Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged amendments

Rss Feed Group items tagged

Paul Merrell

Judge sticks by decision to release Guantánamo force-feeding videos | Miami H... - 0 views

  • With some sharp words for the Obama administration, a federal judge on Tuesday declined to second-guess her earlier decision ordering the release of videos of a Guantánamo detainee being force-fed. While acknowledging that more appeals are on the way in the long-running case, U.S. District Judge Gladys Kessler said in her nine-page decision that nothing has happened to change her mind about the videos. She first ordered their release in October 2014.
  • “What the government is really saying is that its classification system trumps the decisions of the federal courts as to the public’s access to official court records,” Kessler wrote. “In other words, the Executive Branch (in this case, the military) purports to be a law unto itself.” 11 hours: the prison camp videos the judge ordered redacted then released, a year ago Kessler added that “the government’s justifications for barring the American public from seeing the videotapes are not sufficiently rational and plausible to justify barring release of the videotapes.” Sixteen media organizations, including the New York Times, Associated Press and McClatchy, have joined in seeking release of the Guantánamo tapes to the public on First Amendment grounds.
Paul Merrell

Europe Is Spying on You - The New York Times - 0 views

  • When Edward Snowden disclosed details of America’s huge surveillance program two years ago, many in Europe thought that the response would be increased transparency and stronger oversight of security services. European countries, however, are moving in the opposite direction. Instead of more public scrutiny, we are getting more snooping. Pushed to respond to the atrocious attacks in Paris and Copenhagen and by the threats posed by the Islamic State to Europe’s internal security, several countries are amending their counterterrorism legislation to grant more intrusive powers to security services, especially in terms of mass electronic surveillance.
  • Governments now argue that to guarantee our security we have to sacrifice some rights. This is a specious argument. By shifting from targeted to mass surveillance, governments risk undermining democracy while pretending to protect it.They are also betraying a long political and judicial tradition affording broad protection to privacy in Europe, where democratic legal systems have evolved to protect individuals from arbitrary interference by the state in their private and family life. The European Court of Human Rights has long upheld the principle that surveillance interferes with the right to privacy. Although the court accepts that the use of confidential information is essential in combating terrorist threats, it has held that the collection, use and storage of such information should be authorized only under exceptional and precise conditions, and must be accompanied by adequate legal safeguards and independent supervision. The court has consistently applied this principle for decades when it was called to judge the conduct of several European countries, which were combating domestic terrorist groups.
  • More recently, as new technologies have offered more avenues to increase surveillance and data collection, the court has reiterated its position in a number of leading cases against several countries, including France, Romania, Russia and Britain, condemned for having infringed the right to private and family life that in the interpretation of the court covers also “the physical and psychological integrity of a person.”
  • ...1 more annotation...
  • Last year, the European Court of Justice set limits on telecommunication data retention. By invalidating a European Union directive for its unnecessary “wide-ranging and particularly serious interference with the fundamental right to respect for private life” and personal data, this court reaffirmed the outstanding place privacy holds in Europe. This judgment echoed a 2006 German Constitutional Court ruling that the German police had breached the individual right to self-determination and human dignity after they conducted a computerized search of suspected terrorists. Regrettably, these judgments are often ignored by key decision-makers. Many of the surveillance policies that have recently been adopted in Europe fail to abide by these legal standards. Worse, many of the new intrusive measures would be applied without any prior judicial review establishing their legality, proportionality or necessity. This gives excessive power to governments and creates a clear risk of arbitrary application and abuse.
Paul Merrell

National security bill opens the door to expanded control orders and secret evidence | ... - 0 views

  • On Thursday, Attorney-General George Brandis introduced a new national security bill into the Senate. This is the fifth tranche of national security legislation to be introduced into parliament since July 2014.
  • This bill includes a host of new measures designed to address the evolving threat posed by terrorism. These include: a new offence of advocacy of genocide; amendments to the control order regime, so it applies to persons 14 years and older, and new measures to monitor controlees; and clarification of the basis for issuing a preventative detention order. But the bill’s most concerning aspect is the proposal to expand the secrecy provisions available to courts in control order proceedings. Keeping national security information secret in court Since 2004, legislation has been in place to deal with information that is likely to prejudice national security in federal court proceedings. This legislation created a special closed hearing procedure to determine whether national security information could be disclosed in court and, if so, in what form. This process regulates disclosure between the parties – that is, who gets to see what.
  • The bill expands this by creating special provisions that allow the court to consider sensitive material that the controlee and legal representative have not seen in proceedings to impose, confirm or vary a control order. It provides that a court can consider all of the information: contained in an original source document in control order proceedings, even where the controlee and their legal representative have been provided with only a redacted or summarised form of the document; contained in an original source document in control order proceedings, even where the controlee and their legal representative have not been provided with any information contained in the original source document; and provided by a witness, even where the information provided by the witness is not disclosed to the controlee or their legal representative. The bill’s effect is to allow secret evidence into control order proceedings.
  • ...1 more annotation...
  • “Secret evidence” is that which is not disclosed to an affected party and their legal representative. It is not new. A successful claim of public interest immunity, for example, results in secret material being excluded from the evidence presented in court. What is new in the anti-terror context is legislation that allows the courts to rely on secret evidence in control order proceedings.
  •  
    Australia, along with the UK, cotinues its steady march to the right on national security matters. The admissibility of secret evidence in judicial proceedings is antithetical to notions of Due Process and a fair trial, as well as to public oversight of judicial proceedings.  
Paul Merrell

Steven Salaita settles lawsuit with Univ. of Illinois | The Electronic Intifada - 0 views

  • Steven Salaita will not be reinstated under the terms of an out of court settlement with the University of Illinois. The deal will pay Salaita $875,000 – about ten times the annual salary he would have received as a tenured professor in the American Indian Studies program at the university’s flagship Urbana-Champaign campus. “This settlement is a vindication for me, but more importantly, it is a victory for academic freedom and the First Amendment,” Salaita said in a release from his legal counsel, the Center for Constitutional Rights and the law firm Loevy & Loevy. The settlement brings an end to Salaita’s breach of contract lawsuit against university trustees and administrators over his August 2014 firing because of his tweets excoriating Israel’s attack on Gaza. Salaita had sought reinstatement as well as financial damages.
  • The university statement said Salaita would receive a lump sum of $600,000, while the remaining amount would cover his legal fees.
  • Salaita’s case became a cause celebre for academic freedom, highlighting the role of pro-Israel donors in pressuring university administrators. Thousands of academics pledged to boycott the university until he was reinstated. The Salaita affair devastated and demoralized the university’s celebrated American Indian Studies program, leading to the departure of several faculty. His firing also earned the University of Illinois a formal censure from the American Association of University Professors for violating academic freedom, a rare rebuke and severe blow to its reputation.
  • ...2 more annotations...
  • Salaita had scored successes in the early phases of his federal lawsuit. In August, US District Judge Harry Leinenweber backed Salaita’s contention that he had a binding contract with the university. Yet there was never a guarantee that even if he won at trial that the court would order his reinstatement. In September, the judge found that university officials had destroyed emails that may have contained key evidence Salaita needed to prove his case. This came after sensational revelations that top officials, including then Chancellor Phyllis Wise, had been using private email accounts to discuss the case and evade disclosure laws. Wise and another official, Provost Ilesanmi Adesida, resigned in disgrace, adding to the disarray at the frequently scandal-plagued state university.
  • In August, Salaita took up a year-long post as Edward W. Said Chair of American Studies at the American University of Beirut.
Paul Merrell

Congress Seeks to undermine Iran Deal by Linking Iran with ISIS | Global Research - Cen... - 0 views

  • One of the consequences of the Iran Deal was the declaration by countless politicians that they were going to crack down on Iran’s sponsorship of terrorism. Even the White House signed on to this idea. Well now some of the backlash has officially begun: Congress is linking Iran with ISIS, even though Iran is fighting ISIS. [and ISIS is supported by the US, GR ed.] Few mainstream publications have picked up on the fact that in a response to the San Bernardino killings, the Congress last week passed legislation, which the president duly signed, that puts Iran in an axis of international-terrorist evil along with Syria, Iraq and Sudan. The legislation amends our country’s visa waiver program. Iranian dual nationals, as well as US citizens who have visited Iran, will need visas to get into the U.S. Reuters: Iranian Foreign Minister Mohammad Javad Zarif on Friday said it was “absurd” that Tehran should be included on the list. “No Iranian nor anybody who visited Iran had anything to do with the tragedies that have taken place in Paris or in San Bernardino or anywhere else,” he said in an interview with Middle East-focused website Al Monitor. Secretary of State John Kerry promptly met with Zarif, his Iranian counterpart, to assure him that the new law doesn’t undercut the Iran deal. But the Iranians say that the legislation is the result of pro-Israel lobbying. And even the State Department describes Iran as a state sponsor of terrorism.  
  •  Iranians say the bill reflects pro-Israel lobbying. Reuters: Iran said on Monday that Israeli lobbying was behind a new measure passed by the U.S. Congress that will prevent visa-free travel to the United States for people who have visited Iran or hold Iranian nationality. The measure, which President Barack Obama signed into law on Friday, also applies to Iraq, Syria and Sudan, and was introduced as a security measure after the Islamic State attacks in Paris and a similar attack in San Bernardino, California.
  • More from Reuters‘ description of the Israel lobby angle: Iran, a Shi’ite Muslim theocracy staunchly opposed to Sunni radicalism espoused by groups like Islamic State, says its inclusion on the list is intended to undermine a deal on its nuclear programme that Tehran reached with world powers, including the United States, in July, known as the JCPOA. Iranian Foreign Ministry spokesman Hossein Jaberi Ansari said in a televised news conference that the U.S. measure had been passed “under pressure from the Zionist lobby and currents opposed to the JCPOA”. The administration wants to have it both ways on blaming Iran. Yesterday on National Public Radio, Adam Szubin, the counter-terrorism finance under secretary at the Treasury Department, also put Iran in the category of ISIS, as an international terror deliverer: if you are familiar with the model of how al-Qaida or groups like Hamas and even Hezbollah have financed themselves, they’ve typically been heavily reliant on foreign donations, whether from state sponsors like Iran or whether from wealthy what we call deep-pocket donors, often in the Gulf. But that financing model is not ISIL. When you have a group that’s raising hundreds of millions of dollars in a year from internal sources, we don’t have those same chokepoints to go after in terms of the foreign flows.
  • ...2 more annotations...
  • Meanwhile John Kerry is doing fancy footwork, explaining the legislation away, in a letter to Javad Zarif. we remain fully committed to the sanctions lifting provided for under the JCPOA. We will adhere to the full measure of our commitments, per the agreement. At the State Department briefing Monday, reporters questioned why the legislation didn’t amount to a violation of the Iran Deal:
  • Here is some more blindness in the media on these issues. NPR has continually deceived listeners about Sheldon Adelson’s agenda, and it did so again yesterday. Adelson is a leading opponent of the Iran Deal, as a supporter of Israel. He has called on President Obama to nuke Iran. But in a report on Adelson’s purchase of a Nevada newspaper, NPR once again leaves out the Israel angle of Adelson’s interests. It says blandly: Adelson is also prominently involved in national politics. That link is to a story about his on-line gambling concerns. But as Cory Bennett of the Hill said on CSPAN the other day– something I did not know till now– Iran is said to have undertaken a cyber-attack on Sheldon Adelson’s casino last year because of his call to nuke Iran.  The alleged cyber-attack:  Investigators determined that hacker activists were the ones who broke into servers belonging to the Las Vegas Sands Corporation in February 2014, costing the company more than $40 million in damages and data recovery costs, Bloomberg Businessweek reported Thusday citing a report by cybersecurity firm Dell SecureWorks. The hackers were acting in retaliation to the company’s CEO, casino magnate Sheldon Adelson’s statement that Obama should detonate a nuclear bomb in Tehran, which stirred controversy around the world. This is the battle behind the headlines. And in a transparent effort to get Adelson’s backing, as well as that of the Andrew Herenstein’s of the world, the neoconservative favorite in the Republican race, Senator Marco Rubio, has vowed to tear up the Iran deal on his first day in the White House if he’s elected. Thus the ideological war over how much the U.S. should support Israel is playing out in global terms; and our media are shying away from the story.
  •  
    It's preposterous for Congress to say that Iran is associated with ISIL and for Obama to sign such a bill. Iran is one of the major military forces in the fight against ISIL in both Syria and Iraq.
Gary Edwards

Just 62 people control more wealth than half the world's population: study - CSMonitor.com - 1 views

  • Oxfam argues that there are several reasons for why the disparity between rich and poor has become so vast, including what the report terms “the global spider’s web of tax havens and the industry of tax avoidance, which has blossomed over recent decades.”Oxfam estimates that nearly $7.6 trillion, or more than twice the combined GDP of the United Kingdom and Germany, is currently being held offshore.
  • The Oxfam study also suggests that the global economy’s push on the importance of capital over labor is another reason for widening inequality. This not only concentrates national incomes in the hands of those few that control it, Oxfam says, but has implications for private companies as well. It increases pay for executives while preventing many workers in the very lowest-paying jobs at the bottom from earning higher wages.
  •  
    "A recent study conducted by Oxfam International indicates that just 62 people, 53 of them men, now control over half the world's wealth. The study, 'An Economy for the 1 Percent,' was released ahead of the World Economic Forum (WEF) in Davos, Switzerland. The study from the anti-poverty NGO calculated that 62 people held the same amount of wealth as the world's 3.6 billion poorest citizens in 2015.  That's a huge drop from the estimated 388 people who controlled that amount of wealth in 2010, and the concentrated amount of wealth that those 62 people possess has increased by 44 percent over that same five-year period, to $1.76 trillion dollars. It is true that global poverty has declined substantially since 1990, according to Oxfam. However, the study found that at the same time that global wealth rose dramatically among the world's richest 1 percent, the relative wealth of those living in extreme poverty has declined dramatically since 2010, by approximately $1 trillion."
  •  
    The divide between the haves and the have-nots has been deepening for decades and is well known. This year, the topic has become part of presidential election politics thanks to Bernie Sanders. But while the situation has no public defenders, we have yet to see a single piece of legislation submitted to remedy the situation. That leaves the situation as a talking point rather than the focus of remedial action, which leads to the conclusion that those who talk about it don't care enough about it to do anything to reverse the situation. Example, since the financial crash of 2007 we have no bill to reintroduce Glass\Seagall, no bill to break up the too-big-to-fail banks (which are no bigger than before), no bill to back the U.S. out of the trade agreements that have shipped millions of American jobs overseas, no bill to increase taxes for the wealthy, etc. Instead, we see a majority of members of Congreess voting to maintain the status quo, which is that the rich get richer and the poor get poorer. The cure? Step 1 is adoption of the We the People Amendment to get corporations and money out of the election process. https://movetoamend.org/wethepeopleamendment
Paul Merrell

Two Republican Congressmen Introduce Bill to 'Draft Our Daughters' | Military.com - 0 views

  • Two House Republicans -- both opponents of opening up combat roles to women -- introduced a bill Thursday called "Draft America's Daughters Act of 2016," which would require women to register for the draft. The bill was offered by Rep. Duncan Hunter, a Republican from California and former Marine, and co-sponsored by Rep. Ryan Zinke, a Republican from Montana and former Navy SEAL. It would "amend the Military Selective Service Act to extend the registration and conscription requirements of the Selective Service System, currently applicable only to men between the ages of 18 and 26, to women between those ages to reflect the opening of combat arms Military Occupational Specialties to women," according to copy of the text. Hunter, a Major in the Marine reserves and a veteran of Iraq and Afghanistan, and Zinke, a retired Navy SEAL Commander who served in Iraq, were both likely to vote against their own bill but argued that a debate in Congress was necessary on lifting the combat exclusion rule for women.
  •  
    My preferred alternative is to abolish conscription, which is an affront to the Bill of Rights. 
Paul Merrell

Bank Sued Over Cartel Money Laundering - WhoWhatWhy - 0 views

  • While bankers can probably get their highs any number of ways, the Mexican drug cartels need financial institutions to clean their dirty money. And, it seems, there is no better bank for that than London-based HSBC, which is one of the world’s largest. In the first six months of last year, it reported a pre-tax profit of $13.6 billion.According to a lawsuit filed against HSBC earlier this month, it earned some of those profits by allowing the drug cartels to cycle billions of dollars through it.“From 2004 through at least 2008, HSBC Mexico accepted over $16.1 billion in cash deposits from customers throughout Mexico. This amount eclipsed the amount of USD cash deposits at financial institutions with market shares multiple times greater than HSBC Mexico’s,” the lawsuit alleges.
  • HSBC is no stranger to accusations of helping the cartels. In 2012, the bank paid $1.9 billion as part of an agreement with the United States and admitted that it had failed to establish an effective anti-money laundering (AML) program. In spite of having to pay such a massive penalty, no HSBC employees went to jail.
  • Even though the new lawsuit addresses an old problem, the legal action is unique for several reasons. It was brought on behalf of the families of several Americans killed by the Mexican cartels. The action seeks redress under a 1996 law (amended following the 9/11 attacks) that allows victims of terrorism to seek compensation from any organization that supported the perpetrators of such crimes.
  • ...2 more annotations...
  • This is the first attempt to apply the 1996 anti-terrorism law to the actions of the Mexican drug cartels. “The gruesome attacks on the innocent American victims on foreign soil were unquestionably acts of international terrorism,” said attorney Richard M. Elias, who represents the families.The lawsuit asserts that cartels now function as “paramilitary organizations” and have become one of the top threats to US national security.
  • The suit alleges that HSBC’s actions, or inactions, amounted to knowingly providing“continuous and systematic material support to the cartels and their acts of terrorism by laundering billions of dollars for them. As a proximate result of HSBC’s material support to the Mexican drug cartels, numerous lives, including those of the plaintiffs, have been destroyed.”
  •  
    Sounds like a fun case.
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Paul Merrell

A Secret Catalogue of Government Gear for Spying on Your Cellphone - 0 views

  • HE INTERCEPT HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States. The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before.
  • The Intercept obtained the catalogue from a source within the intelligence community concerned about the militarization of domestic law enforcement. (The original is here.) A few of the devices can house a “target list” of as many as 10,000 unique phone identifiers. Most can be used to geolocate people, but the documents indicate that some have more advanced capabilities, like eavesdropping on calls and spying on SMS messages. Two systems, apparently designed for use on captured phones, are touted as having the ability to extract media files, address books, and notes, and one can retrieve deleted text messages. Above all, the catalogue represents a trove of details on surveillance devices developed for military and intelligence purposes but increasingly used by law enforcement agencies to spy on people and convict them of crimes. The mass shooting earlier this month in San Bernardino, California, which President Barack Obama has called “an act of terrorism,” prompted calls for state and local police forces to beef up their counterterrorism capabilities, a process that has historically involved adapting military technologies to civilian use. Meanwhile, civil liberties advocates and others are increasingly alarmed about how cellphone surveillance devices are used domestically and have called for a more open and informed debate about the trade-off between security and privacy — despite a virtual blackout by the federal government on any information about the specific capabilities of the gear.
  • ANY OF THE DEVICES in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&T, and T-Mobile. When someone’s phone connects to the spoofed network, it transmits a unique identification code and, through the characteristics of its radio signals when they reach the receiver, information about the phone’s location. There are also indications that cell-site simulators may be able to monitor calls and text messages. In the catalogue, each device is listed with guidelines about how its use must be approved; the answer is usually via the “Ground Force Commander” or under one of two titles in the U.S. code governing military and intelligence operations, including covert action.
  • ...2 more annotations...
  • “We’ve seen a trend in the years since 9/11 to bring sophisticated surveillance technologies that were originally designed for military use — like Stingrays or drones or biometrics — back home to the United States,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, which has waged a legal battle challenging the use of cellphone surveillance devices domestically. “But using these technologies for domestic law enforcement purposes raises a host of issues that are different from a military context.”
  • But domestically the devices have been used in a way that violates the constitutional rights of citizens, including the Fourth Amendment prohibition on illegal search and seizure, critics like Lynch say. They have regularly been used without warrants, or with warrants that critics call overly broad. Judges and civil liberties groups alike have complained that the devices are used without full disclosure of how they work, even within court proceedings.
Paul Merrell

Korematsu's Demise? | Just Security - 0 views

  • There’s a lot that’s remarkable about last Tuesday’s Third Circuit decision in Hassan v. City of New York, which Faiza Patel cogently summarized in her post last week. In a nutshell, Hassan involves a challenge to secret intelligence operations carried out by the New York Police Department (NYPD) over the years since September 11 that allegedly targets Muslim communities “based on the false and stigmatizing premise that Muslim religious identity ‘is a permissible proxy for criminality, and that Muslim individuals, businesses, and institutions can therefore be subject to pervasive surveillance not visited upon individuals, businesses, and institutions of any other religious faith or the public at large.'” The district court had tersely granted the City’s motion to dismiss both because it concluded the plaintiffs lacked standing and because, in the alternative, it held that the plaintiffs had failed to overcome the pleading burden articulated by the Supreme Court in Iqbal. But the Third Circuit reversed on both fronts, holding that the plaintiffs’ allegations, if true, were more than enough to establish both that they had suffered an injury in fact sufficient to satisfy Article III standing, and that their equal protection and First Amendment claims were sufficiently plausible to satisfy Iqbal. To be sure, the Third Circuit’s decision is interlocutory — coming at a very preliminary stage in the litigation. But what I want to suggest in the post that follows is that, as much as any other post-September 11 judicial decision, Hassan represents the full-throated repudiation of the Supreme Court’s infamous World War II-era ruling in Korematsu v. United States that has been so long in coming — and so thoroughly overdue.
  • As I’ve written about before, Korematsu reflects two separate — but equally important — constitutional failures. The first failure was the internment policy itself, which we now know (and which the US government knew at the time) to have been a completely unnecessary — if not hysterical — overreaction to hyperbolic and (after Midway, at least) categorically overstated fears of a Japanese invasion of the West Coast. By itself, the camps were a dark stain on the history of civil liberties in the United States — albeit one of many, alas. But the second failure was, historically, the far more significant and unique one — the Supreme Court’s conscious constitutional rationalization of the internment policy, based upon a combination of naïveté on the Justices’ part and the affirmatively misleading (if not downright disingenuous) briefing by the federal government. As Justice Robert H. Jackson understood — and forcefully articulated — in his Korematsu dissent, the real violence to the “rule of law” resulting from the camps was thus not the underlying policy, but rather its validation by the Supreme Court. In his words, “a military commander may overstep the bounds of constitutionality, and it is an incident. But if we review and approve, that passing incident becomes the doctrine of the Constitution.”
  • But we’ve struggled somewhat with the second constitutional failure. The courts have repudiated Korematsu’s conviction; the Office of the Solicitor General has confessed error for its role in perpetuating the government’s misleading case before the Supreme Court; and scholars have suggested that Korematsu itself has become part of the “anti-canon” — the class of Supreme Court decisions so reviled that they are cited, if at all, in support of the wrongness of their holdings. But Korematsu itself remains on the books, as do broader concerns that courts are still vulnerable to Korematsu — style reasoning, i.e., that the need to protect national security might provide legal justification for government conduct that would otherwise be unjustifiable. Indeed, one need look no further than the ongoing debate over the SSCI’s torture report for evidence of the Korematsu mentality being alive and well.
  • ...2 more annotations...
  • That’s why I find the Third Circuit’s analysis in Hassan so significant — not because it allows this particular civil suit to go forward, but because it does so based upon an explicit (and conscious) rejection of Korematsu — style legal reasoning. As Judge Ambro explains, “No matter how tempting it might be to do otherwise, we must apply the same rigorous standards even where national security is at stake. We have learned from experience that it is often where the asserted interest appears most compelling that we must be most vigilant in protecting constitutional rights.” And applying the strict judicial scrutiny that is triggered by government action deemed to be intentionally discriminatory on the basis of religious affiliation, the court proceeds to hold that the NYPD lacked a sufficiently compelling justification for such discriminatory treatment, because even if abstract claims of security necessity could be a compelling government interest, the NYPD’s alleged policy was far too overbroad to survive the narrow tailoring required by strict scrutiny. Thus, quoting directly from Justice Jackson’s Korematsu dissent, Judge Ambro closed his opinion by noting that “Our job is judicial. We ‘can apply only law, and must abide by the Constitution, or [we] cease to be civil courts and become instruments of [police] policy.'”
  • Faiza’s post provides far more detail on the specifics of the Third Circuit’s analysis, and the opinion itself is worth a read. For present purposes, though, it’s this mentality that I find so refreshing — that even when the government invokes the specter of September 11 and the need to prevent future acts of terrorism, courts will not abdicate their responsibility to scrutinize the government’s justifications with care, and to be especially wary of overbroad government programs carried out under the broad guise of “necessity.” Hassan certainly isn’t the first example of this kind of principled judicial decisionmaking in a post-September 11 counterterrorism suit, but it is the one that, at least in my view, most directly confronts — and rejects — the kind of deferential judicial review that was responsible for the second constitutional failure in Korematsu, and all of the pain that followed.
Gary Edwards

Does Trump Trump? Angelo Codevilla on Our Present Moment | Power Line - 1 views

  • Angelo Codevilla is a former staff member of the Senate Intelligence Committee, professor emeritus of international relations at Boston University, and the author of more than a dozen fine books on politics, arms control, and intelligence (if I had to pick a favorite it might be The Character of Nations), including a fine translation of Machiavelli’s Prince published by Yale University Press. Most recently his essay-turned-book The Ruling Class: How They Corrupted America and What We Can Do About It caught the attention of Rush Limbaugh and many others. It argues that our fundamental political problem is not “big government,” but the creation of a ruling class, inhabiting both parties, that is steadily increasing its authoritarian control over the nation. In a conversation a few months ago Angelo remarked, “The 2016 election is simple; the person who runs on the platform ‘Who do they think they are?’ will win.”
  • Donald Trump leapt atop other contenders for the Republican presidential nomination when he acted on the primordial fact in American public life today, from which most of the others hide their eyes, namely: most Americans distrust, fear, are sick and tired of, the elected, appointed, and bureaucratic officials who rule over us, as well as their cronies in the corporate, media, and academic world.
  • Trump’s attraction lies less in his words’ grace or even precision than in the extent to which Americans are searching for someone, anyone, to lead against this ruling class, that is making America less prosperous, less free, and more dangerous.
  • ...5 more annotations...
  • three fifths of Democratic voters approve the conduct of their officials, only about one fifth of Republican voters approve what theirs do.
  • Moreover, Americans are becoming increasingly skeptical about their celebrities’ integrity. With good reason. McCain is just a minor example of a phenomenon that characterizes our ruling class: reputations built on lies and cover-ups, lives of myth protected by mutual forbearance, by complicitous journalists, or by records deep-sixed, including in in government archives.
  • As they lord it over us, they live lives that cannot stand scrutiny.
  • The point here is simple: our ruling class has succeeded in ruling not by reason or persuasion, never mind integrity, but by occupying society’s commanding heights, by imposing itself and its ever-changing appetites on the rest of us. It has coopted or intimidated potential opponents by denying the legitimacy of opposition. Donald Trump, haplessness and clownishness notwithstanding, has shown how easily this regime may be threatened just by refusing to be intimidated.
  • At increasing speed, our ruling class has created “protected classes” of Americans defined by race, sex, age, disability, origin, religion, and now homosexuality, whose members have privileges that outsider do not. By so doing, they have shattered the principle of equality – the bedrock of the rule of law. Ruling class insiders use these officious classifications to harass their socio-political opponents. An unintimidated statesman would ask: Why should not all “classes” be equally protected? Does the rule of law even admit of “classes”? Does not the 14th amendment promise “the equal protection of the laws” to all alike? He would note that when the government sets aside written law in favor of what the powerful want, it thereby absolves citizens any obligation to obey government.
  •  
    "Does Trump trump? By Angelo M. Codevilla "In the land of the blind," so goes the saying, "the one-eyed man is king." Donald Trump leapt atop other contenders for the Republican presidential nomination when he acted on the primordial fact in American public life today, from which most of the others hide their eyes, namely: most Americans distrust, fear, are sick and tired of, the elected, appointed, and bureaucratic officials who rule over us, as well as their cronies in the corporate, media, and academic world. Trump's attraction lies less in his words' grace or even precision than in the extent to which Americans are searching for someone, anyone, to lead against this ruling class, that is making America less prosperous, less free, and more dangerous. Trump's rise reminds this class's members that they sit atop a rumbling volcano of rejection. Republicans and Democrats hope to exorcise its explosion by telling the public that Trump's remarks on immigration and on the character of fellow member John McCain (without bothering to try showing that he errs on substance), place him outside the boundaries of their polite society. Thus do they throw Br'er Rabbit into the proverbial briar patch. Now what? The continued rise in Trump's poll numbers reminds all that Ross Perot - in an era that was far more tolerant of the Establishment than is ours - outdistanced both Bush 41 and Bill Clinton before self-destructing, just by speaking ill of both parties before he self destructed. Republicans brahmins have the greater reason to fear. Whereas some three fifths of Democratic voters approve the conduct of their officials, only about one fifth of Republican voters approve what theirs do. If Americans in general are primed for revolt, Republican (and independent) voters fairly thirst for it. Trump's barest hints about what he opposes (never mind proposes) regarding just a few items on the public agenda have had such effect because they accord with
Paul Merrell

Dennis Kucinich: New WikiLeaks reveal proof we are sliding down the slippery slope towa... - 0 views

  • The U.S. government must get a grip on the massive opening that the CIA, through its misfeasance, nonfeasance and malfeasance, has created. If Tuesday’s WikiLeaks document dump is authentic, as it appears to be, then the agency left open electronic gateways that make all Americans vulnerable to spying, eavesdropping and technological manipulation that could bring genuine harm. That the CIA has reached into the lives of all Americans through its wholesale gathering of the nation’s “haystack” of information has already been reported. It is bad enough that the government spies on its own people. It is equally bad that the CIA, through its incompetence, has opened the cyberdoor to anyone with the technological skills and connections to spy on anyone else. The constant erosion of privacy at the hands of the government and corporations has annihilated the concept of a “right to privacy,” which is embedded in the rationale of the First, Third, Fourth, Ninth and Fourteenth Amendments to the U.S. Constitution. It is becoming increasingly clear that we are sliding down the slippery slope toward totalitarianism, where private lives do not exist.
  • We have entered a condition of constitutional crisis that requires a full-throated response from the American people. I have repeatedly warned about the dangers of the Patriot Act and its successive iterations, the execrable national security letters that turn every FBI agent into a star chamberlain, the dangers of fear-based security policies eroding our republic. We have crossed the threshold of a cowardly new world, and it’s time we tell the government and the corporations who have intruded to stop it. 
Paul Merrell

Democrats Now Demonize the Same Russia Policies that Obama Long Championed - 0 views

  • One of the most bizarre aspects of the all-consuming Russia frenzy is the Democrats’ fixation on changes to the RNC platform concerning U.S. arming of Ukraine. The controversy began in July when the Washington Post reported that “the Trump campaign worked behind the scenes last week to make sure the new Republican platform won’t call for giving weapons to Ukraine to fight Russian and rebel forces.” Ever since then, Democrats have used this language change as evidence that Trump and his key advisers have sinister connections to Russians and corruptly do their bidding at the expense of American interests. Democratic Senator Ben Cardin, the ranking member of the Senate Foreign Relations Committee, spoke for many in his party when he lambasted the RNC change in a July letter to the New York Times, castigating it as “dangerous thinking” that shows Trump is controlled, or at least manipulated, by the Kremlin. Democrats resurrected this line of attack this weekend when Trump advisers acknowledged that campaign officials were behind the platform change. This attempt to equate Trump’s opposition to arming Ukraine with some sort of treasonous allegiance to Putin masks a rather critical fact: namely, that the refusal to arm Ukraine with lethal weapons was one of Barack Obama’s most steadfastly held policies. The original Post article that reported the RNC platform change noted this explicitly:
Paul Merrell

The Still-Missing Evidence of Russia-gate - Consortiumnews - 0 views

  • A changing-places moment brought about by Russia-gate is that liberals who are usually more skeptical of U.S. intelligence agencies, especially their evidence-free claims, now question the patriotism of Americans who insist that the intelligence community supply proof to support the dangerous claims about Russian ‘hacking” of Democratic emails especially when some  veteran U.S. government experts say the data would be easily available if the Russians indeed were guilty. One of those experts is William Binney, a former high-level National Security Agency intelligence official who, after his 2001 retirement, blew the whistle on the extraordinary breadth of NSA surveillance programs. His outspoken criticism of the NSA during the George W. Bush administration made him the subject of FBI investigations that included a raid on his home in 2007. Even before Edward Snowden’s NSA whistleblowing, Binney publicly revealed that NSA had access to telecommunications companies’ domestic and international billing records, and that since 9/11 the agency has intercepted some 15 trillion to 20 trillion communications. Snowden has said: “I have tremendous respect for Binney, who did everything he could according to the rules.”
  • I spoke to Binney on Dec. 28 about Russia-gate and a host of topics having to do with spying and America’s expanding national security state.
  • Bernstein: Your expertise was in the Soviet Union and so you must know a lot about bugging.  Do you believe that Russia hacked and undermined our last election?  Can Trump thank Russia for the result? Binney:  We at Veteran Intelligence Professionals for Sanity (VIPS) published an article on this in July.  First of all, if any of the data went anywhere across the fiber optic world, the NSA would know.  Just inside the United States, the NSA has over a hundred tap points on the fiber lines, taking in everything.    Mark Klein exposed some of this at the AT&T facility in San Francisco. This is not for foreigners, by the way, this is for targeting US citizens.  If they wanted only foreigners, all they would have to do was look at the transatlantic cables where they surface on the coast of the United States.  But they are not there, they are distributed among the US population. Bernstein: So if, in fact, the Russians were tapping into DNC headquarters, the NSA would absolutely know about it. Binney: Yes, and they would also have trace routes on where they went specifically, in Russia or anywhere else.  If you remember, about three or four years ago, the Chinese hacked into somewhere in the United States and our government came out and confirmed that it was the Chinese who did it, and it came from a specific military facility in Shanghai.  The NSA had these trace route programs embedded by the hundreds across the US and all around the world.
  • ...3 more annotations...
  • The other data that came out from Guccifer 2.0, a download from the DNC, has been a charade.  It was a download and not a transfer across the Web.  The Web won’t manage such a high speed.  It could not have gotten across the Atlantic at that high speed.  You would have to have high capacity lines dedicated to that in order to do it. They have been playing games with us.  There is no factual evidence to back up any charge of hacking here. Bernstein: So was this a leak by somebody at Democratic headquarters? Binney: We don’t know that for sure, either.  All we know was that it was a local download.  We can likely attribute it to a USB device that was physically passed along.
  • Right now, our government is violating the first, fourth and fifth amendments in various ways.  Mueller did it, Comey did it, they were all involved in violating the Constitution.
  • Bernstein:  There seems to be a new McCarthyite operation around the Russia-gate investigation.  It appears that it is an attempt to justify the idea that Clinton lost because the Russians undermined the election. Binney: I have seen no evidence at all from anybody, including the intelligence community.  If you look at the Intelligence Community Assessment (ICA) report, they state on the first page that “We have high confidence that the Russians did this.”  But when you get toward the end of the report, they basically confess that “our judgment does not imply that we have evidence to back it up.” Bernstein:  It was initially put out that seventeen intelligence agencies found compelling evidence that the Russians hacked into our election.  You’re saying it was actually selected individuals from just three agencies.  Is there anything to the revelations that FBI agents talked about taking action to prevent Trump from becoming president? Binney: It certainly does seem that it is leaning that way, that is was all a frame-up.  It is a sad time in our history, to see the government working against itself internally. Bernstein:  I take it you are not a big supporter of Trump. Binney:  Well, I voted for him.  I couldn’t vote for a warmonger like Clinton.  She wanted to see our planes shooting down Russian planes in Syria.  She advocated for destabilizing Libya, for getting rid of Assad in Syria, she was a strong backer of the war in Iraq.
« First ‹ Previous 421 - 435 of 435
Showing 20 items per page