security projects for financial services. He also worked as a consultant on website development for clients such as Dr Pepper, Nokia, and Adidas.

What Lavabit was selling was secure email, much more secure than anything Google, Microsoft, or most other email providers were offering. The demand was not that great at first. It took six years for Lavabit to gather enough paying subscribers to allow Levison to devote himself to the business full time in 2010. Even when the FBI became interested in Lavabit in May 2013, it was still a small company, with two employees and about 400,000 subscribers. But one of those subscribers was another American about Levison’s age, 30-year old Edward Snowden, the whistleblower whose leaked documents have added so much to our understanding of the dimensions and activities of the American police state. Snowden opened his moc.tibaval@nedwonsde email account in 2010.

Political repression may not be the government’s overt intent, but it works

At this point, there’s no indication that Levison and Lavabit ever had anything but a commercial relationship with Snowden. It’s even possible that Snowden had nothing to do with the FBI’s initial interest in Lavabit. It may be that Lavabit’s effective security was sufficient offense to the surveillance forces to make it an object of attack for its own sake. In May 2013, Levison says he had the impression the FBI agents who talked to him didn’t even know who or what was the subject of their investigation. The FBI hasn’t said.

Levison is not an obviously political person, he hasn’t been revealed to be involved in party politics or political causes. “Until last summer, Mr. Levison, a Republican of libertarian leanings, had not been active in politics,” according to the New York Times October 9. He seems to be the person he seems to be: a thoughtful, hardworking, physically fit, computer business guy who has had a dog named Princess since January 2010 and who spends a lot of his spare time keeping in shape playing beach volleyball.

Princess has her own album on his Facebook page, where the dominant theme by far is Levison’s competition in beach volleyball (with albums for Sunday Night, as well as Monday, Tuesday, Wednesday, and Thursday Nights) and there is one picture of Levison with Rep. Ron Paul. Levison’s page shows membership in just one Facebook group, “OCCUPY (Support) EDWARD SNOWDEN and All Other Whistleblowers,” to which someone else added him about two months ago. Among his 43 “Likes,” Levison lists two Interests (programming and computers), lots of volleyball Activities, and six books, including William Gibson’s Neuromancer, George Orwell’s 1984, and Dostoevski’s Crime and Punishment.

From another perspective, Levison is as political as the Fourth Amendment, which is as profoundly political as it gets. It was the Patriot Act’s assault on the Fourth Amendment, Levison says, that contributed to his decision to start Lavabit in 2004, when the act was up for renewal and much in the news. Among the many objections to the act was that it gave to federal agents excessive authority to, in effect, write their own search warrants on no other authority but their own. In the Orwellian language of the act, these personal searched warrants are known as “national security letters.” Levison designed the security architecture of the Lavabit email and storage services to be beyond the reach of unwarranted searches, even in national security letters. As Levison recalled on Democracy Now! in August:

“And as I was designing and developing the custom platform, it was right around when the PATRIOT Act came out. And that’s really what colored my opinion and my philosophy, and why I chose to take the extra effort and build in the secure storage features and sort of focus on the privacy niche and the security focus niche…. [for] people who want email but don’t necessarily want it lumped in and profiled along with their searches or their browsing history or any of their other Internet activities.”

You can’t reveal what you don’t know – and that provides more security

During May 2013, Levison met for “a couple hours” with FBI agents at his office, where he explained how his security system and his business operated. As Levison told Democracy NOW! the service included his personal pledge of security:

“I’ve always liked to say my service was by geeks, for geeks. It’s grown up over the last 10 years, it’s sort of settled itself into serving those that are very privacy-conscious and security-focused. We offered secure access via high-grade encryption. And at least for our paid users, not for our free accounts—I think that’s an important distinction—we offered secure storage, where incoming emails were stored in such a way that they could only be accessed with the user’s password, so that, you know, even myself couldn’t retrieve those emails.

“And that’s what we meant by encrypted email. That’s a term that’s sort of been thrown around because there are so many different standards for encryption, but in our case it was encrypted in secure storage, because, as a third party, you know, I didn’t want to be put in a situation where I had to turn over private information. I just didn’t have it. I didn’t have access to it.”

Over the years, Lavabit has received and complied with “at least two dozen subpoenas” from the local sheriff’s office to the federal courts, Levison says, “I’ve always complied with the law.” Each of those subpoenas targeted a specific individual and appeared to Levison to be consistent with the Fourth Amendment. As recently as June 2013, he complied with an unrelated subpoena seeking information on one of his subscribers accused of violating child pornography law.

A secret subpoena from the American police state is different

On June 6, 2013, the Guardian began publishing surveillance state revelations based on documents from Edward Snowden, the Lavabit.com email subscriber. On June 9, Snowden revealed that he was the whistlblower who leaked documents to the Guardian and others. The first secret court order against Lavabit came the next day.

On or about June 10, the Justice Dept., on behalf of the FBI, went to federal court to compel Lavabit to provide information “relevant and material to an ongoing criminal investigation” involving someone with a single Lavabit email account. The FBI has not identified the subject of this investigation, but it is widely believed to be Snowden.

The United States District Court for the Eastern District of Virginia (the Fourth Circuit) granted the FBI’s request and issued the disclosure order against Lavabit that same day. A one-page, single-spaced attachment to the order listed the categories of information to be disclosed, including names, addresses, phone records, other subscriber identities, billing records, activity records, and “information about each communication” – in other words, everything about the email account “not including the contents of communications.” The order did not mention encryption keys, SSL keys, or the like. These are closely guarded secrets in a security business like Lavabit.

The U.S. Magistrate Judge who signed the initial order gave Lavabit 10 days to comply. He also sealed the court records from public view and further ordered that Lavabit “shall not disclose the existence of the application of the United States, or the existence of this order” to anyone except “an attorney for Lavabit.” In other words, Levison was subject to a gag order before he ever found out the FBI was definitely coming after him.

In the meantime, on June 14, the Justice Dept. filed a sealed criminal complaint against Snowden, who was then in Hong Kong. The government accused him of three offenses – theft of government property and two forms of “unauthorized communication” the Espionage Act of 1917. The criminal complaint, which was made public a week later, gave the government 60 days to file a formal indictment.

Getting unsatisfying compliance, the FBI decided to raise the stakes

According to a later Justice Dept. filing: “Mr. Levison received that order on June 11, 2013. Mr. Levison responded by mail, which was not received by the government until June 27, 2013. Mr. Levison provided very little of the information sought….” [emphasis added]

On June 28, the day after getting Levison’s belated response to the June 10 order, the Justice Dept. went back to the Fourth Circuit Court in Alexandria seeking an order “authorizing the installation and use of a pen register/trap device on an electronic mail account” – an FBI wiretap on email. Levison had no notice of the government motion and no opportunity to contest it. A new judge on the case, Magistrate Judge Theresa Buchanan, promptly ordered the wiretap installed on the basis that the government “has certified that the information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation….” Like the first order, this order did not mention encryption keys, SSL keys, or the like.

FBI special agents met with Levison in Dallas the same day to discuss the new order, which Levison had not yet received, as well as a prior summons to appear before a grand jury. The agents presumably explained to Levison that the court had issued a secret order based on a secret motion, itself based on secret evidence (or none at all) and that Levison was not only compelled to comply but was also still under court order to keep the whole secret process a secret, this time with no exception even for his attorney.

According to a later government filing, “Mr. Levison told the agents that he would not comply with the pen register order and wanted to speak to an attorney. It was unclear whether Mr. Levison would not comply with the order because it was technically not feasible or difficult or was not consistent with his business practice of providing secure, encrypted email service for his customers.”

As Levison months later explained to reporters about Lavabit: “We’re wholly focused on secure email. Without it, we have no business.” In Levison’s view, breaking Lavabit’s security without the right to tell his customers would have been to commit commercial fraud.

Judge Buchanan keeps the pressure on Levison and Lavabit

Following this meeting, the Justice Dept. immediately went before Judge Buchanan seeking an order to compel Lavabit to comply with the other Magistrate’s earlier order and install the FBI wiretap and to “furnish agents from the Federal Bureau of Investigation, forthwith, all information, facilities, and technical assistance necessary to accomplish the installation and use of the pen/trap device…” as ordered pursuant to federal law [U.S. Code, Title 18, sec. 3123].

Judge Buchanan immediately granted the “Order Compelling Compliance Forthwith,” based in part on her findings that “Lavabit informed the Federral Bureau of Investigation that the user of the account had enabled Lavabit’s encryption services and thus the pen/trap device would not collect the relevant information” and that “Lavabit informed the FBI that it had the technological capability to obtain the information but did not want to ‘defeat [its] own system’…”

Judge Buchanan ordered Lavabit to provide “unencrypted data pursuant to the Order.” Noting that failure to comply “forthwith” would subject Lavabit to “any penalty within the power of the court,” Judge Buchanan added in her own handwriting, “including the possibility of criminal contempt of court.” This order was issued under seal.

Previously, Levison faced the possibility of being fined for civil contempt if he failed to comply. Now he also faced going to jail. And the court’s most recent orders, in their plain language, prevented Levison from discussing his situation with anyone, not even an attorney.

According to the FBI, agents “made numerous attempts, without success, to speak and meet directly with Mr. Levison” during the next ten days. On July 9, the Justice Dept. returned to the Fourth Circuit court seeking an order for Lavabit to show cause why it “has failed to comply with the orders entered June 29” by Magistrate Buchanan, and why Lavabit should not be held in contempt of court for its failure to comply.

Judge Hilton decides a hearing with the parties present might help

Judge Claude Hilton issued the show cause order the same day, including a summons for Lavabit to appear at a hearing a week later. Judge Hilton is a secrecy case veteran, having served on the secretive FISA (Foreign Intelligence Surveillance Act) court from 2000 to 2007. The Judge continued to keep the Lavabit case under seal, but reinstated Lavabit’s exception to the gag rule when consulting with an attorney.

The next day, Levison went to the FBI field office in Dallas for a meeting/conference call that included prosecutors and FBI agents in Washington and his attorney in San Francisco, convened “to discuss Mr. Levison’s questions and concerns… [that] focused primarily on how the pen register device would be installed on the Lavabit LLC system, what data would be captured by the device, what data would be viewed and preserved by the government… [and] whether Mr. Levison would be able to provide ‘keys’ for encrypted information.”

The parties did not reach an agreement at the meeting and the next day, July 11, Levison’s attorney informed the FBI that she no longer represented Levison or Lavabit. The same day, Levison “indicated that he would not come to court [for the July 16 show cause hearing] unless the government paid for his travel,” according to a government filing.

Rather than engage in a dispute over travel expenses, the FBI served Levison with a subpoena to appear before a Fourth Circuit grand jury, also on July 16. The government is responsible for the travel arrangements of grand jury witnesses, and the FBI so advised Levison by email. The grand jury subpoena left little wriggle room in its effort to force Lavabit to surrender the encryption keys that were essential to its business:

“In addition to your personal appearance, you are directed to bring to the grand jury the public and private encryption keys used by lavabit.com in any SSL (Secure Socket Layer) or TLS (Transport Security Layer) sessions, including HTTPS sessions with clients using lavabit.com website and encrypted SMTP communications (or Internet communications using other protocols) with mail servers;

“Any other information necessary to accomplish the installation and use of the pen/trap device ordered by Judge Buchanan on June 28….”

“I don’t trust you, but you should trust me” and vice-versa

Levison responded on July 13 with an email to the U.S. Attorney’s office, offering an alternative to the FBI-operated wiretap. Levison proposed that he would collect the court-designated data himself. While he didn’t state it in the email, this would address one of Levison’s primary concerns, that there was no effective oversight to prevent the FBI from gathering more data than the court had allowed. Levison proposed to design and implement the solution, gather the data manually, and provide it to the FBI at the end of the 60-day court order – for a price of $2,000. For another $1,500, he offered to provide data “more frequently,” which would require implementing an automated system.

The U.S. Attorney chose not to explore the offer. In a brusque and internally contradictory reply email the same day, an assistant U.S. Attorney explained “that the proposal was inadequate because, among other things, it did not provide for real-time transmission of results, and it was not clear that Mr. Levison’s request for money constituted the ‘reasonable expenses’ authorized by the statute.” The government later admitted to the court that it was “unclear” as to precise details of the proposal. The clear implication of Levison’s proposal is a willingness to provide real-time transmission for reasonable compensation. But that would leave Levison in control. The government didn’t consider that a useful compromise.

On July 15, Levison flew to Washington for his show cause hearing at 10 the next morning, although he thought it was set for 10:30 and arrived late. He was appearing pro se, representing himself without an attorney.

Even a federal court hearing can be a comedy of errors

The government goal for the July 16 hearing remained unchanged: “Lavabit LLC may comply with the pen register order by simply allowing the FBI to install the pen register devise and provide the FBI with the encryption keys.” Lacking compliance, the government asked the court to impose a civil contempt sanction of $1,000 a day until Lavabit complied.

The government also requested a search warrant for the encryption keys. Judge Hilton granted the search warrant before the hearing began.

As it turned out, the 20-minute hearing resulted in no change in the legal standing of the parties, but did produce a transcript with moments of unintentional hilarity.

Present in the courtroom were Judge Hilton and the court staff. U.S. Attorney James Trump represented the government, along with three other lawyers and an FBI agent. Levison was alone.

The U.S. Attorney wanted to know if Levison was going to comply with the wiretap order, but Judge Hilton wouldn’t ask and Levison wouldn’t say. Or rather, Levison said he had always been ready and willing to comply with installation of the wiretap, but he was reluctant to give up the encryption codes, which would give the FBI access to all 400,000 of his subscribers even though the court order named only one. “There was never an explicit demand that I turn over those keys,” Levison said.

The U.S. Attorney argued that Judge Buchanan had effectively if not specifically ordered Levison to turn over the encryption keys. Judge Hilton wasn’t touching that: “I’m not sure I ought to be enforcing Judge Buchanan’s order.” Judge Hilton said that his order was to install the wiretap and Levison had said he’d do that, so – “You’re trying to get me to deal with a contempt before there’s any contempt, and I have a problem with that.”

Levison moved to unseal all but the sensitive information in the proceedings. Judge Holton denied the motion, based on the underlying criminal investigation. Levison asked the judge to order “some sort of external audit to ensure that your oders are followed to the letter” as to FBI data collection. The judge refused. Levison moved to continue the hearing to allow him to retain counsel. Judge Hilton granted the continuance.

Levison and Lavabit get legal representation from a Virginia firm

Levison’s new attorney is Jesse Binnall of Bronley & Binnall PLLC in Fairfax, Virginia. Binnall, 34, was a communication major at George Mason University and graduated from the Law School there in 2009. Binnall and Levison would later be among the first guests on the New Ron Paul Channel in mid-August.

On July 25, Binnall filed under seal a “Motion to quash” the outstanding grand jury subpoena and the search warrant against Lavabit. The motion requested “that this Court direct that Lavabit does not have to produce its Master Key. Alternatively, Lavabit and Mr. Levinson request that they be given an opportunity to revoke the. current encryption key and reissue a new encryption key at the Government’s expense. Lastly, Lavabit and Mr. Levinson request that, if they are required to produce the Master Key, that they be reimbursed for its costs which were directly incurred in producing the Master Key….”

In support of his motion, Binnall made a number of arguments against the actions of the government, which had not faced serious legal opposition up to this point.

Binnall pointed out that giving the government access to Lavabit’s Master Key is tantamount to giving the government access to all of Lavabit’s 400,000 users. That amounts to a general warrant that is unconstitutional, Binnall wrote, and:

“It is axiomatic that the Fourth Amendment prohibits general warrants [with Supreme Court cases cited]…. The Fourth Amendment’s particularity requirement is meant to ‘prevent the seizure of one thing under a warrant describing another’ [citation omitted]. This is precisely the concern with the Lavabit Subpoena and Warrant and, in this circumstance, the particularity requirement will not protect Lavabit. By turning over the Master Key, the Government will have the ability to search each and every ‘place,’ ‘person [and] thing’ on Lavabit’s network…. Additionally, the Government has no probable cause to gain access to the other users accounts.”

The government seemed unconcerned about Levison’s business survival

Bindall also argued that the court should quash the subpoena and search warrant as creating an “undue burden” on Lavabit as defined by law [U.S. Code Title 18, sec. 2703]:

“Not only has Lavabit expended a great deal of time and money in attempting to cooperate with the Government thus far, but, Lavabit will pay the ultimate price –the loss of its customers’ trust and business – should the Court require that the Master Key be turned over. Lavabit’s business, which is founded on the preservation of electronic privacy, could be destroyed if it is required to produce its Master Key.”

Also on July 25, Binnall filed a motion to unseal court records and to lift the gag order on his client, since the “gag order infringes upon freedom of speech under the First Amendment, and should he subjected to constitutional case law. “

Unsurprisingly, the U.S. Attorney filed a motion in opposition.

At the motion hearing on August 1, Judge Hilton engaged in lengthy colloquy with attorney Binnall. Before the 25-minute hearing was half over, the judge had denied both motions and the U.S. Attorney had said little more than “Good morning.” Judge Hilton gave Levison and Lavabit until 5 p.m. Dallas time on August 2 to comply.

Levison’s compliance took an unexpected form

The next day in Dallas, at about 1:30 p.m., Levison provided information that purported to be full compliance with the court’s orders. Whether it was actual compliance remains uncertain. The government was not happy and engaged with attorney Binnall to achieve satisfactory compliance, without success. On August 5 the government filed a motion for sanctions against Levison, calling his apparent compliance “unworkable” and describing it as follows:

“Mr. Levison gave the FBI a printout of what he represented to be the encryption keys needed to operate the pen register. This printout, in what appears to be 4-point type, consists of 11 pages of largely illegible characters. See Attachment A. (The attachment was created by scanning the document provided by Mr. Levison; the original document was described by the Dal!as FBI agents as slightly clearer than the scanned copy but nevertheless illegible.) Moreover, each of the five encryption keys contains 512 individual characters — or a total of 2560 characters. To make use of these keys, the FBI would have to manually input all 2560 characters, and one incorrect keystroke in this laborious process would render the FBI collection system incapable of collecting decrypted data.”

When this compliance effort became public two months later, TechCrunch called it “an epic troll.” At the time, the government was not amused and called for the court to sanction Levison $5,000 a day, beginning at noon August 5. The court promptly granted the motion, while reminding the parties that all aspects of the matter remained under seal. Known only to the participants and some court employees, the case was still unknown to the public.

Levison makes a tantalizing public announcement

That secrecy ended on August 8, when Ladar Levison shut down Lavabit, posting a short notice on the Lavabit.com website, together with a link to the Lavabit Legal Defense Fund. As Levison explained:

“I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on – the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.

“What’s going to happen now? We’ve already started preparing the paperwork needed to continue to fight for the Constitution in the Fourth Circuit Court of Appeals. A favorable decision would allow me resurrect Lavabit as an American company.

“This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States.”

Also on August 8, Levison fully complied with the Fourth Circuit courts orders, turning over the encryption keys to a now defunct service. He had incurred 2 days of sanctions – owing the government $10,000 – which remains pending.

The next day, Silent Circle, a global encrypted communications service, stayed in business but preemptively wiped out its email service (about 5 per cent of its customers) in anticipation of a government request that the company wouldn’t want to have to obey. “Meanwhile, Silent Circle is working on replacing its defunct e-mail service with a system that doesn’t rely on traditional e-mail protocols and keeps no messages or metadata within the company’s grasp. It is based on a protocol often used for instant messages and other applications. [CEO Mike] Janke says the goal is for this to not be e-mail, but ‘for all intents and purposes it looks, feels, and acts like e-mail,’” according to MIT Technology Review.

Lavabit’s closing drew some news coverage over the next week, but any story was hampered by the gag order that severely limited what Levison and Binnall could safely say. As Levison told Forbes the day after shutting down Lavabit:

“This is about protecting all of our users, not just one in particular. It’s not my place to decide whether an investigation is just, but the government has the legal authority to force you to do things you’re uncomfortable with….The fact that I can’t talk about this is as big a problem as what they asked me to do…. The methods being used to conduct those investigations should not be secret.”

The FBI and the Justice Dept. Have not commented publicly about the Lavabit case beyond their court filings.

Being secret, federal court appeal gets no news coverage

On August 15, Lavabit attorney Binnall filed notice – under seal – that he was appealing the federal district court’s rulings of August 1 and August 5 to the United States Court of Appeals for the Fourth Circuit. In other words, the government can not only keep the public ignorant of what it’s doing, it can also prevent the public from knowing that anyone objects to the government’s actions as unconstitutional.

In the Lavabit case, at least, this changed abruptly on October 2, when Judge Claude Hilton ordered a censored version of 23 documents (162 pages) made public. The redactions in these documents appear, from context, to be intended mostly to conceal details of the criminal investigation into Snowden or some other lavabit.com user. Since the unsealing of the court documents, news coverage had expansed, and Levison and Binnall have appeared in public across the country to argue their cause. As Levison put it on his Facebook page October 2:

“If the Obama administration feels compelled to continue violating the privacy rights of the masses just so they can conduct surveillance on the few then he should at least ask Congress for laws providing that authority instead of using the courts to force businesses into secretly becoming complicit in crimes against the American people.”

In 2005, a U.S. Senator addressed a similar concern, when Congress was about to pass a law creating the “national security letter,” a secret government process much more intense and unforgiving than what Levison went through last summer:

“This is legislation that puts our own Justice Department above the law. When national security letters are issued, they allow federal agents to conduct any search on any American, no matter how extensive, how wide-ranging, without ever going before a judge to prove that the search is necessary. All that is needed is a sign-off from a local FBI agent. That’s it.

“Once a business or a person receives notification that they will be searched, they are prohibited from telling anyone about it, and they’re even prohibited from challenging this automatic gag order in court. Even though judges have already found that similar restrictions violate the First Amendment, this conference report disregards the case law and the right to challenge the gag order.

“If you do decide to consult an attorney for legal advice, hold on. You will have to tell the FBI that you’ve done so. Think about that. You want to talk to a lawyer about whether or not your actions are going to be causing you to get into trouble. You’ve got to tell the FBI that you’re consulting a lawyer. This is unheard of. There is no such requirement in any other area of the law. I see no reason why it’s justified here.

“And if someone wants to know why their own government has decided to go on a fishing expedition through every personal record or private document, through the library books that you read, the phone calls that you’ve made, the emails that you’ve sent, this legislation gives people no rights to appeal the need for such a search in a court of law. No judge will hear your plea; no jury will hear your case. This is just plain wrong.”

The question is: how much of a police state do we have already?

That Senator was concerned eight years ago, and that Senator was Barack Obama. Today, national security letters are part of the law of the land, the Obama administration uses them, and if you get one, talking about it is against the law. In that context, since Ladar Levison apparently did not get a national security letter, he was lucky. The country, not so much.

On October 10, in the United States Court of Appeals for the Fourth Circuit, Lavabit filed the opening brief of its appeal of the lower court’s orders. The United States has until November 4 to file its answer. This will take awhile, it will take effort to follow, but it matters.

October 19, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Progressive Hypocrite, Timeless or most popular | , , | Leave a comment

Court Reveals ‘Secret Interpretation’ Of The Patriot Act, Allowing NSA To Collect All Phone Call Data

By Mike Masnick | Techdirt | September 17, 2013

The FISA Court (FISC) today released a heavily redacted version of its July ruling approving the renewal of the bulk metadata collection on all phone calls from US phone providers under Section 215 of the Patriot Act. This is part of the “secret interpretation” as to how the FISC interprets the Patriot Act’s “business records” or “tangible things” section to mean that the government can order a telco to turn over pretty much all records — even as the very author of the law says it was written specifically to not allow this interpretation.

Much of the ruling is pretty much what you’d expect, given the way defenders of this program have been insisting that this is all very legal. It argues that Smith v. Maryland show that there are no privacy protections in data given to your telco. It goes on at length defending the third party doctrine, arguing that because some third party holds your data, you have no expectation of privacy. As many have argued, this is a ridiculous and antiquated view of the third party doctrine, not at all consistent with modern technology, but the FISC repeats it without question. While some have pointed out that even if single points of metadata might not be privacy violating, collecting all of them creates a new problem, the court rejects that entirely.

From there, there’s a big discussion of whether or not “there are reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation.” This is a big part of where the concern lies. How can the government defend the claim that all records are “relevant to an authorized investigation.” Here, the court compares the order to the Stored Communications Act (SCA), which lets the government get access to records as well. And then the word games begin. Basically, it argues that because one law requires “specific and articulable facts” and that the information must be “material,” while the other (the PATRIOT Act) does not, then the government doesn’t need specific and articulable facts. Rather it just needs “a statement of facts showing there are reasonable grounds to believe that the records are relevant to the investigation.”

For non-content records production requests, such as the type sought here, Section 2703(c) provides a variety of mechanisms, including acquisition through a court order under Section 2703(d). Under this section, which is comparable to Section 215, the government must offer to the court “specific and articulable facts showing that there are reasonable grounds to believe that the records or other information sought, are relevant and material to an ongoing criminal investigation.” 2703(d) (emphasis added). Section 215, the comparable provision for foreign intelligence purposes, requires neither “specific and articulable facts” nor does it require that the information be “material.” Rather, it merely requires a statement of facts showing that there are reasonable grounds to believe that the records sought are relevant to the investigation. 50 U.S.C. That these two provisions apply to the production of the same type of records from the same type of providers is an indication that Congress intended this Court to apply a different, and in specific respects lower, standard to the government’s Application under Section 215 than a court reviewing a request under Section 2703(d). Indeed, the Act version of FISA’s business records provision required “specific and articulable facts giving reason to believe that the person to whom the records pertain is a foreign power or an agent of a foreign power.” 50 U.S.C. §1862(b)(2)(B) as it read on October 25, 2001. In enacting Section 215, Congress removed the requirements for “specific and articulable facts” and that the records pertain to “a foreign power or an agent of a foreign power.” Accordingly, now the government need not provide specific and articulable facts, demonstrate any connection to a particular suspect, nor show materiality when requesting business records under Section 215. To find otherwise would be to impose a higher burden — one that Congress knew how to include in Section 215, but chose to dispense with.

Also, it argues that since Section 215 allows recipients of the order to challenge them and no telco ever has that this lends it to believe there are no problems with the law.

Second, Section 2703(d) permits the service provider to file a motion with a court to “quash or modify such order, if the information or records requested are unusually voluminous in nature or compliance with such order otherwise would cause undue burden on such provider.” Congress recognized that, even with the higher statutory standard for a production order under Section 2703(d), some requests authorized by a court would be “voluminous” and provided a means by which the provider could seek relief using a motion. Under Section 215, however, Congress provided a specific and complex statutory scheme for judicial review of an Order from this Court to ensure that providers could challenge both the legality of the required production and the nondisclosure provisions of that Order. 50 U.S.C. §1861(f). This adversarial process includes the selection of a judge from a pool of FISC judges to review the challenge to determine if it is frivolous and to rule on the merits, provides standards that the judge is to apply during such review, and provides for appeal to the Foreign Intelligence Surveillance Court of Review and, ultimately, the U.S. Supreme Court. This procedure, as opposed to the motion process available under Section 2703(d) to challenge a production as unduly voluminous or burdensome, contemplates a substantial and engaging adversarial process to test the legality of this Court’ Orders under Section 215. This enhanced process appears designed to ensure that there are additional safeguards in light of the lower threshold that the government is required to meet for production under Section 215 as opposed to Section 2703(d). To date, no holder of records who has received an Order to produce bulk telephony metadata has challenged the legality of such an Order. Indeed, no recipient of any Section 215 Order has challenged the legality of such an Order, despite the explicit statutory mechanism for doing so.

Basically, the court says “why of course there’s an adversarial process” to protect users’ privacy. It just depends on Verizon or AT&T taking up the fight on behalf of their users, and they haven’t done so, so let’s just assume everyone’s okay with this. That’s kind of crazy when you think about it. Admittedly, the public should be up in arms that Verizon and AT&T appear to have no interest in challenging these broad collections of data, but that hardly makes them constitutional.

From there we move onto the interpretation of how this massive data collection could possibly be seen as “relevant.” First, it notes (as mentioned above) that the government doesn’t need to prove that the data is actually relevant. Just that it has reasonable grounds to believe that they are relevant.

As an initial matter and as a point of clarification, the government’s burden under Section 215 is not to prove that the records sought are, in fact, relevant to an authorized investigation. The explicit terms of the statute require “a statement of facts showing that there are reasonable grounds to believe that the tangible things sought are relevant.

Then it basically says that because the NSA can sniff out terrorists within a giant database, that makes the entire database relevant. Really.

This Court has previously examined the issue of relevance for bulk collections. See; [REDACTED] While those matters involved different collections from the one at issue here, the relevance standard was similar…. (“[R]elevant to an ongoing investigation to protect against international terrorism….”). In both cases, there were facts demonstrating that information concerning known and unknown affiliates of international terrorist organizations was contained within the non-content metadata the government sought to obtain. As this Court noted in 2010, the “finding of relevance most crucially depended on the conclusion that bulk collection is necessary for NSA to employ tools that are likely to generate useful investigative leads to help identify and track terrorist operatives.” [REDACTED] Indeed, in [REDACTED] this Court noted that bulk collections such as these are “necessary to identify the much smaller number of [international terrorist] communications.’ [REDACTED] As a result, it is this showing of necessity that led the Court to find that “the entire mass of collected metadata is relevant to investigating [international terrorist groups] and affiliated persons.” [REDACTED]

It then applies those previous, redacted-named rulings, to this case, repeating the DOJ’s own filing saying “all of the metadata collected is thus relevant, because the success of this investigative tool depends on bulk collections.”

That’s ridiculous and tautological. You could argue that the “success” of a program designed to stop crimes “depends on” putting cameras inside everyone’s home, but that doesn’t make it any less a violation of privacy. It also hardly makes the collection of all such data “relevant.”

The FISC continues to tap dance on the grave of the 4th Amendment:

The government depends on this bulk collection because if production of the information were to wait until the specific identifier connected to an international terrorist group were determined, most of the historical connections (the entire purpose of this authorization) would be lost. The analysis of past connections is only possible “if the Government has collected and archived a broad set of metadata that contains within it the subset of communications that can later be identified as terrorist-related.” Because the subset of terrorist communications is ultimately contained within the whole of the metadata produced, but can only be found after the production is aggregated and then queried using identifiers determined to be associated with identified international terrorist organizations, the whole production is relevant to the ongoing investigation out of necessity.

Once again, that makes no sense. First off, just because you can put together all this aggregate data and use it to find criminals and terrorists doesn’t automatically make it legal. Once again, I’m sure that having cameras in everyone’s homes would allow similar capturing of illegal behavior. But that doesn’t make it legal. Second, the argument that without this metadata collection the information would be “lost” is clearly untrue. As was just revealed a few weeks ago, AT&T has employees embedded with the DEA who are willing, ready and able to do deep dive searches on decades worth of phone records (even beyond AT&T). The data isn’t lost. They’re available via AT&T employees who are working right alongside government employees.

Incredibly, the FISC then claims that the mere claim that terrorists use the phone system is enough to show that all phone records are relevant.

The government must demonstrate “facts showing that there are reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation.” The fact that international terrorist operatives are using telephone communications, and that it is necessary to obtain the bulk collection of a telephone company’s metadata to determine those connections between known and unknown international terrorist operatives as part of authorized investigations, is sufficient to meet the low statutory hurdle set out in Section 215 to obtain a production of records.

Except, almost nothing there makes sense. It’s not true that it is necessary to obtain bulk collection of the metadata to find those connections. And just because terrorists live in houses, we don’t say that it’s okay for law enforcement to search every house. Take this same argument and apply it to anything else and the 4th Amendment goes away entirely.

In short, this shows the serious problems with these efforts being non-adversarial. The FISC more or less buys the government’s argument at every single turn, even though there are multiple arguments for why the government’s position is either not true or, at the very least, misleading.

September 18, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , | Leave a comment

‘Unleashed and unaccountable’ – ACLU condemns FBI in new report

RT | September 17, 2013

A report published on Tuesday by the American Civil Liberties Union urges the Obama administration to reform the Federal Bureau of Investigation following years of documented instances in which the FBI has abused its authority.

In thousands of words spanning a 60-plus page report titled Unleashed and Unaccountable: The FBI’s Unchecked Abuse of Authority, the ACLU this week condemns the agency, particularly in the years following the September 11, 2001 terrorist attacks.

The ACLU argues that since the attacks of 9/11, the federal government has time and time again allowed the FBI to broaden its law enforcement powers, often without sufficient oversight. As a result, they write, the FBI has been transformed into “a domestic intelligence and law enforcement agency of unprecedented power and international reach.”

Despite reform enacted in the wake of the infamous years J. Edgar Hoover spent as FBI director, the ACLU says that the agency has “subverted internal and external oversight” in recent time, in turn allowing for gross abuse, often impacting the civil liberties of Americans as a result.

In a plea for change, the ACLU accuses the FBI of “squelching whistleblowers, imposing and enforcing unnecessary secrecy and actively misleading Congress and the American people” since 9/11, and says the agency has “regularly overstepped the law, infringing on Americans’ constitutional rights while overzealously pursuing its domestic security mission.”

Items highlighted by the ACLU in the report include the secretive surveillance powers the agency has inherited through the PATRIOT Act, its power to open investigations of Americans without proof of a crime, racial and religious profiling and the targeting of people exercising their First Amendment-protected rights, such as journalists and political activists.

Published on the anniversary of the signing of the US Constitution, the ACLU urges President Barack Obama and his administration “to conduct a comprehensive examination of the FBI’s policies and practices to identify and curtail any activities that are unnecessary, ineffective or misused,” especially before the newly appointed director of the agency, James Comey, can subvert any further the policies enacted by his predecessor, James Mueller, who ran the FBI from before 9/11 up until only this month.

Should the executive and legislative branches not consider reform, the ACLU writes, “FBI officials and certain members of Congress will undoubtedly demand that the new director stay the course, no matter how disastrous it may be for American civil liberties and privacy rights.”

“The list of abuses is long and demonstrates that Congress must do a top-to-bottom review of FBI politics and practices to identify and curtail any activities that are unconstitutional or easily misused,” Hina Shamsi, director of the ACLU’s National Security Project, said in a statement accompanying the report. “The time for wholesale reform has come.”

One figure cited in the new report portends that the FBI “will soon have the equivalent of 20 pieces of intelligence on every American.”

“An FBI budget request for fiscal year 2008 said the FBI had amassed databases containing 1.5 billion records, and two members of Congress described documents predicting the FBI would have 6 billion records by 2012, which they said would represent “20 separate ‘records’ for each man, woman and child in the United States.”

In turn, the ACLU believes that this huge volume of amassed data can be “shared widely.”

“According to a 2012 Systems of Records Notice covering all FBI data warehouses, the information in these systems can be shared broadly, even with foreign entities and private companies, and for a multitude of law enforcement and non-law enforcement purposes.”

September 18, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Timeless or most popular | , , , , , , , | Leave a comment

Ex-FBI counsel implicated in surveillance abuses nominated to crucial federal bench

RT | September 11, 2013

The former top lawyer at the FBI deeply implicated in surveillance abuses revealed before and by Edward Snowden’s leaks was confirmed as a federal judge in a top court for terrorism cases this week.

The US Senate voted 73-24 on Monday in approving Valerie Caproni, Federal Bureau of Investigation general counsel from 2003 to 2011, to the Southern District of New York, one of the country’s most important federal courts for terrorism cases.

Caproni has received bipartisan criticism for allowing and defending surveillance abuses both found to be overbroad during her tenure and those not disclosed when she was counsel but later revealed to be inappropriate or illegal. For example, the Snowden leaks showed Caproni mischaracterized the limits of the Patriot Act during her term.

A 2010 report by the Department of Justice revealed the FBI inappropriately used non-judicial subpoenas called “exigent letters” to gather phone numbers of over 5,550 Americans until 2006.

“The FBI broke the law on telephone records privacy and the general counsel’s office, headed by Valerie Caproni, sanctioned it and must face consequences,” said John Conyers in April 2010 as chairman of the House Judiciary Committee.

Conyers called for Caproni’s firing at the time over the use of the non-judicial subpoenas, according to the Guardian.

“It’s not in the Patriot Act. It never has been. And its use, perhaps coincidentally, began in the same month that Ms Valerie Caproni began her work as general counsel,” Conyers said in 2010.

Caproni told House lawmakers in 2008 if phone numbers — acquired from telephone companies by the FBI via the non-judicial subpoenas evidently sanctioned in the Patriot Act — were not related to a “currently open investigation, and there was no emergency at the time we received the records, the records are removed from our files and destroyed.”

Yet revelations found in documents supplied by Snowden outlined how the National Security Agency stores phone records on all Americans for up five years no matter if they are associated with an open investigation or not. In addition, it’s been found that the NSA has the capability to feed the FBI phone records if there is a “reasonable articulable suspicion” they are related to terrorism.

“Caproni knew that the Bush administration could use or was using the Section 215 provision in the Patriot Act to obtain Americans’ phone records on a broad scale, an issue that has recently been documented by the whistleblower material first printed in the Guardian,” Lisa Graves, a former deputy assistant attorney general who dealt with Caproni while working on national security issues for the ACLU, told the Guardian.

In 2007, DOJ’s Inspector General Glenn Fine found the FBI was serially abusing National Security Letters — a demand regarding national security independent of legal subpoenas– to obtain business records, including “unauthorized collection of telephone or internet email transactional records.” While the larger collection of phone records was still not exposed at the time, Caproni called the inappropriate collection a “colossal failure on our part.”

“Government officials that secretly approved of overbroad surveillance programs the public is only seeing now because of leaks, and whose testimony on the issue obscured rather than revealed these abuses, should be held to account for their actions in a public forum,” former FBI agent Mike German told the Guardian.

Caproni’s nomination to the federal bench had some bipartisan opposition, but not enough to block her appointment.

“She is a woman with impeccable credentials,” Sen. Kirsten Gillibrand (D-N.Y.) said on the Senate floor Monday. “This country needs more women like her.”

September 12, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , , , | 1 Comment

Jennifer Hoelzer’s Insider’s View Of The Administration’s Response To NSA Surveillance Leaks

By Jennifer Hoelzer | Techdirt | August 10, 2013

In a bit of fortuitous timing, this week we had asked former deputy chief of staff for Ron Wyden, Jennifer Hoelzer, to do our weekly “Techdirt Favorites of the Week” post, in which we have someone from the wider Techdirt community tell us what their favorite posts on the site were. As you’ll see below, Hoelzer has a unique and important perspective on this whole debate concerning NSA surveillance, and given the stories that came out late Friday, she chose to ditch her original post on favorites and rewrite the whole thing from scratch last night (and into this morning). Given that, it’s much, much more than a typical “favorites of the week” post, and thus we’ve adjusted the title appropriately. I hope you’ll read through this in its entirety for a perspective on what’s happening that not many have.

Tim Cushing made one of my favorite points of the week in his Tuesday post “Former NSA Boss Calls Snowden’s Supporters Internet Shut-ins; Equates Transparency Activists With Al-Qaeda,” when he explained that “some of the most ardent defenders of our nation’s surveillance programs” — much like proponents of overreaching cyber-legislation, like SOPA — have a habit of “belittling” their opponents as a loose confederation of basement-dwelling loners.” I think it’s worth pointing out that General Hayden’s actual rhetoric is even more inflammatory than Cushing’s. Not only did the former NSA director call us “nihilists, anarchists, activists, Lulzsec, Anonymous, twenty-somethings who haven’t talked to the opposite sex in five or six years,” he equates transparency groups like the ACLU with al Qaeda.

I appreciated this post for two reasons:

First of all, it does a great job of illustrating a point that I’ve long made when asked for advice on communicating tech issues, which is that the online community is as diverse and varied as the larger world we live in. Of course, we are more likely to come across the marginal opinions of twenty-somethings with social anxiety online because, unlike the larger world, the Internet gives those twenty-somethings just as much of an opportunity to be heard as a Harvard scholar, a dissident protesting for democracy or General Hayden himself.

Sure, it can be infuriating to read scathingly hostile comments written by troubled individuals who clearly didn’t take the time to read the post you spent countless hours carefully writing (not that that has ever happened to me) but isn’t one of the things that makes the Internet so darn special its unwavering reminder that free speech includes speech we don’t appreciate? Of course, that’s a point that tends to get lost on folks — like General Hayden — who don’t seem to understand that equating the entirety of the online world with terrorists is a lot like posting a scathing comment to a story without reading it. You can’t expect someone to treat you or your opinion with respect — online or anywhere else — when you’re being disrespectful. And I can imagine no greater disrespect for the concepts of transparency and oversight than to equate them with the threats posed by terrorist groups like al Qaeda.

But my main reason for singling out Tim’s post this week is that Hayden’s remark goes to the heart of what I continue to find most offensive about the Administration’s handling of the NSA surveillance programs, which is their repeated insinuation that anyone who raises concerns about national security programs doesn’t care about national security. As Tim explains this “attitude fosters the “us vs. them” antagonism so prevalent in these agencies dealings with the public. The NSA (along with the FBI, DEA and CIA) continually declares the law is on its side and portrays its opponents as ridiculous dreamers who believe safety doesn’t come with a price.”

To understand why I find this remark so offensive, I should probably tell you a little about myself. While the most identifying aspect of my resume is probably the six years I spent as U.S. Senator Ron Wyden’s communications director and later deputy chief of staff, I started college at the U.S. Naval Academy and spent two years interning for the National Security Council. I had a Top Secret SCI clearance when I was 21 years old and had it not been for an unusual confluence of events nearly 15 years ago — including a chance conversation with a patron of the bar I tended in college — I might be working for the NSA today. I care very deeply about national security. Moreover — and this is what the Obama Administration and other proponents of these programs fail to understand — I was angry at the Administration for its handling of these programs long before I knew what the NSA was doing. That had a lot to do with the other thing you should probably know about me: during my tenure in Wyden’s office, I probably spent in upwards of 1,000 hours trying to help my boss raise concerns about programs that he couldn’t even tell me about.

Which brings me to my next favorite Techdirt post of the week, Mike’s Friday post entitled “Don’t Insult Our Intelligence, Mr. President: This Debate Wouldn’t Be Happening Without Ed Snowden,” which is a much less profane way of summing up my feelings about the President’s “claim that he had already started this process prior to the Ed Snowden leaks and that it’s likely we would [have] ended up in the same place” without Snowden’s disclosure.

“What makes us different from other countries is not simply our ability to secure our nation,” Obama said. “It’s the way we do it, with open debate and democratic process.”

I hope you won’t mind if I take a moment to respond to that.

Really, Mr. President? Do you really expect me to believe that you give a damn about open debate and the democratic process? Because it seems to me if your Administration was really committed to those things, your Administration wouldn’t have blocked every effort to have an open debate on these issues each time the laws that your Administration claims authorize these programs came up for reauthorization, which — correct me if I am wrong — is when the democratic process recommends as the ideal time for these debates.

For example, in June 2009, six months before Congress would have to vote to reauthorize Section 215 of the Patriot Act, which the Obama Administration claims gives the NSA the authority to collect records on basically every American citizen — whether they have ever or will ever come in contact with a terrorist — Senators Wyden, Feingold and Durbin sent Attorney General Eric Holder a classified letter “requesting the declassification of information which [they] argued was critical for a productive debate on reauthorization of the USA PATRIOT Act.”

In November 2009, they sent an unclassified letter reiterating the request, stating:

“The PATRIOT Act was passed in a rush after the terrorist attacks of September 11, 2001. Sunsets were attached to the Act’s most controversial provisions, to permit better-informed, more deliberative consideration of them at a later time. Now is the time for that deliberative consideration, but informed discussion is not possible when most members of Congress – and nearly all of the American public – lack important information about the issue.”

Did President Obama jump at the opportunity to embrace the democratic process and have an open debate then? No. Congress voted the following month to reauthorize the Patriot Act without debate.

In May 2011, before the Senate was — again — scheduled to vote to reauthorize the Patriot Act, Senators Wyden and Udall — again — called for the declassification of the Administration’s secret interpretation of Section 215. This time, in a Huffington Post Op-Ed entitled “How Can Congress Debate a Secret Law?” they wrote:

Members of Congress are about to vote to extend the most controversial provisions of the USA PATRIOT Act for four more years, even though few of them understand how those provisions are being interpreted and applied.

As members of the Senate Intelligence Committee we have been provided with the executive branch’s classified interpretation of those provisions and can tell you that we believe there is a significant discrepancy between what most people — including many Members of Congress — think the Patriot Act allows the government to do and what government officials secretly believe the Patriot Act allows them to do.

Legal scholars, law professors, advocacy groups, and the Congressional Research Service have all written interpretations of the Patriot Act and Americans can read any of these interpretations and decide whether they support or agree with them. But by far the most important interpretation of what the law means is the official interpretation used by the U.S. government and this interpretation is — stunningly –classified.

What does this mean? It means that Congress and the public are prevented from having an informed, open debate on the Patriot Act because the official meaning of the law itself is secret. Most members of Congress have not even seen the secret legal interpretations that the executive branch is currently relying on and do not have any staff who are cleared to read them. Even if these members come down to the Intelligence Committee and read these interpretations themselves, they cannot openly debate them on the floor without violating classification rules.

During the debate itself, Wyden and Udall offered an amendment to declassify the Administration’s legal interpretation of its Patriot Act surveillance authorities and, in a twenty minute speech on the Senate floor, Wyden warned that the American people would one day be outraged to learn that the government was engaged in surveillance activities that many Americans would assume were illegal, just as they were every other time the national security committee has tried to hide its questionable activities from the American people.

Fun aside: As you can see in the video, to underscore the point that hiding programs from the American people rarely goes well for the Administration, I had my staff make a poster of the famous image of Oliver North testifying before Congress during the Iran-Contra hearing. I really wanted to replace North’s face with the words “insert your photo here,” but we didn’t have the time.

Did President Obama welcome an open debate at that time?

No. Congress voted to reauthorize the Patriot Act for four more years and the only point we — as critics — could raise that might be confused with debate was a hypothetical argument illustrated with a twenty-year-old picture of Oliver North. And, again, Senator Wyden couldn’t even tell me what he was so concerned about. In strategy meetings with me and his Intelligence Committee staffer, I had to repeatedly leave the room when the conversation strayed towards details they couldn’t share with me because I no longer had an active security clearance. “You know, it would be a lot easier if you could just tell me what I can’t say?” I’d vent in frustration. They agreed, but still asked me to leave the room.

And that was just the Patriot Act. Did the President — who now claims to welcome open debate of his Administration’s surveillance authorities — jump at the opportunity to have such a debate when the FISA Amendments Act came up for reauthorization?

No. Not only did the Administration repeatedly decline Senator Wyden’s request for a “ballpark figure” of the number of Americans whose information was being collected by the NSA last year, just a month after the Patriot Act reauthorization, the Senate Intelligence Committee attempted to quietly pass a four year reauthorization of the controversial surveillance law by spinning it as an effort to: “Synchronize the various sunset dates included in the Foreign Intelligence Surveillance Act of 1978 to June 1, 2015;” So, I guess if this was part of the Administration’s plan to publicly debate the NSA’s surveillance authorities, the plan was for the debate to take place in 2015?

And, as I explained in an interview with Brian Beutler earlier this summer, that is just a fraction of the ways the Obama Administration and the Intelligence Communities ignored and even thwarted our attempts to consult the public on these surveillance programs before they were reauthorized. In fact, after the Senate Intelligence Committee hearing in which Wyden attempted to close the FAA’s Section 702 loophole, which another important Techdirt post this week explains, “gives the NSA ‘authority’ to run searches on Americans without any kind of warrant,” I — as Wyden’s spokesperson — was specifically barred from explaining the Senator’s opposition to the legislation to the reporters. In fact, the exact response I was allowed to give reporters was:

“We’ve been told by Senator Feinstein’s staff that under the SSCI’s Committee Rule 9.3, members and staff are prohibited from discussing the markup or describing the contents of the bill until the official committee report is released. The fact that they’ve already put out a press release does not lift this prohibition.

That’s right, supporters of a full scale reauthorization of the FISA Amendments Act put out a press release explaining why this was a good thing, while explicitly barring the Senator who voted against the legislation from explaining his concerns.

Months later, the FISA Amendments Act, which the Administration contends authorizes its PRISM program, passed without the open debate that the President now contends he wanted all along. And, again, I’m only touching on a fraction of the efforts just Senator Wyden made to compel the administration to engage the American people in a democratic debate. I, obviously, haven’t mentioned the Director of National Intelligence’s decision to lie when Wyden “asked whether the NSA had collected ‘any type of data at all on millions of Americans.'” (Btw: Given that Wyden shared his question with the ODNI the day before the hearing, I am highly skeptical that Clapper’s decision to lie was made unilaterally.) Or the fact that the Obama Administration repeatedly fought lawsuits and FOIA requests for, again — not sources and methods — but the Section 215 legal interpretation that the Administration claims authorizes its surveillance authorities.

The below is an excerpt from a March 2012 letter that Wyden and Udall sent the Obama Administration urging them to respect the democratic process:

The Justice Department’s motion to dismiss these Freedom of Information Act lawsuits argues that it is the responsibility of the executive branch to determine the best way to protect the secrecy of intelligence sources and methods. While this is indeed a determination for the executive branch to make, we are concerned that the executive branch has developed a practice of bypassing traditional checks and balances and treating these determinations as dispositive in all cases. In other words, when intelligence officials argue that something should stay secret, policy makers often seem to defer to them without carefully considering the issue themselves. We have great respect for our nation’s intelligence officers, the vast majority of whom are hard-working and dedicated professionals. But intelligence officials are specialists — it is their job to determine how to collect as much information as possible, but it is not their job to balance the need for secrecy with the public’s right to know how the law is being interpreted. That responsibility rests with policy makers, and we believe that responsibility should not be delegated lightly.

But, as Mike’s last post on Friday explains, “President Obama flat out admitted that this was about appeasing a public that doesn’t trust the administration, not about reducing the surveillance.” Mike’s insight continues:

Even more to the point, his comments represent a fundamental misunderstanding of why the public doesn’t trust the government. That’s because he keeps insisting that the program isn’t being abused and that all of this collection is legal. But, really, that’s not what the concern is about. Even though we actually know that the NSA has a history of abuse (and other parts of the intelligence community before that), a major concern is that scooping up so much data is considered legal in the first place.

I’d go even further than that and argue that a big part of the reason the American people are having a hard time trusting their government is that the public’s trust in government is harmed every time the American people learn that their government is secretly doing something they not only assumed was illegal but that government officials specifically told them they weren’t doing. Hint: When the American people learn that you lied to them, they trust you less.

I think it’s hard for the American people to trust their President when he says he respects democratic principles, when his actions over the course of nearly five years demonstrate very little respect for democratic principles.

I think the American people would be more likely to trust the President when he says these programs include safeguards that protect their privacy, if he — or anyone else in his administration — seemed to care about privacy rights or demonstrated an understanding of how the information being collected could be abused. Seriously, how are we supposed to trust safeguards devised by people who don’t believe there is anything to safeguard against?

I think it’s understandably hard for the American people to trust the President when he says his Administration has the legal authority to conduct these surveillance programs when one of the few things that remains classified about these programs is the legal argument that the administration says gives the NSA the authority to conduct these programs. This is the document that explains why the Administration believes the word “relevant” gives them the authority to collect everything. It’s also the document I’d most like to see since it’s the document my former boss has been requesting be declassified for more than half a decade. (A reporter recently asked me why I think the Administration won’t just declassify the legal opinion given that the sources and methods it relates to have already been made public. “I think that’s pretty obvious,” I said. “I believe it will be much harder for the Administration to claim that these programs are legal, if people can see their legal argument.”)

I think it’s hard for the American people to trust the President when his administration has repeatedly gone out of its way to silence critics and — again — treat oversight as a threat on par with al Qaeda. As another great Techdirt post this week — US Releases Redacted Document Twice… With Different Redactions — illustrates, many of the Intelligence Community’s classification decisions seem to be based more on a desire to avoid criticism than clear national security interests. And as Senator Wyden said back in 2007, when then CIA Director Hayden (yes, the same guy who thinks we’re all losers who can’t get laid) attempted to undermine oversight over his agency by launching an investigation into the CIA’s inspector general, “people who know that they’re doing the right thing aren’t afraid of oversight.”

Which reminds me of the Techdirt post this week that probably haunted me the most. Ed Snowden’s Email Provider, Lavabit, Shuts Down To Fight US Gov’t Intrusion. Mike uses the post to explain that Ladar Levison, the owner and operator of Labavit — the secure email service that provided Edward Snowden’s email account — decided to shut down his email service this week.

Not much more information is given, other than announced plans to fight against the government in court. Reading between the lines, it seems rather obvious that Lavabit has been ordered to either disclose private information or grant access to its secure email accounts, and the company is taking a stand and shutting down the service while continuing the legal fight. It’s also clear that the court has a gag order on Levison, limiting what can be said.

The part that haunted me, though, was a line Levon included in his email informing customers of his decision:

“I feel you deserve to know what’s going on,” he wrote. “The first amendment is supposed to guarantee me the freedom to speak out in situations like this.”

He’s right, isn’t he? If these aren’t the moments the First Amendment was meant for, what are? Moreover, if the Administration is so convinced that its requests of Labavit are just, why are they afraid to hold them up to public scrutiny?

In his book, Secrecy: The American Experience, former Senator Daniel Patrick Moynihan included a quote from a 1960 report issued by the House Committee on Operations which I believe provides a far better response than anything I could write on my own:

Secrecy — the first refuge of incompetents — must be at a bare minimum in a democratic society for a fully informed public is the basis of self government. Those elected or appointed to positions of executive authority must recognize that government, in a democracy, cannot be wiser than its people.

Which brings me to my final point (at least for now) I think it’s awfully hard for the American people to trust the President and his administration when their best response to the concerns Americans are raising is to denigrate the Americans raising those concerns. Because, you see, I have a hard time understanding why my wanting to stand up for democratic principles makes me unpatriotic, while the ones calling themselves patriots seem to think so little of the people and the principles that comprise the country they purport to love.

August 13, 2013 Posted by | Civil Liberties, Deception, Progressive Hypocrite | , , , , , , , , | Leave a comment

Why Won’t They Tell Us the Truth About NSA Spying?

By Ron Paul | August 4, 2013

In 2001, the Patriot Act opened the door to US government monitoring of Americans without a warrant. It was unconstitutional, but most in Congress over my strong objection were so determined to do something after the attacks of 9/11 that they did not seem to give it too much thought. Civil liberties groups were concerned, and some of us in Congress warned about giving up our liberties even in the post-9/11 panic. But at the time most Americans did not seem too worried about the intrusion.

This complacency has suddenly shifted given recent revelations of the extent of government spying on Americans. Politicians and bureaucrats are faced with serious backlash from Americans outraged that their most personal communications are intercepted and stored. They had been told that only the terrorists would be monitored. In response to this anger, defenders of the program have time and again resorted to spreading lies and distortions. But these untruths are now being exposed very quickly.

In a Senate hearing this March, Director of National Intelligence James Clapper told Senator Ron Wyden that the NSA did not collect phone records of millions of Americans. This was just three months before the revelations of an NSA leaker made it clear that Clapper was not telling the truth. Pressed on his false testimony before Congress, Clapper apologized for giving an “erroneous” answer but claimed it was just because he “simply didn’t think of Section 215 of the Patriot Act.” Wow.

As the story broke in June of the extent of warrantless NSA spying against Americans, House Intelligence Committee Chairman Mike Rogers assured us that the project was strictly limited and not invasive. He described it as a “lockbox with only phone numbers, no names, no addresses in it, we’ve used it sparingly, it is absolutely overseen by the legislature, the judicial branch and the executive branch, has lots of protections built in…”

But we soon discovered that also was not true either. We learned in another Guardian newspaper article last week that the top secret “X-Keyscore” program allows even low-level analysts to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals.”

The keys to Rogers’ “lockbox” seem to have been handed out to everyone but the janitors! As Chairman of the Committee that is supposed to be most in the loop on these matters, it seems either the Intelligence Community misled him about their programs or he misled the rest of us. It sure would be nice to know which one it is.

Likewise, Rep. Rogers and many other defenders of the NSA spying program promised us that this dragnet scooping up the personal electronic communications of millions of Americans had already stopped “dozens” of terrorist plots against the United States. In June, NSA director General Keith Alexander claimed that the just-disclosed bulk collection of Americans’ phone and other electronic records had “foiled 50 terror plots.”

Opponents of the program were to be charged with being unconcerned with our security.

But none of it was true.

The Senate Judiciary Committee yesterday heard dramatic testimony from NSA deputy director John C. Inglis. According to the Guardian:

“The NSA has previously claimed that 54 terrorist plots had been disrupted ‘over the lifetime’ of the bulk phone records collection and the separate program collecting the internet habits and communications of people believed to be non-Americans. On Wednesday, Inglis said that at most one plot might have been disrupted by the bulk phone records collection alone.”

From dozens to “at most one”?

Supporters of these programs are now on the defensive, with several competing pieces of legislation in the House and Senate seeking to rein in an administration and intelligence apparatus that is clearly out of control. This is to be commended. What is even more important, though, is for more and more and more Americans to educate themselves about our precious liberties and to demand that their government abide by the Constitution. We do not have to accept being lied to – or spied on — by our government.

August 4, 2013 Posted by | Civil Liberties, Deception, Progressive Hypocrite, Timeless or most popular | , , , , , , | Leave a comment

Five unanswered questions about the NSA’s surveillance programs

By Brendan Sasso | The Hill | 07/07/13

Leaks by former National Security Agency contractor Edward Snowden have provided new insight into how the government monitors domestic and foreign communications for threats to national security.

Although the government has disclosed some additional details about the programs in response to the leaks, important questions remain about the nature and scope of the surveillance programs.

Without that additional information, it is impossible to know the extent to which the government is peering into the lives of Americans in the name of national security, according to privacy advocates.

1. What other data is being collected under the Patriot Act?

The first leak from Snowden was a secret court order demanding that Verizon turn over vast batches of “metadata” on its U.S. customers. The data included the time and duration of calls, as well as the phone numbers involved, but not the contents of the conversations. The data collection was authorized under Section 215 of the Patriot Act.

The Director of National Intelligence (DNI) clarified that while the government does obtain data on millions of U.S. phone calls (and from more companies than just Verizon), it only “queries” the database a limited number of times for specific national security reasons.

Michelle Richardson, a legislative counsel for the American Civil Liberties Union (ACLU), questioned whether the NSA is using Section 215 to collect more than just phone records.

“Is it also financial data or Internet records or other things?” she asked. “Knowing now that the court has been so broad in its interpretation, it’s even more important to figure out what else they’re getting.”

Greg Nojeim, a senior counsel for the Center for Democracy and Technology, said the NSA is likely using the Patriot Act to collect the credit card records and IP addresses of millions of people within and outside of the United States.

2. How broad are the programs?

How many people have been spied on through the NSA programs remains unclear. According to the NSA, it queried its massive database of phone records fewer than 300 times in 2012. But the agency did not disclose figures on other years or how many phone numbers were accessed in those queries.

Richardson explained that a single query could be an algorithm that scans the database and returns information on many people.

The other major program revealed by Snowden is the NSA’s Internet surveillance program, called PRISM. Unlike the phone record collection program under the Patriot Act, the NSA uses PRISM to access the contents of communications, such as emails, video chats, photographs and other information.

According to the DNI, the NSA only accesses those online records if there is a “foreign intelligence purpose” and the target is “reasonably believed” to be outside of the U.S. The program is authorized by Section 702 of the Foreign Intelligence Surveillance Act, and the searches require approval by a secret FISA court.

The NSA has not disclosed how many people it has targeted under Section 702 or how many people were spied on incidentally as part of the program.

“We have no idea how many U.S. persons have had their communications swept up,” said Sharon Bradford Franklin, senior counsel for the Constitution Project.

3. What’s the legal rationale?

The NSA has insisted the surveillance programs comply with the law and are overseen by independent FISA courts. But the opinions of those courts are secret, so little is known about how the courts are enforcing privacy protections or why they signed off on certain surveillance methods.

Section 215 of the Patriot Act allows the government to collect business records if they are “relevant” to a terrorism investigation. The FISA courts have determined that that provision allows the NSA to collect records on virtually all phone calls within and outside of the U.S. Why the court determined that so much data is “relevant” to a terrorism investigation remains unclear.

“Generally we don’t know the legal rationale being offered by the administration and being accepted by the FISA court to justify these particular types of surveillance programs,” Bradford Franklin said. “We should not have secret law in a democracy.”

4. Is the NSA still collecting email records?

One of the latest leaks revealed that beginning in 2001, the NSA collected vast amounts of email records. The NSA was able to identify the email accounts that sent and received messages, as well as IP addresses. The data collection did not include the contents of the emails.

The Obama administration confirmed the existence of the program, but said it ended in 2011 for “operational and resource reasons.”

One major question, according to privacy advocates, is whether the government is still able to obtain similar email records through a separate program.

5. Are there other programs that we don’t know about?

Although the NSA has provided some details about the programs leaked by Snowden, it is unclear what other programs exist and how they work together as part of a broad surveillance strategy.

“There’s this giant surveillance superstructure out there that we’re finally getting glimpses of, but there’s still a lot of questions of how does the whole thing work,” Richardson said.

July 9, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , , , | Leave a comment

The Ten Most Disturbing Things You Should Know About the FBI Since 9/11

By Matthew Harwood | ACLU | July 5, 2013

Next Tuesday, James Comey will have his first job interview for succeeding Robert Mueller as director of the FBI.

Members of the Senate Judiciary Committee will not only have the chance to determine whether Comey is qualified for the job—and we have our concerns—but an opportunity to examine what the FBI has become since 9/11 and whether it needs to change course over the next decade.

Over the past 12 years, the FBI has become a domestic intelligence agency with unprecedented power to peer into the lives of ordinary Americans and secretly amass data about people not suspected of any wrongdoing. The recent revelation about the FBI using the Patriot Act’s “business records provision” to track all U.S. telephone calls is only the latest in a long line of abuse stemming from the expanded powers granted to the bureau since September 2001.

These abuses and bad policies, however, do not get the attention they deserve, despite serious violations of people’s civil rights and liberties. Since 9/11, the ACLU has learned of persistent FBI abuses, including domestic spying, racial and religious profiling, biased counterterrorism training materials, politically motivated investigations, abusive detention and interrogation practices, and misuse of the No-Fly List to recruit informants.

We hope Congress and the new FBI director, whoever it is, will use the information provided as a starting point to conduct a thorough evaluation of the FBI’s post-9/11 authorities, policies, and practices to identify and curb any and all activities that are illegal, ineffective, or prone to misuse.

The choice between our civil liberties and our security is a false one: we can be both safe and free.

In the interest of highlighting the worst abuses that have occurred over the last 12 years, the ACLU has put together a factsheet:

The Ten Most Disturbing Things You Should Know About the FBI Since 9/11

USA Patriot Act Abuse

The recent revelation about the FBI using the Patriot Act’s “business records provision” to track all U.S. telephone calls is only the latest in a long line of abuse. Five Justice Department Inspector General audits documented widespread FBI misuse of Patriot Act authorities (1,2,3,4,5), and a federal district court recently struck down the National Security Letter (NSL) statute because of its unconstitutional gag orders. The IG also revealed the FBI’s unlawful use of “exigent letters” that claimed false emergencies to get private information without NSLs, but in 2009 the Justice Department secretly re-interpreted the law to allow the FBI to get this information without emergencies or legal process. Congress and the American public need to know the full scope of the FBI’s spying on Americans under the Patriot Act and all other surveillance authorities enacted since 9/11, like the FISA Amendments Act that underlies the PRISM program.

2008 Amendments to the Attorney General’s Guidelines

Attorney General Michael Mukasey re-wrote the FBI’s rulebook in the final months of the Bush administration, giving FBI agents unfettered authority to investigate people without any factual basis for suspecting wrongdoing. The 2008 Attorney General’s Guidelines created a new kind of intrusive investigation called an “assessment,” which required no “factual predicate” before FBI agents could search through government or commercial databases, conduct overt or covert FBI interviews, and task informants to gather information about people or infiltrate lawful organizations. In a two-year period from 2009 to 2011, the FBI opened over 82,000 “assessments” of individuals or organizations, less than 3,500 of which discovered information justifying further investigation.

Racial and Ethnic Mapping

The 2008 Attorney General’s Guidelines also authorized “domain management assessments” which allow the FBI to map American communities by race and ethnicity based on crass stereotypes about the crimes they are likely to commit. FBI documents obtained by the ACLU show the FBI mapped entire Chinese and Russian communities in San Francisco on the theory that they might commit organized crime, all Latino communities in New Jersey and Alabama because a street gang has Latino members, African Americans in Georgia to find “Black separatists,” and Middle-Eastern communities in Detroit for terrorism investigations. The FBI’s racial and ethnic mapping program is simply racial and religious profiling of entire communities.

Unrestrained Data Collection and Data Mining

The FBI has claimed the authority to secretly sweep up voluminous amounts of private information from data aggregators for data mining purposes. In 2007 the FBI said it amassed databases containing 1.5 billion records, which were predicted to grow to 6 billion records by 2012, or equal to “20 separate ‘records’ for each man, woman and child in the United States.” When Congress sought information about one of these programs, the FBI refused to give the Government Accountability Office access. That program was temporarily defunded, but its successor, the FBI Foreign Terrorist Tracking Task Force, currently has 360 staff members running 40 separate projects. Records show analysts are allowed to use data mining tools to establish “risk scores” for U.S. persons. A 2013 IG audit questioned the task force’s effectiveness, concluding it “did not always provide FBI field offices with timely and relevant information.”

Suppressing Internal Dissent: The FBI War on Whistleblowers

The FBI is exempt from the Whistleblower Protection Act. Though the law required it to establish internal mechanisms to protect whistleblowers, it has a long history of retaliating against them. As a result, a 2009 IG report found that 28 percent of non-supervisory FBI employees and 22 percent of FBI supervisors at the GS-14 and GS-15 levels “never” reported misconduct they have seen or heard about on the job. The FBI has also aggressively investigated whistleblowers from other agencies, leading to an unprecedented increase in Espionage Act prosecutions under the Obama administration, almost invariably targeting critics of government policies.

Targeting Journalists

The FBI’s overzealous pursuit of government whistleblowers has resulted in the inappropriate targeting of journalists for investigation, potentially chilling press freedoms. Recently, the FBI obtained records from 21 telephone lines used by over 100 Associated Press journalists, including the AP’s main number in the U.S. House of Representatives’ press gallery. And an FBI search warrant affidavit claimed Fox News reporter James Rosen aided, abetted, or co-conspired in criminal activity because of his news gathering activities, in an apparent attempt to circumvent legal restrictions designed to protect journalists. In 2010, the IG reported that the FBI unlawfully used an “exigent letter” to obtain the telephone records of seven New York Times and Washington Post reporters and researchers during a media leak investigation.

Thwarting Congressional Oversight

The FBI has thwarted congressional oversight by withholding information, limiting or delaying responses to members’ inquiries, or worse, by providing false or misleading information to Congress and the American public. Examples include false information regarding FBI investigations of domestic advocacy groups, misleading information about the FBI’s awareness of detainee abuse, and deceptive responses to questions about government surveillance authorities.

Targeting First Amendment Activity

Several ACLU Freedom of Information Act requests have uncovered significant evidence that the FBI has used its expanded authorities to target individuals and organizations because of their participation in First Amendment-protected activities. A 2010 IG report confirmed the FBI conducted inappropriate investigations of domestic advocacy groups engaged in environmental and anti-war activism, and falsified public responses to hide this fact. Other FBI documents showed FBI exploitation of community outreach programs to secretly collect information about law-abiding citizens, including a mosque outreach program specifically targeting American Muslims. Many of these abuses are likely a result of flawed FBI training materials and intelligence products that expressed anti-Muslim sentiments and falsely identified religious practices or other First Amendment activities as indicators of terrorism.

Proxy Detentions

The FBI increasingly operates outside the U.S., where its authorities are less clear and its activities much more difficult to monitor. Several troubling cases indicate that during the Bush administration the FBI requested, facilitated, and/or exploited the arrests and detention of U.S. citizens by foreign governments, often without charges, so they could be interrogated, sometimes tortured, then interviewed by FBI agents. The ACLU represents two victims of such activities. Amir Meshal was arrested at the Kenya border by a joint U.S., Kenyan, and Ethiopian task force in 2007, subjected to more than four months of detention, and transferred between three different East African countries without charge, access to counsel, or presentment before a judicial officer, all at the behest of the U.S. government. FBI agents interrogated Meshal more than thirty times during his detention. Similarly, Naji Hamdan, a Lebanese-American businessman, sat for interviews with the FBI several times before moving from Los Angeles to the United Arab Emirates in 2006. In 2008, he was arrested by U.A.E. security forces and held incommunicado for nearly three months, beaten, and tortured. At one point an American participated in his interrogation; Hamdan believed this person to be an FBI agent based on the interrogator’s knowledge of previous FBI interviews. Another case in 2010, involving an American teenager jailed in Kuwait, may indicate this activity has continued into the Obama administration.

Use of No Fly List to Pressure Americans Abroad to Become Informants

The number of U.S. persons on the No Fly List has more than doubled since 2009, and people mistakenly on the list are denied their due process rights to meaningfully challenge their inclusion. In many cases Americans only find out they are on the list while they are traveling abroad, which all but forces them to interact with the U.S. government from a position of extreme vulnerability, and often without easy access to counsel. Many of those prevented from flying home have been subjected to FBI interviews while they sought assistance from U.S. Embassies to return. In those interviews, FBI agents sometimes offer to take people off the No Fly List if they agree to become an FBI informant. In 2010 the ACLU and its affiliates filed a lawsuit on behalf of 10 American citizens and permanent residents, including several U.S. military veterans, seven of whom were prevented from returning home until the suit was filed. We argue that barring them from flying without due process was unconstitutional. There are now 13 plaintiffs; none have been charged with a crime, told why they are barred from flying, or given an opportunity to challenge their inclusion on the No Fly List.

(Find a printable PDF version here.)

July 5, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular | , , , , , , , | 1 Comment

Spying by the Numbers

By BILL QUIGLEY | CounterPunch | June 20, 2013

Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying.  There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.

Hundreds of Thousands Subject to Government Surveillance

The first reality is that hundreds of thousands of people in the US have been subject to government surveillance in each of the last few years. Government surveillance of people in the US is much more widespread than those in power want to admit.   In the last three years alone about 5000 requests have been granted for complete electronic surveillance authorized by the secret FISA court.  The FBI has authorized another 50,000 surveillance operations with National Security Letters in the last three years.  The government admits that well over 300,000 people have had their phone calls intercepted by state and federal wiretaps in the last year alone.  More than 50,000 government requests for internet information are received each year as reported by internet providers. And, remember, these are the publicly reported numbers so you can be confident there is a whole lot more going on which has not been publicly reported.

Courts Almost Never Deny Government Requests for Surveillance

The second reality is that there is little to no serious oversight or accountability by the courts of this surveillance.  Government spy defenders keep suggesting the courts are looking carefully and rigorously at all this and only letting a tiny number of really bad people be spied on.  Not true.  Despite thousands of requests by the federal government to look deeply into people’s lives, the secret federal FISA court turned down no requests at all in the last three years.  The state and federal courts report on wiretap applications document over 2000 applications annually for surveillance which authorize the interception of hundreds of thousands of calls and emails.  The courts have turned down the government two times in the most recent report.  FBI national security letters do not even have to be authorized by a court at all.  The lack of Congressional oversight is plain to see but the lack of any judicial review of many of these surveillance actions and the very weak oversight where courts do review should concern anyone who cares about government accountability.

Let’s break down the surveillance by the authority for spying.

In FISA Court Government Always Wins  

The US government has tried to say the public should not worry about government scooping up hundreds of millions of phone calls and internet activities because no real information is disclosed unless it is authorized by what is called the FISA court.  Therefore, you can trust us with this information.

The FISA Court, actually called the Foreign Intelligence Surveillance Court, is made up of ten federal judges who deliberate and decide in secret whether the government can gather and review millions of phone and internet records.  This court, though I know and respect several of its members, cannot, be considered an aggressive defender of constitutional rights and civil liberties.

Government lawyers go to these FISA judges in secret.  Government lawyers present secret evidence in secret proceedings with no defense lawyer or public or press allowed and asks for secret orders allowing the government to secretly spy on people.  Its opinions are secret.  The part the public knows is a one paragraph report which is made every year of the number of applications and the number of denials by the court.

What is worse is that the judges in this secret court never turn the secret government lawyers down.

Over the last three years, the government has made 4,976 requests to the secret FISA court for permission to conduct electronic surveillance for foreign intelligence purposes. But the really big FISA number is zero.  Zero is the number of government requests to conduct electronic surveillance the FISA court has turned down in the last three years.

In 2012, the government asked for permission from the judges of the secret Foreign Intelligence Surveillance Court (FISA) 1,789 times to conduct electronic surveillance for foreign intelligence purposes.  There were zero denials.  One time the government withdrew its request.

In 2011, the government asked FISA judges 1,676 times to conduct electronic surveillance for foreign intelligence services.  There were zero denials.  The government withdrew two requests.

In 2010, the government asked FISA judges 1,511 times to conduct electronic surveillance for foreign intelligence purposes.  There were zero denials.  The government withdrew five requests.

Not a bad record, huh?  Nearly five thousand victories for those who want surveillance powers and no defeats is a record that should concern everyone who seeks to protect civil liberties.

FBI National Security Letters Scoop Up Information No Court Approval Even Needed

With a NSL letter the FBI can demand financial records from any institution from banks to casinos, all telephone records, subscriber information, credit reports, employment information, and all email records of the target as well as the email addresses and screen names for anyone who has contacted that account.  The reason is supposed to be for foreign counterintelligence.  There is no requirement for court approval at all.  The Patriot Act has made this much easier for the FBI.

According to Congressional records, there have been over 50,000 of these FBI NSL requests in the last three years.  This does not count the numerous times where the FBI persuades the disclosure of information without getting a NSL.  Nor does it count FBI requests made just to find out who an email account belongs to.

These reported NSL numbers also do not include the very high numbers of administrative subpoenas issued by the FBI which only require approval of a member of the local US Attorney’s office.

In 2012, the FBI issued 15,229 national security letter requests for information concerning US citizens.

In 2011, the FBI made 16,511 national security letter requests for information concerning US persons.

In 2010, the FBI made 24,287 national security letter requests for information on US citizens.

Since there is no court approval needed, there are no denials.  The NSL record is even better than the FISA record at 56,027 wins and no losses for Team Surveillance.

Thousands of Wiretaps Each Impacting Over One Hundred People Authorized Two Denied

According to the latest report to Congress by the US Courts, there were 2,732 applications for wiretaps submitted to all federal and to half of the state courts in 2011.  Half the states did not report on their numbers, so these numbers are certainly quite much too low.  Also, the term wiretap is out of date as this process currently covers providing information on conventional phone lines, cell phones, secret microphones, texts, fax, paging, and email computer transmissions.

For the year 2011, out of 2,732 applications, only two were denied.  Two losses out of 2700 tries is a comparatively poor win loss record for the surveillance folks.

On average, each wiretap intercepted the communications of 113 people, thus over three hundred thousand people had their calls intercepted.

The most prevalent reason reported for the wiretaps was drug offenses.  The average length of the wiretap was 42 days.  One federal wiretap in Michigan resulted in intercepting over 71,000 cellular messages extending over 202 days.  A New York state wiretap intercepted 274,210 messages over 564 days.

 Company Reports on Spying Show Tens of Thousands of Requests

It is well known that user accounts at Google, Apple and others contain a treasure trove of information on the customer’s basic information including searches, likes and dislikes, purchases, friends, and the like.  Government investigators seek this information tens of thousands times each year as the reports from the companies show.

Apple reported receiving 4,000 to 5,000 government requests for information on customers in just the last six months.  From December 1, 2012 to May 31, 2013 Apple received law enforcement requests for customer data on 9-10,000 accounts or devices.  Most of these requests are from police for robberies, missing children, etc.

Facebook reported that in a six month period ending December 31, 2012, it received between 9,000 and 10,000 requests from the US government for user data on 18,000 to 19,000 accounts.

Google reported it received over 15,000 requests for data by US government officials in 2012 for information on over 30,000 accounts.  It produced some data 88% of the time.

Microsoft (including Skype) reported 75,378 law enforcement requests for information on 137,424 accounts world-wide for the year 2012.  In over 11,000 cases, they could find no data to respond to the requests.  Microsoft disclosed non-content information in 56,388 cases, mostly to the US, UK, Turkey, Germany and France. In the US, Microsoft received 11,073 requests from law enforcement for information on 24,565 accounts.  Microsoft rejected 759 requests or 6.9% on legal grounds.  Microsoft provided user content in 1544 cases and subscriber/transactional data in 7,196 cases.

Yahoo said that in the last six months of 2012 it received between 12,000 and 13,000 requests for user data from law enforcement.

In a democracy, transparency and public participation are critical.  This is not just about “the terrorists.”  This is about civil liberty and government accountability.  Hundreds of thousands of people are being spied upon every year by our own government’s public admissions.  There is little oversight by judges and even less by Congress.  If the government admits this much, you can certainly assume there is more to come out.  It is time to wake up.  These secret subpoenas and secret courts and secret processes should be abolished or fundamentally changed.  Otherwise, change the slogan on the dollar to “In Secrecy We Trust.”

Bill Quigley is a human rights lawyer and law professor at Loyola University New Orleans College of Law.  Bill also works with the Center for Constitutional Rights.  A longer version of this article with full sources is available.  You can reach Bill at quigley77@gmail.com

June 20, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular | , , , , , , , | Leave a comment

Obama Speaks with Forked Tongue on Surveillance

By Sheldon Richman | FFF | June 11, 2013

It’s bad enough the federal government spies on us. Must it insult our intelligence too?

The government’s response to Edward Snowden’s leaks about the National Security Agency’s secret monitoring of the Internet and collection of our telephone logs is a mass of contradictions. Officials have said the disclosures are (1) old news, (2) grossly inaccurate, and (3) a blow to national security. It’s hard to see how any two of these can be true, much less all three.

Can’t they at least get their story straight? If they can’t do better than that, why should we have confidence in anything else that they do?

Snowden exposed the government’s indiscriminate snooping because, among other things, it violates the Fourth Amendment protection against unreasonable searches and he had no other recourse.

Director of National Intelligence James Clapper says Snowden should have used established channels to raise his concerns, but there are no effective channels. Members of the congressional intelligence committees are prohibited from telling the public what they learn from their briefings. Two members of the Senate committee, Ron Wyden and Mark Udall, for years have warned — without disclosing secrets — that the Obama administration is interpreting the Patriot Act and related laws far more broadly than was ever intended by those who voted for those pieces of legislation. Their warnings have made no difference.

A court challenge wasn’t open to Snowden either. Glenn Greenwald, who published Snowden’s leaks in the Guardian, notes that for years the ACLU has tried to challenge the surveillance programs in court on Fourth Amendment grounds, but the Obama administration has blocked the effort by arguing that the ACLU has no standing to bring the suit. It’s a classic Catch-22. Since the surveillance is secret, no one can know if he has been spied on. But if no one knows, no one can go into court claiming to be a victim, and the government will argue that therefore the plaintiff has no standing to challenge the surveillance. Well played, Obama administration.

The administration should not be allowed to get away with the specious claim that telling its secrets to a few privileged members of Congress is equivalent to informing the people. It is not. It’s merely one branch of government telling some people in another branch. Calling those politicians “our representatives” is highly misleading. In what sense do they actually represent us?

Equally specious is the assertion that the NSA can’t monitor particular people without court authorization. The secret FISA court is a rubber stamp.

When Obama ran for president in 2008, he said Americans shouldn’t have to choose between privacy and security. Now he says that “one of the things that we’re going to have to discuss and debate is how are we striking this balance between the need to keep the American people safe and our concerns about privacy? Because there are some tradeoffs involved.”

What do you take us for, Mr. President? Do you say whatever serves your momentary interest?

It’s outrageous for Obama to say he welcomes this debate — when his regime is plotting to capture and prosecute the heroic whistleblower who made it possible.

The debate would be bogus anyway. No one has a right to make a security/privacy tradeoff for you. Our rights should not be subject to vote, particularly when a ruling elite ultimately will make the decision — out of public view!

Americans have learned nothing from the last 40 years if they have not learned that the executive branch — regardless of party — will interpret any power as broadly as it wishes. Congressional oversight is worse than useless; it’s a myth, especially when one chamber is controlled by the president’s party and the other chamber’s majority embraces big government as long as it carries a “national security” label.

Obama says, “If people can’t trust not only the executive branch but also don’t trust Congress and don’t trust federal judges to make sure that we’re abiding by the Constitution, due process and rule of law, then we’re going to have some problems here.”

That’s wrong. If the politicians’ only response to revelations that they’re violating our privacy is to ask for trust, then we already have problems.

June 12, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite | , , , , , | Leave a comment