Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged bad-cops

Rss Feed Group items tagged

Paul Merrell

Cops And Second Chances In America | Popehat - 0 views

  • Officer Rush's arguments were ultimately rejected: Karla Rush, an officer based in East Oakland, faced especially severe charges. Of the 40 search warrants she had filed between March of 2007 and August 2008, 39 were fraudulent. Rush claimed that her misconduct was the result of poor training, but an arbitrator rejected her assertion, saying, "telling the truth is not a matter of training," according to court documents.
  • But isn't this America? Isn't Karla Rush an American? Isn't America a place where people like Carlos Danger get second chances? Yes. Yes it is. So Karla Rush — fired for multiple fraudulent search warrant applications — is employed as a law enforcement officer again. Maybe this isn't a shock to you. The criminal justice system decides to rely upon (and often conceal the misconduct of) dirty cops all the time. Just look at cops like Armando Saldate, Jr. in Arizona. Karla Rush probably got re-hired by some ultra-conservative small town department in some red state, right?
  • Yep. That's right. UC Berkeley — the hobgoblin of conservatives, the famously nutty liberal enclave — re-hired a police officer fired for filing fraudulent search warrants. After all, what's important in hiring a police officer?
  • ...1 more annotation...
  • Now, citizen, if you're concerned that misconduct is too easily forgiven and ignored in our society, take heart: the vast majority of people who get in serious trouble experience life-altering consequences that prevents them from ever getting similar jobs again, even after any draconian criminal sentences. Felony convictions, for instance, reliably keep people out of most positions of responsibility, not to mention housing, loans, youth activities, etc. So don't worry: the class of people who can commit grave misconduct with few long-term consequences is usually limited to law enforcement and, you know, banks and stuff. We want to be safe, right? So why should it bother us that, even in hotbeds of "liberalism," law enforcement misconduct generates little more than a shrug? Why should we be concerned that the "left" — once reliably protective of the rights of the accused — is now often a mouthpiece for "law and order" and contemptuous of the rights of the accused?
  •  
    The author, Ken White, is a former U.S. Dept. of Justice criminal prosecutor, a Libertarian, but he plays no favorites; he's also a civil libertarian and a leader in protection of First Amendment rights. He's one of my favorite bloggers. He has a real gift for sarcasm, which shines all over this gem. Well worth the read; this is a shining example of exemplary writing.
Gary Edwards

Obama Goes All Out For Dirty Banker Deal | Rolling Stone Politics | Taibblog | Matt Tai... - 0 views

  •  
    This is as bad as white-collar crime gets. But to Wylde, it doesn't rise to the level of being "indefensible." Until they do something worse than this, we apparently should support the banks, and make sure they don't have to pay more than a fraction of what they made off of this kind of crime. What is most amazing about Wylde's quote is the clear implication that even a law enforcement official like Schneiderman should view it as his job to "do everything we can to support" Wall Street. That would be astonishing interpretation of what a prosecutor's duties are, were it not for the fact that 49 other Attorneys General apparently agree with her. In Schneiderman we have at least one honest investigator who doesn't agree, which is to his great credit. But everyone else is on Wylde's side now. The Times story claims that HUD Secretary Shaun Donovan and various Justice Department officials have been leaning on the New York AG to cave, which tells you that reining in this last rogue cop is now an urgent priority for Barack Obama. Why? My theory is that the Obama administration is trying to secure its 2012 campaign war chest with this settlement deal. If he can make this foreclosure thing go away for the banks, you can bet he'll win the contributions battle against the Republicans next summer. Which is good for him, I guess, but it seems to me that it might be time to wonder if is this the most disappointing president we've ever had.
Paul Merrell

Asia Times Online :: NATO attacks! - 0 views

  • You don't need to be a neo-Foucault hooked on Orwellian/Panopticon practices to admire the hyper-democratic "ring of steel" crossing average roads, parks and even ringing castle walls to "protect" dozens of NATO heads of state and ministers, 10,000 supporting characters and 2,000 journalists from the real world in Newport, Wales - and beyond. NATO's summit in Wales also provides outgoing secretary-general Anders "Fogh of War" Rasmussen the chance to display his full <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> attack dog repertoire. It's as if he's auditioning for a starring role in a remake of Tim Burton's epic Mars Attacks!
  • Fogh of War is all over the place, talking "pre-positioning of supplies, equipment" - euphemism for weapons; boosting bases and headquarters in host countries; and touting a 10,000-strong, rapid reaction "spearhead" force to respond to Russian "aggression" and deployable in a maximum of five days. Meanwhile, in a bad cop-bad cop routine, outgoing president of the European Commission, outstanding mediocrity Jose Manuel Barroso, leaked that Russian President Vladimir Putin told him over the phone later last week he could take Kiev in a fortnight if he wanted. Well, Putin could. If he wanted. But he doesn't want it. What matters is what he told Rossiya state TV; that Kiev should promote inclusive talks about the future statute of Eastern Ukraine. Once again, the Western spin was that he was advocating the birth of a Novorossiya state. Here, The Saker analyzes in detail the implications of what Russia really wants, and what the Novorossiya forces really want.
  • NATO somehow is already in Ukraine. A NATO cyber center group has been in Kiev since March, operating in the building of the Council of National Security and Defense. So it is a bunch of NATO bureaucrats who actually determine the news agenda in Ukraine - and the non-stop demonization of all things Russia. Ukraine is all about Germany now. Berlin wants a political solution. Fast. Berlin wants Russian gas flowing via Ukraine again. Fast. Berlin does not want US missile defense in Eastern Europe - no matter what the Baltic states scream. That's why Poroshenko's latest "Invasion! Invasion! Invasion!" craze is nothing but pure desperation by a lowly, bankrupt vassal of the Empire of Chaos. Of course that does not prevent Fogh of War - who got the NATO job because he was an enthusiastic cheerleader of the rape of Iraq - to keep crying "Invasion!" till all Danish retrievers come home.
  • ...2 more annotations...
  • And then there's NATO's recent record. An ignominious defeat in Afghanistan. A "humanitarian" bombing that reduced once-stable Libya to a miserable failed state immersed in total anarchy and ravaged by rabid militias. Not exactly fabulous PR for NATO's future as a coalition assembly line with global "vocation", capable of pulling off expeditionary wars all around the world by creating the appearance of a military and political consensus unified by - what else - an Empire of Chaos doctrine: NATO's "strategic concept" approved at the 2010 Lisbon summit. (See US a kid in a NATO candy store, Asia Times Online, November 25, 2010.) Since those go-go "Bubba" Clinton years; through the "pre-emptive" Dubya era; and now under the R2P dementia of Obama's warring Medusas (Rice, Power, Hillary), the Pentagon dreams of NATO as global Robocop, dominating all the roles embodied by the UN and the EU in terms of security. This has absolutely nothing to do with the original collective defense of NATO signatories against possible territorial attacks. Oh, sorry; we forgot the attacks by those (non-existent) nuclear missiles deployed by evil Iran.
  • The Ukraine battleground at least has the merit of showing the alliance is naked. For the Full Spectrum Dominance Pentagon, what really matters above all is something that's been actually happening since the fall of the Soviet Union; unlimited NATO expansion to the westernmost borders of Russia. The real deal this September is not NATO. It's the SCO's summit. Expect the proverbial tectonic shifts of geopolitical plaques in the upcoming meeting of the Shanghai Cooperation Organization - a shift as far-reaching as when the Ottoman empire failed at the gates of Vienna in 1683. On the initiative of Russia and China, at the SCO summit, India, Pakistan, Iran and Mongolia will be invited to become permanent members. Once again, the battle lines are drawn. NATO vs SCO. NATO vs BRICS. NATO vs Global South. Therefore, NATO attacks!
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

As Iran Nuclear Deadline Looms, France Holding Out | Al Jazeera America - 0 views

  • With the deadline for a historic deal on Iran’s nuclear program fast approaching, analysts have begun to speculate whether the wild card after months of delicate diplomacy may not, in fact, be the usual suspects: hard-liners in Tehran, hawks on Capitol Hill or Israel's Prime Minister Benjamin Netanyahu, who has been on an eleventh-hour push to thwart the deal. Instead, they say, all eyes are on Europe's "bad cop" on Iran: France.
1 - 6 of 6
Showing 20 items per page