Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged NSA-disclosures

Rss Feed Group items tagged

Paul Merrell

ACLU Demands Secret Court Hand Over Crucial Rulings On Surveillance Law - 0 views

  • The American Civil Liberties Union (ACLU) has filed a motion to reveal the secret court opinions with “novel or significant interpretations” of surveillance law, in a renewed push for government transparency. The motion, filed Wednesday by the ACLU and Yale Law School’s Media Freedom and Information Access Clinic, asks the Foreign Intelligence Surveillance Act (FISA) Court, which rules on intelligence gathering activities in secret, to release 23 classified decisions it made between 9/11 and the passage of the USA Freedom Act in June 2015. As ACLU National Security Project staff attorney Patrick Toomey explains, the opinions are part of a “much larger collection of hidden rulings on all sorts of government surveillance activities that affect the privacy rights of Americans.” Among them is the court order that the government used to direct Yahoo to secretly scanits users’ emails for “a specific set of characters.” Toomey writes: These court rulings are essential for the public to understand how federal laws are being construed and implemented. They also show how constitutional protections for personal privacy and expressive activities are being enforced by the courts. In other words, access to these opinions is necessary for the public to properly oversee their government.
  • Although the USA Freedom Act requires the release of novel FISA court opinions on surveillance law, the government maintains that the rule does not apply retroactively—thereby protecting the panel from publishing many of its post-9/11 opinions, which helped create an “unprecedented buildup” of secret surveillance laws. Even after National Security Agency (NSA) whistleblower Edward Snowden revealed the scope of mass surveillance in 2013, sparking widespread outcry, dozens of rulings on spying operations remain hidden from the public eye, which stymies efforts to keep the government accountable, civil liberties advocates say. “These rulings are necessary to inform the public about the scope of the government’s surveillance powers today,” the ACLU’s motion states.
  • Toomey writes that the rulings helped influence a number of novel spying activities, including: The government’s use of malware, which it calls “Network Investigative Techniques” The government’s efforts to compel technology companies to weaken or circumvent their own encryption protocols The government’s efforts to compel technology companies to disclose their source code so that it can identify vulnerabilities The government’s use of “cybersignatures” to search through internet communications for evidence of computer intrusions The government’s use of stingray cell-phone tracking devices under the Foreign Intelligence Surveillance Act (FISA) The government’s warrantless surveillance of Americans under FISA Section 702—a controversial authority scheduled to expire in December 2017 The bulk collection of financial records by the CIA and FBI under Section 215 of the Patriot Act Without these rulings being made public, “it simply isn’t possible to understand the government’s claimed authority to conduct surveillance,” Toomey writes. As he told The Intercept on Wednesday, “The people of this country can’t hold the government accountable for its surveillance activities unless they know what our laws allow. These secret court opinions define the limits of the government’s spying powers. Their disclosure is essential for meaningful public oversight in our democracy.”
Paul Merrell

Obama to Place Some Restraints on Surveillance - NYTimes.com - 0 views

  • President Obama will issue new guidelines on Friday to curtail government surveillance, but will not embrace the most far-reaching proposals of his own advisers and will ask Congress to help decide some of the toughest issues, according to people briefed on his thinking.Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.
  • President Obama will issue new guidelines on Friday to curtail government surveillance, but will not embrace the most far-reaching proposals of his own advisers and will ask Congress to help decide some of the toughest issues, according to people briefed on his thinking.Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.
  • The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later. The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in.The blend of decisions, to be outlined in a speech at the Justice Department and in a presidential guidelines memorandum, will be Mr. Obama’s highest-profile response to the disclosures about the National Security Agency made in recent months by Edward J. Snowden, a former N.S.A. contractor who has fled to Russia.
  • ...5 more annotations...
  • The developments came as the nation’s judiciary waded into the highly charged debate. In a letter made public on Tuesday, a judge designated by Chief Justice John G. Roberts Jr. to express the views of the judicial branch warned that some changes under consideration would have a negative “operational impact” on a secret foreign intelligence court.Judge John D. Bates, a former chief judge of the Foreign Intelligence Surveillance Court, urged Mr. Obama and Congress not to alter the way the court is appointed or to create an independent public advocate to argue against the Justice Department in secret proceedings. Any such advocate, he wrote, should instead be appointed only when the court decided one was needed.Judge Bates objected to the workload of requiring that courts approve all national security letters, which are administrative subpoenas allowing the F.B.I. to obtain records about communications and financial transactions without court approval. And he raised concerns about greater public disclosure of court rulings, arguing that unclassified summaries would be “likely to promote confusion and misunderstanding.”
  • The judge’s letter, versions of which he sent to the leaders of several congressional committees, was released as all five members of Mr. Obama’s surveillance review group testified Tuesday before the Senate Judiciary Committee, seeking support for their recommendations.Illustrating the cross-pressures on the president, the advisers argued for the appointment of the independent version of a public advocate, a recommendation the president is expected to follow, though it is not clear how he will structure the position.
  • The judge’s objection to the proposal on national security letters dovetailed with that of the F.B.I. director, James B. Comey, who argued it would be inefficient to have to go to a judge each time records were sought. Mr. Obama has decided not to require court approval in every case, but might still require it in some circumstances, according to one administration official.Mr. Obama will cut back on the number of people whose phone records can be examined by the N.S.A. through its bulk data program. Currently the agency can scrutinize call records of people as far as three steps, or “hops,” removed from a suspect. Mr. Obama’s review panel proposed limiting searches to people just two steps removed. He is also likely to cut down the number of years such data can be retained; currently it is deleted after five years.
  • But the president will not, at least for now, back the panel’s suggestion that telecommunications firms keep such data and that the government be allowed to tap into those databases only when necessary. Intelligence officials complained it would be inefficient to have to go to multiple companies, so some officials proposed creating an independent consortium to store the data instead.Mr. Obama has decided against keeping the data at the private providers because they do not want that responsibility, officials said, and no independent consortium currently exists. As a result, he will ask Congress to work with him to determine the best way to store the data.
  • The letter by Judge Bates was accompanied by 15 pages of often specific comments about possible surveillance reforms.It is highly unusual for judges to weigh in on public policy debates involving the other two branches of government, but Judge Bates, the director of the Administrative Office of the United States Court, said that Chief Justice Roberts had designated him to “act as a liaison” and that he had consulted other judges.
  •  
    I keep wondering if Barack Obama just might be the most timid President the U.S. has ever had. Certainly, he lacks the courage to lead the nation. 
Paul Merrell

How a Court Secretly Evolved, Extending U.S. Spies' Reach - NYTimes.com - 0 views

  • Previously, with narrow exceptions, an intelligence agency was permitted to disseminate information gathered from court-approved wiretaps only after deleting irrelevant private details and masking the names of innocent Americans who came into contact with a terrorism suspect. The Raw Take order significantly changed that system, documents show, allowing counterterrorism analysts at the N.S.A., the F.B.I. and the C.I.A. to share unfiltered personal information.
  • The leaked documents that refer to the rulings, including one called the “Large Content FISA” order and several more recent expansions of powers on sharing information, add new details to the emerging public understanding of a secret body of law that the court has developed since 2001. The files help explain how the court evolved from its original task — approving wiretap requests — to engaging in complex analysis of the law to justify activities like the bulk collection of data about Americans’ emails and phone calls.“These latest disclosures are important,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. “They indicate how the contours of the law secretly changed, and they represent the transformation of the Foreign Intelligence Surveillance Court into an interpreter of law and not simply an adjudicator of surveillance applications.”
  • The number of Americans whose unfiltered personal information has been shared among agencies is not clear. Since the Sept. 11 attacks, the court has approved about 1,800 FISA orders each year authorizing wiretaps or physical searches — which can involve planting bugs in homes or offices, or copying hard drives — inside the United States. But the government does not disclose how many people had their private conversations monitored as a result.
  • ...2 more annotations...
  • The new disclosures come amid a debate over whether the surveillance court, which hears arguments only from the Justice Department, should be restructured for its evolving role. Proposals include overhauling how judges are selected to serve on it and creating a public advocate to provide adversarial arguments when the government offers complex legal analysis for expanding its powers.
  • The Raw Take order, back in 2002, also relaxed limits on sharing private information about Americans with foreign governments. The bar was higher for sharing with outsiders: Raw information was not provided, and even information deemed relevant about a terrorism issue required special approval. Under procedures described in a 1984 report, only the attorney general could authorize such dissemination. But on Aug. 20, 2002, Attorney General John Ashcroft, citing the recent order, secretly issued new procedures allowing the N.S.A. to provide information to foreign governments without his clearance. “If the proposed recipient(s) of the dissemination have a history of human rights abuses, that history should be considered in assessing the potential for economic injury, physical harm, or other restriction of movement, and whether the dissemination should be made,” he wrote.
  •  
    NYT publishes a new treasure trove of Snowden documents. This lead article links to documents and links to other articles that link documents. A must-read for those interested in how the FISA Court and Congress "grew" the law governing the scope of permissible surveillance and the scope of who would be given access to the fruits of that surveillance. 
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Paul Merrell

Senate Intel Committee Blocks Former Staffer From Talking To Press About Oversight Proc... - 0 views

  • The Senate Select Committee on Intelligence has taken the unusual step of actively blocking a former committee aide from talking to TPM about congressional oversight of the intelligence community. At issue isn’t classified sources and methods of intelligence gathering but general information about how the committee functions — and how it should function. The committee’s refusal to allow former general counsel Vicki Divoll to disclose unclassified information to a reporter was the first and only time it has sought to block her from making public comments, based on her experience as one of its most senior aides, since she left Capitol Hill in 2003.
  • The committee’s decision comes amid fallout from leaks of classified National Security Agency documents by ex-NSA contractor Edward Snowden. In light of the Snowden revelations about the country’s secret surveillance programs, TPM was reporting a story based on interviews with members of Congress and current and former aides about the successes and pitfalls of intelligence oversight on Capitol Hill. The goal was to answer some basic questions for readers: How does a classified process differ from public oversight? What challenges do the combination of government secrecy, classified briefings, and strict committee protocols present to legislators trying to control the nation’s sprawling intelligence apparatus?
  • While Divoll remains legally barred from disclosing classified information, she is also still subject to a non-disclosure agreement with the Senate Intelligence Committee that bars her from discussing committee-sensitive business. Out of an abundance of caution, Divoll also conferred with the committee on Friday about her interview with TPM. She anticipated that the committee would approve the interview, noting that in her post-government career, both the committee and the CIA had never done more than request minor tweaks when she brought them pieces of her writing for pre-publication review. This, she believed, would be a similar process. But for the first time in her career, the committee took the extraordinary step, on a bipartisan basis, of declaring the interview’s entire contents a violation of her non-disclosure agreement and effectively forbade her from putting any of it on the record. “The committee has reviewed your submission … and objected to any publication of the information contained therein,” she was told. Specifically the committee claimed the information she provided TPM was both “out of date” and “committee sensitive.” Angered by the committee’s decision, Divoll sought Friday to have it reversed. The committee declined. TPM agreed to honor her request that we leave her comments off the record.
  •  
    Whoo-weee! Even non-classified information is secret on the Senate Intelligence Committee. Too bad that Congress never saw fit to make itself subject to the Freedom of Information Act.  :-)
Paul Merrell

Eric Holder: The Justice Department could strike deal with Edward Snowden - 0 views

  • Eric Holder: The Justice Department could strike deal with Edward SnowdenMichael IsikoffChief Investigative CorrespondentJuly 6, 2015Former U.S. Attorney General Eric Holder. (Photo: Olivier Douliery-Pool/Getty) Former Attorney General Eric Holder said today that a “possibility exists” for the Justice Department to cut a deal with former NSA contractor Edward Snowden that would allow him to return to the United States from Moscow. In an interview with Yahoo News, Holder said “we are in a different place as a result of the Snowden disclosures” and that “his actions spurred a necessary debate” that prompted President Obama and Congress to change policies on the bulk collection of phone records of American citizens. Asked if that meant the Justice Department might now be open to a plea bargain that allows Snowden to return from his self-imposed exile in Moscow, Holder replied: “I certainly think there could be a basis for a resolution that everybody could ultimately be satisfied with. I think the possibility exists.”
  • But his remarks to Yahoo News go further than any current or former Obama administration official in suggesting that Snowden’s disclosures had a positive impact and that the administration might be open to a negotiated plea that the self-described whistleblower could accept, according to his lawyer Ben Wizner.
  • It’s also not clear whether Holder’s comments signal a shift in Obama administration attitudes that could result in a resolution of the charges against Snowden. Melanie Newman, chief spokeswoman for Attorney General Loretta Lynch, Holder’s successor, immediately shot down the idea that the Justice Department was softening its stance on Snowden. “This is an ongoing case so I am not going to get into specific details but I can say our position regarding bringing Edward Snowden back to the United States to face charges has not changed,” she said in an email.
  • ...1 more annotation...
  • Three sources familiar with informal discussions of Snowden’s case told Yahoo News that one top U.S. intelligence official, Robert Litt, the chief counsel to Director of National Intelligence James Clapper, recently privately floated the idea that the government might be open to a plea bargain in which Snowden returns to the United States, pleads guilty to one felony count and receives a prison sentence of three to five years in exchange for full cooperation with the government.
Paul Merrell

U.S. Military Bans The Intercept - The Intercept - 0 views

  • A portion of an email (redacted and slightly altered to protect the source) sent to staff last week at a U.S. Marine Corps installation directing employees not to read this web site. The U.S. military is banning and blocking employees from visiting The Intercept in an apparent effort to censor news reports that contain leaked government secrets. According to multiple military sources, a notice has been circulated to units within the Army, Navy, Air Force, and Marine Corps warning staff that they are prohibited from reading stories published by The Intercept on the grounds that they may contain classified information. The ban appears to apply to all employees—including those with top-secret security clearance—and is aimed at preventing classified information from being viewed on unclassified computer networks, even if it is freely available on the internet. Similar military-wide bans have been directed against news outlets in the past after leaks of classified information.
  • A directive issued to military staff at one location last week, obtained by The Intercept, threatens that any employees caught viewing classified material in the public domain will face “long term security issues.” It suggests that the call to prohibit employees from viewing the website was made by senior officials over concerns about a “potential new leaker” of secret documents. The directive states: We have received information from our higher headquarters regarding a potential new leaker of classified information.  Although no formal validation has occurred, we thought it prudent to warn all employees and subordinate commands.  Please do not go to any website entitled “The Intercept” for it may very well contain classified material. As a reminder to all personnel who have ever signed a non-disclosure agreement, we have an ongoing responsibility to protect classified material in all of its various forms.  Viewing potentially classified material (even material already wrongfully released in the public domain) from unclassified equipment will cause you long term security issues.  This is considered a security violation.
  • A military insider subject to the ban said that several employees expressed concerns after being told by commanders that it was “illegal and a violation of national security” to read publicly available news reports on The Intercept. “Even though I have a top secret security clearance, I am still forbidden to read anything on the website,” said the source, who spoke on condition of anonymity due to the sensitivity of the subject.  “I find this very disturbing that they are threatening us and telling us what websites and news publishers we are allowed to read or not.”
  • ...2 more annotations...
  • In an emailed statement, Defense Department spokeswoman Lt. Col. Valerie Henderson said that she had not been able to establish whether the DoD had been the source of “any guidance related to your website.” Henderson added, however, that “DoD personnel have an obligation to safeguard classified information. Classified information, whether made public by unauthorized disclosure, remains classified until declassified by an appropriate government authority. DoD is committed to preventing classified information from being introduced onto DoD’s unclassified networks.” Earlier this month, after the publication of two Intercept stories revealing classified details about the vast scope of the government’s watchlisting program, Reuters reported that “intelligence officials were preparing a criminal referral” over the leaks.
  • The ban on The Intercept appears to have come in the aftermath of those stories, representing the latest in a string of U.S. military crackdowns on news websites that have published classified material. Last year, the Army admitted that it was blocking parts of The Guardian’s website after it published secret documents from former National Security Agency contractor Edward Snowden. In 2010, WikiLeaks and several major news organizations were subject to similar measures after the publication of leaked State Department diplomatic files. Flanagan, the Marine Corps spokesman, told The Intercept that The Washington Post was also blocked by some military agencies last year after it published documents from Snowden revealing covert NSA surveillance operations. “Just because classified information is published on a public website, that doesn’t mean military people with security clearance have the ability to download it,” Flanagan said.
  •  
    Enforced ignorance of the U.S. military. The official reason is a bucket that doesn't hold water. Despite official "classified" status, public is public. Any enemy can read it, so why should our military be barred from doing so. The real reason, I suspect, is protecting morale. 
Paul Merrell

Exclusive: U.S. may use secrets act to stop suit against Iran sanctions group | Reuters - 0 views

  • (Reuters) - The U.S. government is considering using a powerful national security law to halt a private lawsuit against a non-profit group, United Against A Nuclear Iran, according to a source familiar with the case. Greek businessman and ship owner Victor Restis last year sued UANI for defamation after the New York-based group, whose advisors include former intelligence officials from the United States, Europe and Israel, accused him of violating sanctions on Iran by exporting oil from the country.Earlier this year, U.S. government lawyers declared their interest in the lawsuit, warning that information related to UANI could jeopardize law enforcement activities.An intervention by the government in a private civil lawsuit is rare, and its use of a privilege under state secrets statutes to clamp down on the case would be a highly unusual move. Other cases where the government has invoked the privilege include lawsuits filed against the National Security Agency in the wake of leaks to journalists by former NSA contractor Edward Snowden.
  • Restis' lawyer, Abbe Lowell, also declined to comment, but pointed to court filings in which he argued that the state secrets privilege could not be used without the government first explaining the true nature of its relationship to UANI.Restis denies doing illegal business with Iran. As part of the lawsuit, his lawyers have demanded that UANI produce whatever evidence it had that Restis was violating the sanctions and explain where it came from.Iran denies Western accusations that it has been seeking the capability to assemble nuclear weapons. Diplomatic talks between Iran and the United States, France, Russia, Britain, China and Germany are expected to resume in September, with the aim of reaching a settlement by Nov. 24 that would scale back Iran's nuclear program in exchange for lifting sanctions. An effort by government lawyers to mediate a settlement between UANI and Restis appears to have failed, the source said.
  • UANI advocates economic pressure on Iran to keep the country from building a nuclear arsenal. One of the group's tactics is to name and shame companies and people who do business in Iran.UANI has a small budget. It spent $1.5 million in 2013, according to its tax filings. The group, however, uses sources such as commercially sold satellite imagery for its campaigns.Among its advisory board members are Meir Dagan, the former director of the Israeli intelligence agency Mossad, and August Hanning, the former director of Germany's Federal Intelligence Service.Its chief executive, Mark Wallace, is also the CEO of Tigris Financial Group, an investment company backed by the billionaire American gold investor Thomas Kaplan. Restis did not originally name Kaplan in the defamation lawsuit, but his lawyer is seeking to depose Kaplan as part of the proceedings.
  • ...2 more annotations...
  • The government and lawyers for UANI have previously sought to delay evidence gathering in the case. UANI lawyers have told the court they could not produce certain documents requested by Restis because they would reveal U.S. government secrets.In March, a Justice Department lawyer wrote to U.S. District Judge Edgardo Ramos, who is presiding over the case in Manhattan, confirming the government's interest and requesting a temporary halt to proceedings while the government decided what to do. Ramos granted the stay, but ordered the government to explain why it wanted the material suppressed.In an April 9 letter, Assistant U.S. Attorney Michael Byars wrote that the material in question could be protected under a privilege designed to prevent the public release of law enforcement techniques, confidential sources, undercover operatives and active investigations. But if it invoked the powerful state secrets privilege, the government would be claiming the information would not only interfere with law enforcement efforts but also jeopardize national security.
  • The government has until Sept. 12 to decide whether to use the state secrets privilege.The privilege can be used to block the release of information in a lawsuit, but the government has also used it to force the dismissal of lawsuits. It is unclear whether the privilege would be applied only to certain information in the Restis case or whether it would cause the case to be closed completely.The case is Restis et al v. American Coalition Against Nuclear Iran Inc, (dba United Against A Nuclear Iran) et al, in U.S. District Court for the Southern District of New York, No. 13-05032.
  •  
    More detail on the very interesting Restis case against UANI. The normal rule is that a privilege, once the privileged information is disclosed to one who is not entitled to the privilege, is deemed waived. So Restis' lawyer is correct in stating that the state secrets privilege cannot be used without the government explaining the true nature of its relationship to UANI, assuming the information was not stolen by UANI. The disclosure is new of UANI having former directors of Israeli and German intelligence services on its advisory board. This case looks like a cyst on the verge of rupturing and spewing forth a whole bunch of Dark Government pus.   
Paul Merrell

GCHQ captured emails of journalists from top international media | UK news | The Guardian - 0 views

  • GCHQ’s bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals. Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency’s intranet as part of a test exercise by the signals intelligence agency. The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.
  • Senior editors and lawyers in the UK have called for the urgent introduction of a freedom of expression law amid growing concern over safeguards proposed by ministers to meet concerns over the police use of surveillance powers linked to the Regulation of Investigatory Powers Act 2000 (Ripa). More than 100 editors, including those from all the national newspapers, have signed a letter, coordinated by the Society of Editors and Press Gazette, to the UK prime minister, David Cameron, protesting at snooping on journalists’ communications. In the wake of terror attacks on the Charlie Hebdo offices and a Jewish grocer in Paris, Cameron has renewed calls for further bulk-surveillance powers, such as those which netted these journalistic communications.
  • The journalists’ communications were among 70,000 emails harvested in the space of less than 10 minutes on one day in November 2008 by one of GCHQ’s numerous taps on the fibre-optic cables that make up the backbone of the internet. The communications, which were sometimes simple mass-PR emails sent to dozens of journalists but also included correspondence between reporters and editors discussing stories, were retained by GCHQ and were available to all cleared staff on the agency intranet. There is nothing to indicate whether or not the journalists were intentionally targeted. The mails appeared to have been captured and stored as the output of a then-new tool being used to strip irrelevant data out of the agency’s tapping process. New evidence from other UK intelligence documents revealed by Snowden also shows that a GCHQ information security assessment listed “investigative journalists” as a threat in a hierarchy alongside terrorists or hackers.
  • ...2 more annotations...
  • One restricted document intended for those in army intelligence warned that “journalists and reporters representing all types of news media represent a potential threat to security”. It continued: “Of specific concern are ‘investigative journalists’ who specialise in defence-related exposés either for profit or what they deem to be of the public interest. “All classes of journalists and reporters may try either a formal approach or an informal approach, possibly with off-duty personnel, in their attempts to gain official information to which they are not entitled.” It goes on to caution “such approaches pose a real threat”, and tells staff they must be “immediately reported” to the chain-of-command.
  • GCHQ’s bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals. Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency’s intranet as part of a test exercise by the signals intelligence agency. The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.
Paul Merrell

Court Accepts DOJ's 'State Secrets' Claim to Protect Shadowy Neocons: a New Low - The I... - 0 views

  • A truly stunning debasement of the U.S. justice system just occurred through the joint efforts of the Obama Justice Department and a meek and frightened Obama-appointed federal judge, Edgardo Ramos, all in order to protect an extremist neocon front group from scrutiny and accountability. The details are crucial for understanding the magnitude of the abuse here. At the center of it is an anti-Iranian group calling itself “United Against Nuclear Iran” (UANI), which is very likely a front for some combination of the Israeli and U.S. intelligence services. When launched, NBC described its mission as waging “economic and psychological warfare” against Iran. The group was founded and is run and guided by a roster of U.S., Israeli and British neocon extremists such as Joe Lieberman, former Bush Homeland Security adviser (and current CNN “analyst”) Fran Townsend, former CIA Director James Woolsey, and former Mossad Director Meir Dagan. One of its key advisers is Olli Heinonen, who just co-authored a Washington Post Op-Ed with former Bush CIA/NSA Director Michael Hayden arguing that Washington is being too soft on Tehran.
  • This group of neocon extremists was literally just immunized by a federal court from the rule of law. That was based on the claim — advocated by the Obama DOJ and accepted by Judge Ramos — that subjecting them to litigation for their actions would risk disclosure of vital “state secrets.” The court’s ruling was based on assertions made through completely secret proceedings between the court and the U.S. government, with everyone else — including the lawyers for the parties — kept in the dark. In May 2013, UANI launched a “name and shame” campaign designed to publicly identify — and malign — any individuals or entities enabling trade with Iran. One of the accused was the shipping company of Greek billionaire Victor Restis, who vehemently denies the accusation. He hired an American law firm and sued UANI for defamation in a New York federal court, claiming the “name and shame” campaign destroyed his reputation.
  • Up until that point, there was nothing unusual about any of this: just a garden-variety defamation case brought in court by someone who claims that public statements made about him are damaging and false. That happens every day. But then something quite extraordinary happened: In September of last year, the U.S. government, which was not a party, formally intervened in the lawsuit, and demanded that the court refuse to hear Restis’s claims and instead dismiss the lawsuit against UANI before it could even start, on the ground that allowing the case to proceed would damage national security. When the DOJ intervened in this case and asserted the “state secrets privilege,” it confounded almost everyone. The New York Times’s Matt Apuzzo noted at the time that “the group is not affiliated with the government, and lists no government contracts on its tax forms. The government has cited no precedent for using the so­-called state­ secrets privilege to quash a private lawsuit that does not focus on government activity.” He quoted the ACLU’s Ben Wizner as saying: “I have never seen anything like this.” Reuters’s Allison Frankel labeled the DOJ’s involvement a “mystery” and said “the government’s brief is maddeningly opaque about its interest in a private libel case.”
  • ...2 more annotations...
  • But in this case, there is no apparent U.S. government conduct at issue in the lawsuit. At least based on what they claim about themselves, UANI is just “a not-for-profit, non-partisan, advocacy group” that seeks to “educate” the public about the dangers of Iran’s nuclear program. Why would such a group like this even possess “state secrets”? It would be illegal to give them such material. Or could it be that the CIA or some other U.S. government agency has created and controls the group, which would be a form of government-disseminated propaganda, which happens to be illegal? What else could explain the basis for the U.S. government’s argument that allowing UANI to be sued would risk the disclosure of vital “state secrets” besides a desire to cover up something quite untoward if not illegal? What “state secrets” could possibly be disclosed by suing a nice, little “not-for-profit, non-partisan, advocacy group”?
  • This sham worked. This week, Judge Ramos issued his ruling dismissing the entire lawsuit (see below). As a result of the DOJ’s protection, UANI cannot be sued. Among other things, it means this group of neocon extremists now has a license to defame anyone they want. They can destroy your reputation with false accusations in a highly public campaign, and when you sue them for it, the DOJ will come in and whisper in the judge’s ear that national security will be damaged if — like everyone else in the world — UANI must answer in a court of law for their conduct. And subservient judicial officials like Judge Ramos will obey the U.S. government’s dictates and dismiss your lawsuit before it begins, without your having any idea why that even happened. Worse, in his written ruling, the judge expressly acknowledges that dismissal of the entire lawsuit at the start on secrecy grounds is what he calls a “harsh sanction,” and also acknowledges that “it is particularly so in this case because Plaintiffs not only do not get their day in court, but cannot be told why” (emphasis added). But he does it anyway, in a perfunctory 18-page opinion that does little other than re-state some basic legal principles, and then just concludes that everything the government whispered in his ear should be accepted.
  •  
    Unless the district court decision is overturned by a higher court, the Restis case looks to be over. The secrecy concerns of the Dark State trump justice, again. It should be noted that the Constitution is silent on the issue of state secrets (the so-called "state secrets privilege" was manufactured from whole cloth by the Supreme Court in the early 1950s). On the other hand, several provisions of the Constitution expressly require that justice be done, not the least of which is the Due Process clause.  
Paul Merrell

EFF Pries More Information on Zero Days from the Government's Grasp | Electronic Fronti... - 0 views

  • Until just last week, the U.S. government kept up the charade that its use of a stockpile of security vulnerabilities for hacking was a closely held secret.1 In fact, in response to EFF’s FOIA suit to get access to the official U.S. policy on zero days, the government redacted every single reference to “offensive” use of vulnerabilities. To add insult to injury, the government’s claim was that even admitting to offensive use would cause damage to national security. Now, in the face of EFF’s brief marshaling overwhelming evidence to the contrary, the charade is over. In response to EFF’s motion for summary judgment, the government has disclosed a new version of the Vulnerabilities Equities Process, minus many of the worst redactions. First and foremost, it now admits that the “discovery of vulnerabilities in commercial information technology may present competing ‘equities’ for the [government’s] offensive and defensive mission.” That might seem painfully obvious—a flaw or backdoor in a Juniper router is dangerous for anyone running a network, whether that network is in the U.S. or Iran. But the government’s failure to adequately weigh these “competing equities” was so severe that in 2013 a group of experts appointed by President Obama recommended that the policy favor disclosure “in almost all instances for widely used code.” [.pdf].
  • The newly disclosed version of the Vulnerabilities Equities Process (VEP) also officially confirms what everyone already knew: the use of zero days isn’t confined to the spies. Rather, the policy states that the “law enforcement community may want to use information pertaining to a vulnerability for similar offensive or defensive purposes but for the ultimate end of law enforcement.” Similarly it explains that “counterintelligence equities can be defensive, offensive, and/or law enforcement-related” and may “also have prosecutorial responsibilities.” Given that the government is currently prosecuting users for committing crimes over Tor hidden services, and that it identified these individuals using vulnerabilities called a “Network Investigative Technique”, this too doesn’t exactly come as a shocker. Just a few weeks ago, the government swore that even acknowledging the mere fact that it uses vulnerabilities offensively “could be expected to cause serious damage to the national security.” That’s a standard move in FOIA cases involving classified information, even though the government unnecessarily classifies documents at an astounding rate. In this case, the government relented only after nearly a year and a half of litigation by EFF. The government would be well advised to stop relying on such weak secrecy claims—it only risks undermining its own credibility.
  • The new version of the VEP also reveals significantly more information about the general process the government follows when a vulnerability is identified. In a nutshell, an agency that discovers a zero day is responsible for invoking the VEP, which then provides for centralized coordination and weighing of equities among all affected agencies. Along with a declaration from an official at the Office of the Director of National Intelligence, this new information provides more background on the reasons why the government decided to develop an overarching zero day policy in the first place: it “recognized that not all organizations see the entire picture of vulnerabilities, and each organization may have its own equities and concerns regarding the prioritization of patches and fixes, as well as its own distinct mission obligations.” We now know the VEP was finalized in February 2010, but the government apparently failed to implement it in any substantial way, prompting the presidential review group’s recommendation to prioritize disclosure over offensive hacking. We’re glad to have forced a little more transparency on this important issue, but the government is still foolishly holding on to a few last redactions, including refusing to name which agencies participate in the VEP. That’s just not supportable, and we’ll be in court next month to argue that the names of these agencies must be disclosed. 
Paul Merrell

NEW TIME POLL: Support for the Leaker-and His Prosecution | TIME.com - 0 views

  • More than half of Americans approve of a former intelligence contractor’s decision to leak classified details of sprawling government surveillance programs, according to the results of a new TIME poll. Fifty-four percent of respondents said the leaker, Edward Snowden, 29, did a “good thing” in releasing information about the government programs, which collect phone, email, and Internet search records in an effort, officials say, to prevent terrorist attacks. Just 30 percent disagreed. But an almost identical number of Americans —  53 percent —  still said he should be prosecuted for the leak, compared to 28% who said he should not. Americans aged 18 to 34 break from older generations in showing far more support for Snowden’s actions. Just 41 percent of that cohort say he should face charges, while 43 percent say he should not. Just 19 percent of that age group say the leak was a “bad thing.”
  • Overall, Americans are sharply divided over the government’s use of surveillance programs to prevent terrorist attacks, according to the results of the poll. Forty-eight percent of Americans approve of the surveillance programs, while 44 percent disapprove, a statistical tie given the poll’s four-point margin of error.
  • A majority of the poll’s respondents say that the surveillance programs have helped protect national security, with 63 percent saying they’ve had “some” or a “great deal” of impact in protecting the country. Just 31 percent says they’ve done “not much” or “nothing at all.” A narrow plurality of those polled, 48 percent to 43 percent, believe that the federal government is striking the right balance between protecting Americans’ privacy and protecting their physical well-being or that the government should be doing more to prevent terrorism.
  • ...1 more annotation...
  • Nearly 60 percent believe the revelations will not force the government to curtail the surveillance program. But 76 percent of Americans believe there will soon be additional disclosures that the spying programs are bigger and more widespread than currently known. Americans are largely split on partisan grounds as to whether Obama is more careful about respecting privacy than President George W. Bush. Twenty-eight percent said Bush was more careful, one-quarter sided with Obama, and 42 percent say there has been little difference between the two.
Paul Merrell

In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry - NYTimes.com - 0 views

  • Google, which briefly considered moving all of its computer servers out of the United States last year after learning how they had been penetrated by the National Security Agency, was looking for a public assurance from President Obama that the government would no longer secretly suck data from the company’s corner of the Internet cloud.Microsoft was listening to see if Mr. Obama would adopt a recommendation from his advisers that the government stop routinely stockpiling flaws in its Windows operating system, then using them to penetrate some foreign computer systems and, in rare cases, launch cyberattacks.
  • Intel and computer security companies were eager to hear Mr. Obama embrace a commitment that the United States would never knowingly move to weaken encryption systems. They got none of that.
  • Perhaps the most striking element of Mr. Obama’s speech on Friday was what it omitted: While he bolstered some protections for citizens who fear the N.S.A. is downloading their every dial, tweet and text message, he did nothing, at least yet, to loosen the agency’s grip on the world’s digital pipelines. White House officials said that Mr. Obama was committed to studying the complaints by American industry that the revelations were costing them billions of dollars in business overseas, by giving everyone from the Germans to the Brazilians to the Chinese an excuse to avoid American hardware and cloud services. “The most interesting part of this speech was not how the president weighed individual privacy against the N.S.A.,” said Fred H. Cate, the director of the Center of Applied Cybersecurity Research at Indiana University, “but that he said little about what to do about the agency’s practice of vacuuming up everything it can get its hands on.”
  • ...4 more annotations...
  • In fact, behind the speech lies a struggle Mr. Obama nodded at but never addressed head on. It pits corporations that view themselves as the core of America’s soft power around the world — the country’s economic driver and the guardians of its innovative edge — against an intelligence community 100,000 strong that regards its ability to peer into any corner of the digital world, and manipulate it if necessary, as crucial to the country’s security.In public, the coalition was polite if unenthusiastic about the president’s speech. His proposals, the companies said in a statement, “represent positive progress on key issues,” even while “crucial details remain to be addressed on these issues, and additional steps are needed on other important issues.” But in the online chat rooms that users and employees of those services inhabit each day, the president’s words were mocked. “If they really cared about the security of US infrastructure, they’d divulge the vulnerabilities they found or bought from the black market that exploit the security of these systems, so those systems can be fixed, and no one else can exploit them with these exploits,” wrote a user called “higherpurpose” on Hacker News.
  • In an interview, a senior administration official acknowledged that the administration had weighed what the president could say in public about the delicate problems of encryption, or the N.S.A.’s use of “zero day” flaws in software, the name for security holes that have never been seen before. It is a subject the intelligence agencies have refused to discuss in public, and Mr. Obama determined that it was both too secret, and too fluid, to discuss in the speech, officials said.In response to questions, the White House said the president had asked his special assistant for cybersecurity, Michael Daniel, and the president’s office of science and technology policy to study a recent advisory panel’s recommendation that the government get out of the business of corrupting the encryption systems created by American companies.
  • It will not be an easy task. One of the recent disclosures, first reported by Reuters, indicated that the N.S.A. paid millions of dollars to RSA, a major encryption firm, to incorporate a deliberately weakened algorithm into some of its products, giving the government a “back door” to read whatever it wanted. But when the advisory panel concluded that the United States should not “in any way subvert, weaken or make vulnerable generally available commercial software,” the intelligence agencies protested.“Some in the intelligence community saw that as a call for the N.S.A. to get out of cryptography, which is the reason they were created,” the senior official said. He added: “We’ve said that we are very much supportive of U.S. industry and making sure that U.S. industry remains competitive, and able to produce really good products. And N.S.A. has been out there saying they have no interest in breaking encryption that guards global commerce.”
  • But as Mr. Obama himself acknowledged, the United States has a credibility problem that will take years to address. The discovery that it had monitored the cellphone of Chancellor Angela Merkel of Germany, or that it has now found a way to tap into computers around the world that are completely disconnected from the Internet — using covert radio waves — only fuels the argument that American products cannot be trusted.That argument, heard these days from Berlin to Mexico City, may only be an excuse for protectionism. But it is an excuse that often works.
Gary Edwards

Mice and Men: The Failures of Closing our MidEast Embassies | We Meant Well - Peter Van... - 0 views

  • What do you call it when you follow the same strategy for twelve years not only without success, but with negative results? What if time shows that that strategy actually helps the enemy you seek to defeat? Failure.
  • Failing to Learn America’s global war of terror can this week be declared officially a failure, total and complete. After twelve years of invasions, drones, torture, spying and gulags, the U.S. closed its embassies and consulates across (only) the Muslim world. Not for a day, but in most cases heading toward a week, with terror warnings on file lasting through the month. The U.S. evacuated all non-essential diplomatic and military personnel from Yemen; dependents are already gone from most other MidEast posts. Only our fortress embassies in Kabul and Baghdad ironically were considered safe enough to reopen a day or two ago. The cause of all this? Apparently a message from al Qaeda leader Ayman al Zawahiri to his second in command in Yemen telling him to “do something.”
  • Failure to Understand All this might be read in one of three ways: – The simplest explanation is that the threat is indeed real. Twelves years of war has simply pushed the terror threat around, spilled mercury-like, from country to country. A Whack-a-Mole war. – U.S. officials, perhaps still reeling from Edward Snowden’s NSA disclosures, chose to exaggerate a threat, in essence creating a strawman that could then be defeated. In favor of this argument are the many “leaks” noted above, essentially disclosing raw intel, specific conversations that would clearly reveal to the al Qaeda people concerned how and when they were monitored. Usually try to avoid that in the spy biz. The Frankenbomber stuff is pure 2001 scare tactic recycled. The idea that al Qaeda sought to seize infrastructure is a certain falsehood , as the whole point of guerrilla war is never to seize things, which would create a concentrated, open, stationary target that plays right into the Big Hardware advantage the U.S. holds. Just does not make sense, and supports the idea that this is all made-up for some U.S. domestic purpose. – However, the third way of looking at this is that the U.S. has failed to walk away from the climate of fear and paranoia that has distorted foreign and domestic policy since 9/12, Chicken Littles if you will. What if the U.S. really believed that al Qaeda was planning to take over Yemen this week in spite of the odd inconsistencies? What if “chatter” was enough to provoke the last Superpower into a super-sized public cower?
  • ...7 more annotations...
  • Failure to Not Act The why in this case may not matter, when the what is so controlling.
  • That sadly predictable resort to violence by the U.S. shows that we have fundamentally failed to understand that in a guerrilla war one cannot shoot one’s way out.
  • You win by offering a better idea to people than the other side, while at the same time luring the other side into acts of violence and political repression that make them lose the support of those same people.
  • This is asymmetrical warfare 101 stuff.
  • –In the populations al Qaeda seeks to influence, claiming they “humbled and scared” the US twelve years after 9/11 simply by ramping up their chatter seems an effective al Qaeda strategy.
  • As with the British thrashing about as their empire collapsed, the world’s greatest military defeated by natives with old rifles, so now goes the U.S., by its own hand.
  • “We continue to pay in blood because we can’t learn how to do something besides fight.”
Paul Merrell

IC ON THE RECORD - 0 views

  •  
    New Office of the Director of National Intelligence Tumblr web site that Obama ordered to be created, collecting information about the U.S. Intelligence Community, IC on the Record. Presumably "IC" stands for "Intelligence Community."  Content includes declassified documents, official statements, testimony, and other materials. I'll aim to mark any pages bookmarked from this site with an "ICR" tag. 
Paul Merrell

Heck no, Clapper won't go: DNI refuses to quit over misleading Congress on NSA spying -... - 0 views

  • Director of National IntelligenceJames Clapper has no plans to resign following disclosures to the Senate Intelligence Committee that he misled Congress on widespread National Security Agency electronic surveillance of Americans.
Paul Merrell

Officials Say U.S. May Never Know Extent of Snowden's Leaks - NYTimes.com - 0 views

  • American intelligence and law enforcement investigators have concluded that they may never know the entirety of what the former National Security Agency contractor Edward J. Snowden extracted from classified government computers before leaving the United States, according to senior government officials.
  • “They’ve spent hundreds and hundreds of man-hours trying to reconstruct everything he has gotten, and they still don’t know all of what he took,” a senior administration official said. “I know that seems crazy, but everything with this is crazy.” That Mr. Snowden was so expertly able to exploit blind spots in the systems of America’s most secretive spy agency illustrates how far computer security still lagged years after President Obama ordered standards tightened after the WikiLeaks revelations of 2010.
  • In recent days, a senior N.S.A. official has told reporters that he believed Mr. Snowden still had access to documents not yet disclosed. The official, Rick Ledgett, who is heading the security agency’s task force examining Mr. Snowden’s leak, said he would consider recommending amnesty for Mr. Snowden in exchange for those documents. “So, my personal view is, yes, it’s worth having a conversation about,” Mr. Ledgett told CBS News. “I would need assurances that the remainder of the data could be secured, and my bar for those assurances would be very high. It would be more than just an assertion on his part.”
  • ...1 more annotation...
  • Because the N.S.A. is still uncertain about exactly what Mr. Snowden took, government officials sometimes first learn about specific documents from reporters preparing their articles for publication — leaving the State Department with little time to notify foreign leaders about coming disclosures.
Paul Merrell

Door May Open for Challenge to Secret Wiretaps - NYTimes.com - 0 views

  • Five years after Congress authorized a sweeping warrantless surveillance program, the Justice Department is setting up a potential Supreme Court test of whether it is constitutional by notifying a criminal defendant — for the first time — that evidence against him derived from the eavesdropping, according to officials.
  • Prosecutors plan to inform the defendant about the monitoring in the next two weeks, a law enforcement official said. The move comes after an internal Justice Department debate in which Solicitor General Donald B. Verrilli Jr. argued that there was no legal basis for a previous practice of not disclosing links to such surveillance, several Obama administration officials familiar with the deliberations said. Meanwhile, the department’s National Security Division is combing active and closed case files to identify other defendants who faced evidence resulting from the 2008 wiretapping law. It permits eavesdropping without warrants on Americans’ cross-border phone calls and e-mails so long as the surveillance is “targeted” at foreigners abroad.
  • In February, the Supreme Court dismissed a case challenging its constitutionality because the plaintiffs, led by Amnesty International, could not prove they had been wiretapped. Mr. Verrilli had told the justices that someone else would have legal standing to trigger review of the program because prosecutors would notify people facing evidence derived from surveillance under the 2008 law. But it turned out that Mr. Verrilli’s assurances clashed with the practices of national security prosecutors, who had not been alerting such defendants that evidence in their cases had stemmed from wiretapping their conversations without a warrant.
Paul Merrell

Loopholes Exclude Intelligence Contractors Like Snowden From Whistleblower Protections - 0 views

  • Due to carve-outs in federal law, U.S. whistle-blowers who work as contract employees for the intelligence community -- like confessed leaker Edward Snowden -- have virtually no protections.
  • There is a complex anatomy of whistle-blower protections depending on whether an employee works for an intelligence agency and whether he or she is a contractor or an employee of the government. But nowhere is the difference more stark than in the intelligence community, where contractors lack protections afforded to their government employee counterparts. Whistle-blower advocates actually fear that this lack of protections could lead to more leaks. “I would say that there is a gaping loophole for intelligence community contractors,” said Angela Canterbury, director of public policy at the Project on Government Oversight. “The riskiest whistle-blowing that you can possibly do on the government is as an intelligence contractor.”
  • Though whistle-blower advocates have actually won increased protections in recent months, intelligence contractors have repeatedly been left out. Intelligence workers are not covered by the Whistle-blower Protection Act. When Congress passed the Whistle-blower Protection Enhancement Act last fall, at the request of the U.S. House Intelligence Committee, the law’s protections didn’t apply to the intelligence community workers -- both contract and government employees. When Congress added whistle-blower protections specifically for contract employees to the National Defense Reauthorization Act of 2013, intelligence contractors were again excluded. To fill the void, President Obama issued Public Policy Directive (PPD) 19 in October 2012 to extend protections to national security workers. However, his directive made no mention of contractors. Because PPD-19 was initially classified and is actually being implemented in secret, advocates are unsure how strong the protections for government intelligence workers actually are. The directive made no mention of contract workers specifically and Canterbury said she would be “actually shocked and astounded” if the directive were interpreted to apply to contractors.
  • ...1 more annotation...
  • In terms of Snowden's rights, he could have legally raised his concerns with either the office of the intelligence community inspector general or a congressional intelligence committee, but he would have had no protections against any form of retaliation, including losing his job and security clearance. “The ramification [of excluding intelligence contractors] is that a whistle-blower in their right mind would make a public disclosure if they wanted [to bring attention] to wrongdoing because blowing the whistle internally would be very dangerous for their careers,” Canterbury said. “In the case of Snowden, he calculated that his career was over in any case,” Canterbury added. “I’m sure that internal whistle-blowing was not high on the list of ways to get accountability to the issue.
  •  
    So much for the much publicized government propaganda that Snowden should have gone through channels rather than leaking.  
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
« First ‹ Previous 141 - 160 of 163 Next ›
Showing 20 items per page