Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged border-searches

Rss Feed Group items tagged

Paul Merrell

Senator Aims to End Phone Searches at Airports and Borders | Mother Jones - 0 views

  • More than a month after Sen. Ron Wyden (D-Ore.) requested information about US Customs and Border Protection's practice of searching cell phones at US borders and airports, he's still waiting for answers—but he's not waiting to introduce legislation to end the practice. "It's very concerning that [the Department of Homeland Security] hasn't managed to answer my questions about the number of digital searches at the border, five weeks after I requested that basic information," Wyden, a leading congressional advocate for civil liberties and privacy, told Mother Jones on Tuesday through a spokesman. "If CBP were to undertake a system of indiscriminate digital searches, that would distract CBP from its core mission, dragging time and attention away from catching the bad guys." Wyden's request to DHS and CBP came on the heels of a February 18 report from the Associated Press of a "fivefold increase" in electronic media searches in fiscal year 2016 over the previous year, from fewer than 5,000 to nearly 24,000. It also followed Homeland Security Secretary John Kelly's suggestion that visitors from a select group of countries, mainly Muslim, might be required to hand over passwords to their social media accounts as a condition of entry. (That comment came a week after President Donald Trump first unveiled his executive order⁠ banning travel from seven majority-Muslim countries.) The Knight First Amendment Institute, which advocates for freedom of speech, sued DHS on Monday for records relating to the seizure of electronic devices at border checkpoints. Wyden requested similar data on CBP device searches and demands for travelers' passwords. "There are well-established legal rules governing how law enforcement agencies may obtain data from social media companies and email providers," Wyden wrote in the February 20 letter to DHS and CBP. "By requesting a traveler's credentials and then directly accessing their data, CBP would be short-circuiting the vital checks and balances that exist in our current system." The senator wrote that the searches not only violate civil liberties but could reduce international business travel or force companies to outfit employees with "burner" laptops and mobile devices, "which some firms already use when employees visit nations like China."
  • "Folks are going to be less likely to travel freely to the US with the devices they need if they don't feel their sensitive business information is going to be safe at the border," Wyden said Tuesday, noting that CBP can copy the information it views on a device. "Then they can store that information and search it without a warrant." Wyden will soon introduce legislation to force law enforcement to obtain warrants before searching devices at the border. His bill would also prevent CBP from compelling travelers to reveal passwords to their accounts. A DHS spokesman said in a statement that "all travelers arriving to the US are subject to CBP inspection," which includes inspection of any electronic devices they may be carrying. Access to these devices, the spokesman said, helps CBP agents ascertain the identity and admissibility of people from other countries and "deter the entry of possible terrorists, terrorist weapons, controlled substances," and other prohibited items. "CBP electronic media searches," the spokesman said, "have resulted in arrests for child pornography, evidence helpful in combating terrorist activity, violations of export controls, convictions for intellectual property rights violations, and visa fraud discoveries." In a March 27 USA Today op-ed, Joseph B. Maher, DHS acting general counsel, compared device searches to searching luggage. "Just as Customs is charged with inspecting luggage, vehicles and cargo containers upon arrival to the USA, there are circumstances in this digital age when we must inspect an electronic device for violations of the law," Maher wrote.
  • But in a unanimous 2014 ruling, the Supreme Court found that police need warrants to search cell phones. Chief Justice John Roberts wrote in the opinion that cell phones are "such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy." In response to a Justice Department argument that cell phones were akin to wallets, purses, and address books, Roberts wrote: "That is like saying a ride on horseback is materially indistinguishable from a flight to the moon." The law, however, applies differently at the border because of the "border search doctrine," which has traditionally given law enforcement wider latitude under the Fourth Amendment to perform searches at borders and international airports. CBP says it keeps tight controls on its searches and is sensitive to personal privacy. Wyden isn't convinced. "Given Trump's worrying track record so far, and the ease with which CBP could change its guidelines, it's important we create common-sense statutory protections for Americans' liberty and security," he says.
  • ...1 more annotation...
  • Sophia Cope, a staff attorney with the Electronic Frontier Foundation who has written extensively about searches of electronic devices, says that searches of mobile devices appear to be on the rise. "They realized that people are carrying these devices with them all the time, it's just another thing for them to search," she says. "But also it does seem that after the executive order that they've been emboldened to do this even more." Wyden says that the data collection creates an opportunity for hackers. "Given how frequently hackers have stolen government information," he says, "I think a lot of Americans would be worried to know their whole lives could be sitting in a government database that's got a huge bull's-eye on it for hackers."
Paul Merrell

Tomgram: Todd Miller, The Creation of a Border Security State | TomDispatch - 0 views

  • Sometimes you really do need a map if you want to know where you are.  In 2008, the ACLU issued just such a map of this country and it’s like nothing ever seen before.  Titled “the Constitution-Free Zone of the United States,” it traces our country’s borders.  Maybe you’re already tuning out.  After all, you probably don’t think you live on or near such a border.  Well, think again.  As it happens, in our brave, new, post-9/11 world, as long as we’re talking “homeland security” or “war on terror,” anything can be redefined.  So why not a border? Our borders have, conveniently enough, long been Constitution-free zones where more or less anything goes, including warrantless searches of various sorts.  In the twenty-first century, however, the border itself, north as well as south, has not only been increasingly up-armored, but redefined as a 100-mile-wide strip around the United States (and Alaska).  In other words -- check that map again -- our “borders” now cover an expanse in which nearly 200 million Americans, or two-thirds of the U.S. population, live.  Included are nine of the 10 largest metropolitan areas.  If you live in Florida, Maine, or Michigan, for example, no matter how far inland you may be, you are “on the border.”
  • Imagine that.  And then imagine what it means.  U.S. Customs and Border Protection, as Todd Miller points out today, is not only the largest law enforcement agency in the country you know next to nothing about, but the largest, flat and simple.  Now, its agents can act as if the Constitution has been put to bed up to 100 miles inland anywhere.  This, in turn, means -- as the ACLU has written -- that at new checkpoints and elsewhere in areas no American would once have considered borderlands, you can be stopped, interrogated, and searched “on an everyday basis with absolutely no suspicion of wrongdoing.” Under the circumstances, it’s startling that, since the ACLU made its case back in 2008, this new American reality has gotten remarkably little attention.  So it’s lucky that TomDispatch regular Miller's invaluable and gripping book, Border Patrol Nation: Dispatches from the Front Lines of Homeland Security, has just been published.  It’s an eye opener, and it’s about time that “border” issues stopped being left to those on the old-fashioned version of the border and immigration mavens.  It’s a subject that, by definition, now concerns at least two-thirds of us in a big way.
  • Border Security Expo 2014 catches in one confined space the expansiveness of a “booming” border market. If you include “cross-border terrorism, cyber crime, piracy, [the] drug trade, human trafficking, internal dissent, and separatist movements,” all “driving factor[s] for the homeland security market,” by 2018 it could reach $544 billion globally. It is here that U.S. Homeland Security officials, local law enforcement, and border forces from all over the world talk contracts with private industry representatives, exhibit their techno-optimism, and begin to hammer out a future of ever more hardened, up-armored national and international boundaries. The global video surveillance market alone is expected to be a $40 billion industry by 2020, almost three times its $13.5 billion value in 2013. According to projections, 2020 border surveillance cameras will be capturing 3.4 trillion video hours globally. In case you were wondering, that’s more than 340 million years of video footage if you were watching 24 hours a day.
  • ...3 more annotations...
  • It is in the U.S. borderlands that, as anthropologist Josiah Heyman once wrote, the U.S. government’s modern expertise in creating and tracking "a marked population” was first developed and practiced. It involved, he wrote prophetically, “the birth and development of a... means of domination, born of the mating between moral panics about foreigners and drugs, and a well-funded and expert bureaucracy.” You may not be able to watch them at the Border Security Expo, but in those borderlands -- make no bones about it -- the Department of Homeland Security, with its tripartite missions of drug interdiction, immigration enforcement, and the war on terror, is watching you, whoever you are. And make no bones about this either: our borders are widening and the zones in which the watchers are increasingly free to do whatever they want are growing.
  • In March, U.S. Customs and Border Protection (CBP) awarded a $145 million contract to that Israeli company through its U.S. division. Elbit Systems prides itself on having spent “10+ years securing the world’s most challenging borders,” above all deploying similar “border protection systems” to the separation wall between Israel and Palestine. It is now poised to enter U.S. indigenous lands.
  • Now, thanks to the Elbit Systems contract, a new kind of border will continue to be added to this layering.  Imagine part of the futuristic Phoenix exhibition hall leaving Border Expo with the goal of incorporating itself into the lands of a people who were living here before there was a “New World,” no less a United States or a Border Patrol. Though this is increasingly the reality from Brownsville, Texas, to San Diego, California, on Tohono O’odham land a post-9/11 war posture shades uncomfortably into the leftovers from a nineteenth century Indian war.  Think of it as the place where the homeland security state meets its older compatriot, Manifest Destiny.
Paul Merrell

Warrantless airport seizure of laptop "cannot be justified," judge rules | Ars Technica - 0 views

  • The US government's prosecution of a South Korean businessman accused of illegally selling technology used in aircraft and missiles to Iran was dealt a devastating blow by a federal judge. The judge ruled Friday that the authorities illegally seized the businessman's computer at Los Angeles International Airport as he was to board a flight home. The authorities who were investigating Jae Shik Kim exercised the border exception rule that allows the authorities to seize and search goods and people—without court warrants—along the border and at airport international terminals. US District Court judge Amy Berman Jackson of the District of Columbia noted that the Supreme Court has never directly addressed the issue of warrantless computer searches at an international border crossing, but she ruled (PDF) the government used Kim's flight home as an illegal pretext to seize his computer. Authorities then shipped it 150 miles south to San Diego where the hard drive was copied and examined for weeks, but the judge said the initial seizure "surely cannot be justified." After considering all of the facts and authorities set forth above, then, the Court finds, under the totality of the unique circumstances of this case, that the imaging and search of the entire contents of Kim’s laptop, aided by specialized forensic software, for a period of unlimited duration and an examination of unlimited scope, for the purpose of gathering evidence in a pre-existing investigation, was supported by so little suspicion of ongoing or imminent criminal activity, and was so invasive of Kim’s privacy and so disconnected from not only the considerations underlying the breadth of the government’s authority to search at the border, but also the border itself, that it was unreasonable.
  • "The government points to its plenary authority to conduct warrantless searches at the border. It posits that a laptop computer is simply a 'container' that was examined pursuant to this authority, and it submits that the government’s unfettered right to search cargo at the border to protect the homeland is the beginning and end of the matter," the judge wrote. Evidence discovered on his computer of his alleged involvement in the conspiracy that won an indictment is now suppressed, and it cannot be used against him according to the ruling. The authorities took the man's computer in 2012 for national security reasons but allowed him to board his flight home. The government did not comment on the decision. Judge Berman Jackson questioned whether the border search exception should apply to laptops because they carry much more private information than, say, a briefcase. Judge Jackson cited last year's Supreme Court case, known as Riley, in which the justices ruled unanimously that the authorities generally may not search the mobile phones of those they arrest unless they have a court warrant.
  • The Supreme Court said that "Modern cell phones, as a category, implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet, or a purse. A conclusion that inspecting the contents of an arrestee’s pockets works no substantial additional intrusion on privacy beyond the arrest itself may make sense as applied to physical items, but any extension of that reasoning to digital data has to rest on its own bottom." Seizing on that high court opinion, Judge Berman Jackson wrote: Applying the Riley framework, the national security concerns that underlie the enforcement of export control regulations at the border must be balanced against the degree to which Kim’s privacy was invaded in this instance. And as was set forth above, while the immediate national security concerns were somewhat attenuated, the invasion of privacy was substantial: the agents created an identical image of Kim’s entire computer hard drive and gave themselves unlimited time to search the tens of thousands of documents, images, and emails it contained, using an extensive list of search terms, and with the assistance of two forensic software programs that organized, expedited, and facilitated the task. Based upon the testimony of both Special Agent Hamako and Special Agent Marshall, the Court concludes that wherever the Supreme Court or the Court of Appeals eventually draws the precise boundary of a routine border search, or however either Court ultimately defines a forensic – as opposed to a conventional – computer search, this search was qualitatively and quantitatively different from a routine border examination, and therefore, it was unreasonable given the paucity of grounds to suspect that criminal activity was in progress.
  •  
    The court's decision indicates that the Feds can still do a border search of a laptop but that they cross the line when they seize the computer for later forensic examination without a warrant. In this case, the government conducted the forensic examination before obtaining a warrant.
Paul Merrell

"Crisis At The Border" Is Yet Another Example Of "Blowback." - 0 views

  • If you’re reading this, you probably follow the news. So you’ve probably heard of the latest iteration of the “crisis at the border”: tens of thousands of children, many of them unaccompanied by an adult, crossing the desert from Mexico into the United States, where they surrender to the Border Patrol in hope of being allowed to remain here permanently. Immigration and Customs Enforcement’s detention and hearing system has been overwhelmed by the surge of children and, in some cases, their parents. The Obama Administration has asked Congress to approve new funding to speed up processing and deportations of these illegal immigrants. Even if you’ve followed this story closely, you probably haven’t heard the depressing backstory — the reason so many Central Americans are sending their children on a dangerous thousand-mile journey up the spine of Mexico, where they ride atop freight trains, endure shakedowns by corrupt police and face rapists, bandits and other predators. (For a sense of what it’s like, check out the excellent 2009 film “Sin Nombre.”) NPR and other mainstream news outlets are parroting the White House, which blames unscrupulous “coyotes” (human smugglers) for “lying to parents, telling them that if they put their kids in the hands of traffickers and get to the United States that they will be able to stay.” True: the coyotes are saying that in order to gin up business. Also true: U.S. law has changed, and many of these kids have a strong legal case for asylum. Unfortunately, U.S. officials are ignoring the law.
  • The sad truth is that this “crisis at the border” is yet another example of “blowback.” Blowback is an unintended negative consequence of U.S. political, military and/or economic intervention overseas — when something we did in the past comes back to bite us in the ass. 9/11 is the classic example; arming and funding radical Islamists in the Middle East and South Asia who were less grateful for our help than angry at the U.S.’ simultaneous backing for oppressive governments (The House of Saud, Saddam, Assad, etc.) in the region. More recent cases include U.S. support for Islamist insurgents in Libya and Syria, which destabilized both countries and led to the murders of U.S. consular officials in Benghazi, and the rise of ISIS, the guerilla army that imperils the U.S.-backed Maliki regime in Baghdad, respectively. Confusing the issue for casual American news consumers is that the current border crisis doesn’t involve the usual Mexicans traveling north in search of work. Instead, we’re talking about people from Central American nations devastated by a century of American colonialism and imperialism, much of that intervention surprisingly recent. Central American refugees are merely transiting through Mexico.
  • “The unaccompanied children crossing the border into the United States are leaving behind mainly three Central American countries, Honduras, El Salvador and Guatemala. The first two are among the world’s most violent and all three have deep poverty, according to a Pew Research report based on Department of Homeland Security (DHS) information,” reports NBC News. “El Salvador ranked second in terms of homicides in Latin America in 2011, and it is still high on the list. Honduras, Guatemala and El Salvador are among the poorest nations in Latin America. Thirty percent of Hondurans, 17 percent of Salvadorans and 26 percent of Guatemalans live on less than $2 a day.” The fact that Honduras is the biggest source of the exodus jumped out at me. That’s because, in 2009, the United States government — under President Obama — tacitly supported a military coup that overthrew the democratically elected president of Honduras. “Washington has a very close relationship with the Honduran military, which goes back decades,” The Guardian noted at the time. “During the 1980s, the US used bases in Honduras to train and arm the Contras, Nicaraguan paramilitaries who became known for their atrocities in their war against the Sandinista government in neighbouring Nicaragua.”
  • ...2 more annotations...
  • Honduras wasn’t paradise under President Manuel Zelaya. Since the coup, however, the country has entered a downward death spiral of drug-related bloodshed and political revenge killings that crashed the economy, brought an end to law, order and civil society, and now has some analysts calling it a “failed state” along the lines of Somalia and Afghanistan during the 1990s. “Zelaya’s overthrow created a vacuum in security in which military and police were now focused more on political protest, and also led to a freeze in international aid that markedly worsened socio-economic conditions,” Mark Ungar, professor of political science at Brooklyn College and the City University of New York, told The International Business Times. “The 2009 coup, asserts [Tulane] professor Aaron Schneider, gave the Honduran military more political and economic leverage, at the same time as the state and political elites lost their legitimacy, resources and the capacity to govern large parts of the country.” El Salvador and Guatemala, also narcostates devastated by decades of U.S. support for oppressive, corrupt right-wing dictatorships, are suffering similar conditions.
  • Talk about brass! The United States does it everything it can to screw up Central America — and then acts surprised when desperate people show up at its front gate trying to escape the (U.S.-caused) carnage. Letting the kids stay — along with their families — is less than the least we could do.
Paul Merrell

FindLaw | Cases and Codes - 0 views

  • SMITH v. MARYLAND, 442 U.S. 735 (1979)
  • The telephone company, at police request, installed at its central offices a pen register to record the numbers dialed from the telephone at petitioner's home. Prior to his robbery trial, petitioner moved to suppress "all fruits derived from" the pen register. The Maryland trial court denied this motion, holding that the warrantless installation of the pen register did not violate the Fourth Amendment. Petitioner was convicted, and the Maryland Court of Appeals affirmed. Held: The installation and use of the pen register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant was required. Pp. 739-746. (a) Application of the Fourth Amendment depends on whether the person invoking its protection can claim a "legitimate expectation of privacy" that has been invaded by government action. This inquiry normally embraces two questions: first, whether the individual has exhibited an actual (subjective) expectation of privacy; and second, whether his expectation is one that society is prepared to recognize as "reasonable." Katz v. United States, 389 U.S. 347 . Pp. 739-741.
  • (b) Petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and even if he did, his expectation was not "legitimate." First, it is doubtful that telephone users in general have any expectation of privacy regarding the numbers they dial, since they typically know that they must convey phone numbers to the telephone company and that the company has facilities for recording this information and does in fact record it for various legitimate business purposes. And petitioner did not demonstrate an expectation of privacy merely by using his home phone rather than some other phone, since his conduct, although perhaps calculated to keep the contents of his conversation private, was not calculated to preserve the privacy of the number he dialed. Second, even if petitioner did harbor some subjective expectation of privacy, this expectation was not one that society is prepared to recognize as "reasonable." When petitioner voluntarily conveyed numerical information to the phone company and "exposed" that information to its equipment in the normal course of business, he assumed the risk that the company would reveal the information [442 U.S. 735, 736]   to the police, cf. United States v. Miller, 425 U.S. 435 . Pp. 741-746. 283 Md. 156, 389 A. 2d 858, affirmed.
  •  
    The Washington Post has reported that "on July 15 [2001], the secret surveillance court allowed the NSA to resume bulk collection under the court's own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as "pen register, trap and trace," that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line." .  The seminal case on pen registers is the Supreme Court's 1979 Smith v. Maryland decision, bookmarked here and the Clerk's syllabus highlighted, with the Court's discussion on the same web page. We will be hearing a lot about this case decision in the weeks and months to come.  Let it suffice for now to record a few points of what my antenna are telling me:  -- Both technology and the law have moved on since then. We are 34 years down the line from the Smith decision. Its pronouncements have been sliced and diced by subsequent decisions. Not a single Justice who sat on the Smith case is still on the High Bench.   -- In Smith, a single pen register was used to obtain calling information from a single telephone number by law enforcement officials. In the present circumstance, we face an Orwellian situation of a secret intelligence agency with no law enforcement authority forbidden by law from conducting domestic surveillance perusing and all digital communications of the entire citizenry. -- The NSA has been gathering not only information analogous to pen register results but also the communications of American citizens themselves. The communications themselves --- the contents --- are subject to the 4th Amendment warrant requirement. Consider the circuitous route of the records ordered to be disclosed in the Verizon FISA order. Verizon was ordered to disclose them to the FBI, not to the NSA. But then the FBI apparently forwards the records to the NSA, who has both the "pen register
Paul Merrell

Canadian risks prison for not giving up phone's passcode - Yahoo News - 0 views

  • Montreal (AFP) - A Canadian charged for refusing to give border agents his smartphone passcode was expected Thursday to become the first to test whether border inspections can include information stored on devices.Alain Philippon, 38, risks up to a year in prison and a fine of up to Can$25,000 (US$20,000) if convicted of obstruction.He told local media that he refused to provide the passcode because he considered information on his smartphone to be "personal."Philippon was transiting through the port city of Halifax on his way home from a Caribbean vacation on Monday when he was selected for an in-depth exam.
  • "Philippon refused to divulge the passcode for his cell phone, preventing border services officers from their duties," Canada Border Services Agency said in an email.The agency insists that the Customs Act authorizes its officers to examine "all goods and conveyances including electronic devices, such as cell phones and laptops."But, according to legal experts, the issue of whether a traveler must reveal the password for an electronic device at a border crossing has not been tested in court. "(It's) one thing for them to inspect it, another thing for them to compel you to help them," Rob Currie, director of the Law and Technology Institute at Dalhousie University, told public broadcaster CBC.Philippon is scheduled to appear in court on May 12.
Gary Edwards

I Am a Peaceful AR-15 Assault Rifle Owner | Casey Research - 0 views

  •  
    ""Firearms stand next in importance to the constitution itself. They are the American people's liberty teeth and keystone under independence … from the hour the Pilgrims landed to the present day, events, occurances and tendencies prove that to ensure peace security and happiness, the rifle and pistol are equally indispensable … the very atmosphere of firearms anywhere restrains evil interference - they deserve a place of honor with all that's good." George Washington I can't think of any reason I need to own my AR-15 assault[1] rifle. I don't pretend to need it for self defense. I also own several handguns. Any one of my handguns would be adequate to allow me an opportunity to defend myself, or another person, from virtually any act of aggression by another individual. Indeed, I could have easily halted any of the recent gun based rampages, by any of those deranged lunatics, with just one of my handguns. I wish I had been there. I have needlessly and peacefully owned my AR-15 for many years. I keep my AR-15 securely locked in a gun safe in the very same home where my young children live. My children are aware of my AR-15. Like many other things in life, I have taught my children about guns. Recently, some of my kids attended a private gun safety class given by a highly experienced gun expert. I enjoyed watching my kids learn about my AR-15. I admit being a bit nostalgic about my AR-15. I spent lots of time learning about every aspect of the AR-15 when I was in Marine Corps boot camp at Parris Island, South Carolina. I also carried an AR-15 when I served my country in Operation Desert Storm in Saudi Arabia. I had it with me when I lived in a dirt hole on the border of Kuwait. It is the weapon I know better than any other. I own lots of dangerous things I don't need. I don't need my highly modified 600+ hp Z06 Corvette, or my Harley Davidson motorcycle, or that crazy looking knife I sometimes jokingly say was imported directly from the Klingon Empire.[2] Al
Paul Merrell

Homeland Security Approves Their Right To Search and Seize Your Electronics Without Sus... - 0 views

  • Suddenly, she found herself in serious trouble. The inspection officer found the bills and accused her of “lying to a federal officer.” They held her for two hours as she was interrogated about the details of her life.  The officer ordered her to turn her phone on, and then proceeded to read her e-mails, texts, and Facebook messages without her permission.  She was shocked. Eventually, Gaczkowska was released, but she wondered if this was a common practice. As it turns out – it is; thousands of people every year face a similar situation.  Our government agencies have allowed themselves the right to search and seize your electronic devices with stunning impunity. Just two weeks ago, the Department of Homeland Security quietly released a strangely worded document reaffirming their own right to search and seize your electronics without suspicion or cause, anywhere along the United States border (which they define as 100 miles in from the border – an area twice as long as Rhode Island).  In reality, this is nothing new, Homeland Security been doing this since at least 2009; That’s when Secretary Napolitano put her stamp on the Bush-era practice, and promised an impact assessment within 120 days.  Over two years later, it’s finally here, and it is nothing more than a poorly written press release.
  • Having a government official force their way into your laptop is fundamentally different from having them inspect your suitcase.  Our hard drives contain personal correspondence, intimate details, deep logs of our activities, and sensitive financial or medical information.  Yet we still give this less legal privacy protection than a sealed envelope with a stamp on it.
  • The Fourth Amendment of the Constitution already provides us with protection against unreasonable search and seizures for people in their “persons, houses, papers, and effects” – is it time that we add “data” to this list? The way in which we go about answering this question will have enormous ramifications for our entire legal system. Courts around the country are struggling to decide how to balance security with privacy.  From school to the workplace, this question is popping up in different ways almost every day.
Paul Merrell

History of the Federal Judiciary - 0 views

  •  Olmstead v. United States: The Constitutional Challenges of Prohibition Enforcement Historical Documents Dissenting opinion of Justice Louis D. Brandeis in Olmstead v. United States Justice Brandeis’s dissenting opinion is one of the more notable dissents in Supreme Court history. He attempted to define a general right of privacy based on the Fourth and Fifth Amendments. Brandeis had long been interested in the problem of privacy in the modern age; years earlier he and his law partner, Samuel Warren, published what many consider the seminal article on the topic (Samuel Warren & Louis D. Brandeis, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890)). Brandeis’s opinion in Olmstead attempted to apply to the current era what he said were the principles of the Fourth and Fifth Amendments. Historians often overlook how much his approach draws on the dissenting opinion of Judge Rudkin in the circuit court, but Brandeis himself acknowledged his debt to Rudkin in the text. The quotation about “the form that evil had theretofore taken” referred to the Supreme Court decision in Weems v. United States, in which Justice Joseph McKenna wrote of the need for the Court to apply the general principles of the Constitution to new problems.
  • Moreover, “in the application of a constitution, our contemplation cannot be only of what has been but of what may be.” The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. “That places the liberty of every man in the hands of every petty officer” was said by James Otis of much lesser intrusions than these. To Lord Camden, a far slighter intrusion seemed “subversive of all the comforts of society.” Can it be that the Constitution affords no protection against such invasions of individual security? . . .
  • In Ex parte Jackson, 96 U.S. 727, it was held that a sealed letter entrusted to the mail is protected by the Amendments. The mail is a public service furnished by the Government. The telephone is a public service furnished by its authority. There is, in essence, no difference between the sealed letter and the private telephone message. As Judge Rudkin said below: “True, the one is visible, the other invisible; the one is tangible, the other intangible; the one is sealed, and the other unsealed, but these are distinctions without a difference.” The evil incident to invasion of the privacy of the telephone is far greater than that involved in tampering with the mails. Whenever a telephone line is tapped, the privacy of the persons at both ends of the line is invaded and all conversations between them upon any subject, and, although proper, confidential and privileged, may be overheard. Moreover, the tapping of one man’s telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire-tapping.
  • ...2 more annotations...
  • Time and again, this Court in giving effect to the principle underlying the Fourth Amendment, has refused to place an unduly literal construction upon it. This was notably illustrated in the Boyd case itself. Taking language in its ordinary meaning, there is no “search” or “seizure” when a defendant is required to produce a document in the orderly process of a court’s procedure. “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,” would not be violated, under any ordinary construction of language, by compelling obedience to a subpoena. But this Court holds the evidence inadmissible simply because the information leading to the issue of the subpoena has been unlawfully secured. . . . The provision against self-incrimination in the Fifth Amendment has been given an equally broad construction. . . .
  • Decisions of this Court applying the principle of the Boyd case have settled these things. Unjustified search and seizure violates the Fourth Amendment, whatever the character of the paper; whether the paper when taken by the federal officers was in the home, in an office, or elsewhere; whether the taking was effected by force, by fraud, or in the orderly process of a court’s procedure. From these decisions, it follows necessarily that the Amendment is violated by the officer’s reading the paper without a physical seizure, without his even touching it; and that use, in any criminal proceeding, of the contents of the paper so examined—as where they are testified to by a federal officer who thus saw the document, or where, through knowledge so obtained, a copy has been procured elsewhere—any such use constitutes a violation of the Fifth Amendment. The protection guaranteed by the Amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man’s spiritual nature, of his feelings, and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. And the use, as evidence in a criminal proceeding, of facts ascertained by such intrusion must be deemed a violation of the Fifth.
  •  
    The linked opinion is Justice Brandeis' dissent in Olmstead v. U.S., the first Supreme Court decision to approve the use of secret wiretap evidence in a criminal proceeding, even though gathered without a search warrant. The warrant requirement would later be imposed in 1967 by the decision in Katz v. U.S., which established that the Fourth Amendment the privacy of people, not places, reviving the Brandeis dissent to a large degree. Since Katz and the advent of broad government surveillance, Justice Brandeis' dissent is gaining still more attention. 
Paul Merrell

Turkey Cooks the Books in Syria | The American Conservative - 0 views

  • If you had been a reader of The American Conservative magazine back in December 2011, you might have learned from an article written by me that “Unmarked NATO warplanes are arriving at Turkish military bases close to Iskenderum on the Syrian border, delivering weapons [to the Free Syrian Army] derived from Colonel Muammar Gaddafi’s arsenals…” Well, it seems that the rest of the media is beginning to catch up with the old news, supplemented with significant details by Sy Hersh in the latest issue of the London Review of Books in an article entitled “The Red Line and the Rat Line.” The reality is that numerous former intelligence officials, like myself, have long known most of the story surrounding the on-again off-again intervention by the United States and others in Syria, but what was needed was a Sy Hersh, with his unmatched range of contacts deep in both the Pentagon as well as at CIA and State Department, to stitch it all together with corroboration from multiple sources. In a sense it was a secret that wasn’t really very well hidden but which the mainstream media wouldn’t touch with a barge pole because it revealed that the Obama Administration, just like the Bushies who preceded it, has been actively though clandestinely conspiring to overthrow yet another government in the Middle East. One might well conclude that the White House is like the Bourbon Kings of France in that it never forgets anything but never learns anything either.
  • The few media outlets that are willing to pick up the Syria story even now are gingerly treating it as something new, jumping in based on their own editorial biases, sometimes emphasizing the CIA and MI6 role in cooperating with the Turks to undermine Bashar al-Assad. But Hersh’s tale is only surprising if one had not been reading between the lines over the past three years, where the clandestine role of the British and American governments was evident and frequently reported on over the internet and, most particularly, in the local media in the Middle East. Far from being either rogue or deliberately deceptive, operations by the U.S. and UK intelligence services, the so-called “ratlines” feeding weapons into Syria, were fully vetted and approved by both the White House and Number 10 Downing Street. The more recent exposure of the Benghazi CIA base’s possible involvement in obtaining Libyan arms as part of the process of equipping the Syrian insurgents almost blew the lid off of the arrangement but somehow the media attention was diverted by a partisan attack on the Obama Administration over who said what and when to explain the security breakdown and the real story sank out of sight.
  • So this is what happened, roughly speaking: the United States had been seeking the ouster of President Bashar al-Assad of Syria since at least 2003, joining with Saudi Arabia, which had been funding efforts to destabilize his regime even earlier. Why? Because from the Saudi viewpoint Syria was an ally of Iran and was also a heretical state led by a secular government dominated by Alawite Muslims, viewed as being uncomfortably close to Shi’ites in their apostasy. From the U.S. viewpoint, the ties to Iran and reports of Syrian interference in Lebanon were a sufficient casus belli coupled with a geostrategic assessment shared with the Saudis that Syria served as the essential land bridge connecting Hezbollah in Lebanon to Iran. The subsequent Congressional Syria Accountability Acts of 2004 and 2010, like similar legislation directed against Iran, have resulted in little accountability and have instead stifled diplomacy. They punished Syria with sanctions for supporting Hezbollah in Lebanon and for its links to Tehran, making any possible improvement in relations problematical. The 2010 Act even calls for steps to bring about regime change in Damascus. The United States also engaged in a program eerily reminiscent of its recent moves to destabilize the government in Ukraine, i.e., sending in ambassadors and charges who deliberately provoked the Syrian government by meeting with opposition leaders and openly making demands for greater democracy. The last U.S. Ambassador to Syria Robert Ford spoke openly in support of the protesters while serving in Damascus in 2010. On one occasion he was pelted with tomatoes and was eventually removed over safety concerns.
  • ...4 more annotations...
  • Lost in translation is the fact that Washington’s growing support for radical insurgency in Syria would also inevitably destabilize all its neighbors, most notably including Iraq, which has indeed been the case, making a shambles of U.S. claims that it was seeking to introduce stable democracies into the region. Some also saw irony in the fact that a few years before Washington decided al-Assad was an enemy it had been sending victims of the CIA’s rendition program to Syria, suggesting that at least some short-term and long-term strategies were on a collision course from the start, if indeed the advocates of the two policies were actually communicating with each other at all. Prime Minister Recep Tayyip Erdogan of Turkey, whose country shared a long border with Syria and who had legitimate security concerns relating to Kurdish separatists operating out of the border region, became the proxy in the secret war for Washington and its principal European allies, the British and French. When the U.S.-Saudi supported insurgency began to heat up and turn violent, Turkey became the key front line state in pushing for aggressive action against Damascus. Erdogan miscalculated, thinking that al-Assad was on his last legs, needing only a push to force him out, and Ankara saw itself as ultimately benefiting from a weak Syria with a Turkish-controlled buffer zone along the border to keep the Kurds in check.
  • Hersh reports how President Barack Obama had to back down from attacking Syria when the Anglo-American intelligence community informed him flatly and unambiguously that Damascus was not responsible for the poison gas attack that took place in Damascus on August 21, 2013 that was being exploited as a casus belli. The information supporting that assertion was known to many like myself who move around the fringes of the intelligence community, but the real revelation from Hersh is the depth of Turkish involvement in the incident in order to have the atrocity be exploitable as a pretext for American armed intervention, which, at that point, Erdogan strongly desired. As the use of weapons of mass destruction against civilians was one of the red lines that Obama had foolishly promoted regarding Syria Erdogan was eager to deliver just that to force the U.S.’s hand. Relying on unidentified senior U.S. intelligence sources, Hersh demonstrates how Turkey’s own preferred militant group Jabhat al-Nusra, which is generally regarded as an al-Qaeda affiliate, apparently used Turkish-provided chemicals and instructions to stage the attack.
  • Is it all true? Unless one has access to the same raw information as Sy Hersh it is difficult to say with any certainty, but I believe I know who some of the sources are and they both have good access to intelligence and are reliable. Plus, the whole narrative has an undeniable plausibility, particularly if one also considers other evidence of Erdogan’s willingness to take large risks coupled with a more general Turkish underhandedness relating to Syria. On March 23rd, one week before local elections in Turkey that Erdogan feared would go badly for him, a Turkish air force F-16 shot down a Syrian Mig-23, claiming that it had strayed half a mile into Turkish airspace. The pilot who bailed out, claimed that he was attacking insurgent targets at least four miles inside the border when he was shot down, an assertion borne out by physical evidence as the plane’s remains landed inside Syria. Was Erdogan demonstrating how tough he could be just before elections? Possibly.
  • Critics of Hersh claim that the Turks would be incapable of carrying out such a grand subterfuge, but I would argue that putting together some technicians, chemicals, and a couple of trucks to carry the load are well within the capability of MIT, an organization that I have worked with and whose abilities I respect. And one must regard with dismay the “tangled webs we weave,” with due credit to Bobby Burns, for what has subsequently evolved in Syria. Allies like Turkey that are willing to cook the books to bring about military action are exploiting the uncertainty of a White House that continues to search for foreign policy successes while simultaneously being unable to define any genuine American interests. Syria is far from an innocent in the ensuing mayhem, but it has become the fall guy for a whole series of failed policies. Turkey meanwhile has exploited the confusion to clamp down on dissent and to institutionalize Erdogan’s authoritarian inclinations. Ten years of American-licensed meddling combined with obliviousness to possible consequences has led to in excess of 100,000 dead Syrians and the introduction of large terrorist infrastructures into the Arab heartland, yet another foreign policy disaster in the making with no clear way out.
  •  
    Former CIA officer Philip Giraldi adds valuable context to revelations of Turkey's involvement in the false flag Sarin gas attack in Syria and in Turkey's follow-up plan to stage a false flag attack on a Turkish tomb in Syria as a pretext for Turkish invasion of Syria. 
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Paul Merrell

NSA collects millions of text messages daily in 'untargeted' global sweep | World news ... - 0 views

  • The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The untargeted collection and storage of SMS messages – including their contacts – is revealed in a joint investigation between the Guardian and the UK’s Channel 4 News based on material provided by NSA whistleblower Edward Snowden. The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK.
  • The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. An agency presentation from 2011 – subtitled “SMS Text Messages: A Goldmine to Exploit” – reveals the program collected an average of 194 million text messages a day in April of that year. In addition to storing the messages themselves, a further program known as “Prefer” conducted automated analysis on the untargeted communications.
  • The Prefer program uses automated text messages such as missed call alerts or texts sent with international roaming charges to extract information, which the agency describes as “content-derived metadata”, and explains that “such gems are not in current metadata stores and would enhance current analytics”. On average, each day the NSA was able to extract:
  • ...6 more annotations...
  • • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images.
  • • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”. Other travel information was obtained from itinerary texts sent by travel companies, even including cancellations and delays to travel plans.
  • Communications from US phone numbers, the documents suggest, were removed (or “minimized”) from the database – but those of other countries, including the UK, were retained. The revelation the NSA is collecting and extracting personal information from hundreds of millions of global text messages a day is likely to intensify international pressure on US president Barack Obama, who on Friday is set to give his response to the report of his NSA review panel.
  • While US attention has focused on whether the NSA’s controversial phone metadata program will be discontinued, the panel also suggested US spy agencies should pay more consideration to the privacy rights of foreigners, and reconsider spying efforts against allied heads of state and diplomats. In a statement to the Guardian, a spokeswoman for the NSA said any implication that the agency’s collection was “arbitrary and unconstrained is false”. The agency’s capabilities were directed only against “valid foreign intelligence targets” and were subject to stringent legal safeguards, she said.
  • “In contrast to [most] GCHQ equivalents, DISHFIRE contains a large volume of unselected SMS traffic,” it states (emphasis original). “This makes it particularly useful for the development of new targets, since it is possible to examine the content of messages sent months or even years before the target was known to be of interest.” It later explains in plain terms how useful this capability can be. Comparing Dishfire favourably to a GCHQ counterpart which only collects against phone numbers that have specifically been targeted, it states “Dishfire collects pretty much everything it can, so you can see SMS from a selector which is not targeted”.
  • The document also states the database allows for broad, bulk searches of keywords which could result in a high number of hits, rather than just narrow searches against particular phone numbers: “It is also possible to search against the content in bulk (e.g. for a name or home telephone number) if the target’s mobile phone number is not known.” Analysts are warned to be careful when searching content for terms relating to UK citizens or people currently residing in the UK, as these searches could be successful but would not be legal without a warrant or similar targeting authority. However, a note from GCHQ’s operational legalities team, dated May 2008, states agents can search Dishfire for “events” data relating to UK numbers – who is contacting who, and when.
Paul Merrell

US v. Davis, 754 F. 3d 1205 - Court of Appeals, 11th Circuit 2014 - Google Scholar - 0 views

  • 754 F.3d 1205 (2014) UNITED STATES of America, Plaintiff-Appellee, v. Quartavious DAVIS, Defendant-Appellant. No. 12-12928. United States Court of Appeals, Eleventh Circuit. June 11, 2014.
  • The prosecution also offered records obtained from cell phone service providers evidencing that Davis and his co-defendants had placed and received cell phone calls in close proximity to the locations of each of the charged robberies around the 1210*1210 time that the robberies were committed, except for the Mayor's Jewelry store robbery. Davis preserved his objection to the cell phone location evidence and his claim that the government's obtaining such evidence without a warrant issued upon a showing of probable cause violated his rights under the Fourth Amendment.
  • The evidence obtained under the order and presented against Davis in the district court consisted of so-called "cell site location information." That location information 1211*1211 includes a record of calls made by the providers' customer, in this case Davis, and reveals which cell tower carried the call to or from the customer. The cell tower in use will normally be the cell tower closest to the customer. The cell site location information will also reflect the direction of the user from the tower. It is therefore possible to extrapolate the location of the cell phone user at the time and date reflected in the call record.
  • ...3 more annotations...
  • Davis's Fourth Amendment argument raises issues of first impression in this circuit, and not definitively decided elsewhere in the country. The evidence at issue consists of records obtained from cell phone service providers pursuant to the Stored Communications Act ("SCA"), 18 U.S.C. §§ 2703(c) and (d). Under that Act, the government can obtain from providers of electronic communication service records of subscriber services when the government has obtained either a warrant, § 2703(c)(A), or, as occurred in this case, a court order under subsection (d), see § 2703(c)(B). The order under subsection (d) does not require the government to show probable cause.
  • As we suggested above, the question whether cell site location information is protected by the Fourth Amendment guarantees against warrantless searches has never been determined by this court or the Supreme Court. Two circuits have considered the question, but not in the context of the use of the evidence in a criminal proceeding. Also, one of those opinions issued before the Supreme Court's decision in United States v. Jones, ___ U.S. ___, 132 S.Ct. 945, 181 L.Ed.2d 911 (2012), the most relevant Supreme Court precedent.
  • In short, we hold that cell site location information is within the subscriber's reasonable expectation of privacy. The obtaining of that data without a warrant is a Fourth Amendment violation.
  •  
    11th U.S. Circuit Court of Appeals (Southeastern U.S.) holds that section 2703(d) of the Stored Communications Act, which purports to allow the obtaining of a search warrant without a showing of probable cause, violates the 4th Amendment warrant requirement as applied to cell tower "site location information." That should also apply to "fake" cell towers, like the Stingray device (IMSI catcher) used to obtain the same type of information. Likely doubly so because such devices trespass on a radio connection assigned by the FCC between the legitimate cell tower and the user's telephone.
Paul Merrell

Britain Detains the Partner of a Reporter Tied to Leaks - NYTimes.com - 0 views

  • The partner of Glenn Greenwald, the journalist for The Guardian who has been publishing information leaked by the former National Security Agency contractor Edward J. Snowden, was detained for nine hours by the British authorities under a counterterrorism law while on a stop in London’s Heathrow Airport during a trip from Germany to Brazil, Mr. Greenwald said Sunday.
  • Mr. Greenwald’s partner, David Michael Miranda, 28, is a citizen of Brazil. He had spent the previous week in Berlin visiting Laura Poitras, a documentary filmmaker who has also been helping to disseminate Mr. Snowden’s leaks, to assist Mr. Greenwald. The Guardian had paid for the trip, Mr. Greenwald said, and Mr. Miranda was on his way home to Rio de Janeiro.
  • The Guardian published a report on Mr. Miranda’s detainment on Sunday afternoon. Mr. Greenwald said someone who identified himself as a security official from Heathrow Airport called him early on Sunday and informed him that Mr. Miranda had been detained, at that point for three hours. The British authorities, he said, told Mr. Miranda that they would obtain permission from a judge to arrest him for 48 hours, but he was released at the end of the nine hours, around 1 p.m. Eastern time. Mr. Miranda was in Berlin to deliver documents related to Mr. Greenwald’s investigation into government surveillance to Ms. Poitras, Mr. Greenwald said. Ms. Poitras, in turn, gave Mr. Miranda different documents to pass to Mr. Greenwald. Those documents, which were stored on encrypted thumb drives, were confiscated by airport security, Mr. Greenwald said. All of the documents came from the trove of materials provided to the two journalists by Mr. Snowden. The British authorities seized all of his electronic media — including video games, DVDs and data storage devices — and did not return them, Mr. Greenwald said.
  •  
    My comments mighty be longer than Diigo allows from the client sidee so I will place them in in a comment following this post. However, do not miss the companion article in The Guardian, at  
  •  
    Note that when detained, Mr. Miranda was acting in the role of a courier transporting documents on a thumb drive between two of the lead reporters working on the NSA scandal for The Guardian. The police kept the thumb drive and all other electronic devices Mr. Miranda carried, presumably to study their data stores.  Perhaps even more to the point, this was the seizure of leaked NSA documents and reporters' notes about them. I do not know about the UK law on the subject, but the shame of it is that it would be lawful accordng to the U.S. Supreme Court for U.S. Customs officials to do the same thing had Mr. Miranda arrived at an American international airport. Most Americans would be shocked to learn how many of their cherished Constitutional rights disappear at a port or entry or when crossing a border into the U.S. and when traveling within a 100-mile distance from a U.S. border on the U.S. side. But the particular detention of Mr. Miranda and seizure of the reporter's research and NSA document copies was sure from the outset to cause a major media stir. It has also provoked a strong diplomatic protest from Brazil This incident has already provoked not only a strong diplomatic protest from Brazil, but also in the UK, "Labour MP Tom Watson said he was shocked at the news and called for it to be made clear if any ministers were involved in authorising the detention." Also note in The Guardian article that the police were acting under authority of the draconian British Terrorism Act, which does not limit its application to those who are not suspected of being a terrorist. That UK government was willing to endure a public whipping by the media testifies loudly to the desperation of spy agencies - in the U.K., U.S., Australia, New Zealand, Canada, and Israel intelligence alliance - to learn what documents Snowden leaked to Glenn Greenwald and the Washington Post so they have a clue about: [i] what hammer blows will hit them in the future so they can get out i
  •  
    I see that I forgot to paste the link to the companion article in The Guardian. Here 'tis. http://www.theguardian.com/world/2013/aug/18/glenn-greenwald-guardian-partner-detained-heathrow
Paul Merrell

John Brennan Dodges a Question About CIA Spying on Americans - Conor Friedersdorf - The... - 0 views

  • Senator Mark Udall, a Colorado Democrat, has often used his perch on the Senate Intelligence Committee to ask national-security officials if they're misbehaving. He typically focuses on abuses that are actually happening, so his latest exchange with CIA Director John Brennan demands wider attention. Udall asked if the CIA is engaged in domestic spying or searches on American citizens. An idle question? One wouldn't think so. And the CIA director appeared to evade the question. For that reason, I suspect, but certainly cannot prove, that the intelligence agency is, in fact, engaged in this behavior. But don't take my word for it. Look at the transcript and judge for yourself:  UDALL: This committee was created to address a severe breach of trust that developed when it was revealed that the CIA was conducting unlawful domestic searches. The Church Committee went to work, found that to be true.
  • I want to be able to reassure the American people ... that the CIA and the director understand the limits of their mission and authorities. We're all aware of executive order 12333. That order prohibits the CIA from engaging in domestic spying and searches of US citizens within our borders. Can you assure the committee that the CIA does not conduct such domestic spying and searches?  BRENNAN: I can assure the committee that the CIA follows the letter and the spirit of the law in terms of what the CIA's authorities are, in terms of its responsibilities to collect intelligence that will keep this country safe. Yes, Senator, I do.  Hmm. Reframing the question. Answering indirectly. Concluding with syntax that doesn't fit. It all seems suspicious. When Udall asked, "Can you assure the committee that the CIA does not conduct such domestic spying and searches?" Brennan could've replied, "Yes." But that isn't what he said at all. Why, do you think? There could be an explanation I'm missing, but Udall doesn't typically mislead with questions. This is a subject to watch.
Paul Merrell

The US/NATO Enlargement Project » CounterPunch: Tells the Facts, Names the Names - 0 views

  • In February, 1990, US Secretary of State James Baker (1989-1992), representing President George HW Bush, traveled to Moscow to meet with Russian President Mikhail Gorbachev regarding the possible reunification of Germany and the removal of 300,000 Soviet troops. There is little serious dispute that as the Berlin Wall teetered, Baker promised Gorbachev “there would be no extension of NATO’s jurisdiction for forces of NATO one inch to the east.” Gorbachev is reported to have taken the US at its word and responded “any extension of the zone of NATO is unacceptable.” “I agree,” replied Baker.” Unfortunately, Gorbachev never got it in writing and most historians, at the time, agreed that NATO expansion was “ill conceived, ill-timed, and above all ill-suited to the realities of the post-Cold War world.”
  • President Bush’s National Security Advisor Brent Scowcroft and Bill Clinton’s Defense Secretary were also in agreement. But by 1994, that verbal contract had not deterred the concerted efforts of a handful of State Department policy professionals to subdue the overwhelming bureaucratic opposition according to James Goldgeier in his classic “Not Whether but When: The US Decision to Enlarge NATO.” By 1997, the Gorbachev-Baker-Bush agreement was a forgotten policy trinket as Hungary, Poland and the Czech Republic were accepted into NATO. In 2004, former Soviet satellite countries Lithuania, Latvia and Estonia were admitted and in 2009, Croatia and Albania joined NATO. Currently, the former Soviet republics of Ukraine, Georgia, Moldova, Kazakhstan, Armenia, and Azerbaijan are pending membership and all five former Soviet republics in Central Asia (Kyrgyzstan, Tajikistan, Turkmenistan, Kazakhstan, and Uzbekistan) provide NATO with logistical support for the US war in Afghanistan. As the US-led NATO alliance tightens its grip on the Caucasus countries, the American public has not been informed about the Ukrainian Parliament’s approval for a series of NATO military exercises that would put US troops on Russia’s border, even though the Ukraine is not yet a member of NATO. Rapid Trident is a 12-nation military ‘interoperability’ exercise led by the US who will commit the majority of participating troops and Sea Breeze is a naval exercise that will take place on the Black Sea adjacent to Russian ports. The NATO buildup includes joint ground operations with Moldova and Romania.
  • Most recently, NATO Secretary General Anders Fogh Rasmussen announced that the military alliance has cut Russia off from civilian and military cooperation and that there would be the deployment and reinforcement of military assets including increased air patrols over the Baltic Sea and AWACS surveillance flights over Poland and Romania. It goes without saying that the NATO build up is in addition to the deployment of US troops and F-16 warplanes to Poland, F-15C warplanes to Lithuania and aircraft carriers to the Black and Mediterranean Seas. All this raises the question about whether a promise and handshake in the world of international diplomacy is a real commitment and what is a 1991 international promise made by a Republican Administration worth in 1994 to a Democratic Administration? Apparently zilch.
  • ...1 more annotation...
  • What all this means is that, behind the diplomatic landscape of verbal jujitsu and summit meetings, there had been a concerted effort at the US State Department with the creation of a NATO Enlargement Office to establish what has become a Russian Wall – an impenetrable US – defined barrier of estrangement along the Russian border meant to cut the country off from land and sea access – as NATO, itching for war, continues to bait Russia with isolation and threats.
Paul Merrell

WorldLII - WorldLII: About WorldLII - 0 views

  • You are here: WorldLII >> About WorldLII   What is WorldLII? The World Legal Information Institute (WorldLII) is a free, independent and non-profit global legal research facility developed collaboratively by the following Legal Information Institutes and other organisations. Australasian Legal Information Institute (AustLII) British and Irish Legal Information Institute (BAILII) Canadian Legal Information Institute (CanLII) Hong Kong Legal Information Institute (HKLII) Legal Information Institute (Cornell) (LII (Cornell)) Pacific Islands Legal Information Institute (PacLII) Wits University School of Law (Wits Law School) For further details, see the WorldLII brochure. The LIIs, meeting in Montreal in October 2002, adopted the Montreal Declaration on public access to law. WorldLII comprises three main facilities: Databases, Catalog and Websearch.
  • WorldLII Databases WorldLII provides a single search facility for databases located on the following Legal Information Institutes: AustLII; BAILII; CanLII; HKLII; LII (Cornell); and PacLII. WorldLII also includes as part of this searchable collection its own databases not found on other LIIs. These include databases of decisions of international Courts and Tribunals, databases from a number of Asian countries, and databases from South Africa (provided by Wits Law School). Over 270 databases from 48 jurisdictions in 20 countries are included in the initial release of WorldLII. Databases of case-law, legislation, treaties, law reform reports, law journals, and other materials are included. WorldLII welcomes enquiries concerning the possible inclusion of other databases on WorldLII or on one of its collaborating LIIs. WorldLII Catalog and Websearch The WorldLII Catalog provides links to over 15,000 law-related web sites in every country in the world. WorldLII's Websearch makes searchable the full text of as many of these sites as WorldLII's web-spider can reach. WorldLII welcomes enquiries from law librarians and other legal experts who are interested to become Contributing Editors to the WorldLII Catalog.
  • Operation of WorldLII The provision of the WorldLII service is coordinated by the Australasian Legal Information Institute (AustLII), which maintains WorldLII's user interface, the WorldLII Catalog and Websearch, and the databases located only on WorldLII. Technical enhancements to WorldLII are being developed jointly by the cooperating Legal Information Institutes. Contacting WorldLII General contact: feedback@worldlii.org AustLII/WorldLII Co-Directors: Professor Andrew Mowbray, UTS <andrew@austlii.edu.au> Professor Graham Greenleaf, UNSW <graham@austlii.edu.au> Philip Chung, AustLII Executive Director <philip@austlii.edu.au> Mail: WorldLII, c/- AustLII, UTS Faculty of Law, PO Box 123 Broadway NSW 2007 Australia Telephone: +61 2 9514 4921 Fax: +61 2 9514 4908 We hope that you enjoy using WorldLII and find it to be a useful service. Feedback (particularly words of encouragement or constructive criticism) are welcome and may be sent to feedback@worldlii.org. WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback URL: http://www.worldlii.org/worldlii/
  •  
    The various Legal information Institutes that collaborate on WorldLII have the most advanced, integrated, and largest public legal research databases available on the Internet, searchable through a common interface. Still nothing like a complete university law library because so many legal source materials are copyrighted, this is the combined effort of many law schools. A companion browser extension is available for Chrome and Firefox called Jureeka. That extension causes your pages rendered in the browser to contain hyperlinks to all legal authorities cited on the page that are recognized by the extension, with the links going to case law, regulations, and statues that are in the public domain. https://chrome.google.com/webstore/detail/jureeka/ediidjmindkcaflpfjgabfaibhngadbb?utm_source=chrome-app-launcher-info-dialog Thus far, Jureeka is integrated with all legal materials published by the Legal Information Institute long located at Cornell Law School, as well as the Justia archives of U.S. case law. Rumor has it that the extension will be extended to cover materials published by other Legal Information Institutes at various law schools around the globe.
Paul Merrell

Hillary Clinton's Real Scandal Is Honduras, Not Benghazi - 0 views

  • What beats me is why more Democrats aren’t deeply troubled by the legacy of Clinton’s foreign policy blunder in Honduras. Maybe you’ve forgotten what happened in that small country in the first year of the Obama administration — more on that in a moment. But surely you’ve noticed the ugly wave of xenophobia greeting a growing number of Central American child refugees arriving on our southern border. Some of President Barack Obama’s supporters are trying to blame this immigration crisis on the Bush administration because of an anti-trafficking law George W. signed in 2008 specifically written to protect Central American children that preceded an uptick in their arrivals. But which country is the top source of kids crossing the border? Honduras, home to the world’s highest murder rate, Latin America’s worst economic inequality, and a repressive U.S.-backed government. When Honduran military forces allied with rightist lawmakers ousted democratically elected President Manuel Zelaya in 2009, then-Secretary of State Clinton sided with the armed forces and fought global pressure to reinstate him.
  • Washington wields great influence over Honduras, thanks to the numerous military bases built with U.S. funds where training and joint military and anti-drug operations take place. Since the coup, nearly $350 million in U.S. assistance, including more than $50 million in military aid has poured into the country. That’s a lot of investment in a nation where the police, the military, and private security forces are killing people with alarming frequency and impunity, according to Human Rights Watch. In short, desperate Honduran children are seeking refuge from a human rights nightmare that would cast a dark cloud over Clinton’s presidential bid right now if the media were paying any attention. That wouldn’t give Republicans a big advantage, of course. Until they stop alienating a majority of female voters and communities of color, I find it hard to see the party of Mitt Romney and John McCain winning the White House.
  • Given the Democratic Party’s demographic edge, progressives have nothing to lose by seizing on the GOP field’s weakness and pressing for a viable alternative to another Clinton administration. Senator Elizabeth Warren could prove a contender. Unfortunately, the consumer-rights firebrand and Massachusetts Democrat lacks any foreign policy experience. And foreign policy is no afterthought these days. Israel — the recipient of $3.1 billion a year in U.S. military aid — is waging a ground war in Gaza, and the stakes in the Russia-Ukraine conflict just grew following the downing of that Malaysia Airlines jet. Plus, Iraq is growing more violent and unstable once more. On all these issues, Clinton is more hawkish than most of the Democratic base. But other Democrats with a wide range of liberal credentials and foreign policy expertise are signaling some interest in running, especially if Clinton ultimately sits out the race. Even if Clinton does win in 2016, a serious progressive primary challenge could help shape her presidency. As more and more Honduran kids cross our border in search of a safe haven, voters should take a good look at her track record at the State Department and reconsider the inevitability of another Clinton administration.
Paul Merrell

NSA 'not interested in' Americans, privacy officer claims | TheHill - 0 views

  • The National Security Agency’s internal civil liberties watchdog insisted on Thursday that the agency has no interest in spying on Americans under its controversial spying tools. “Our employees are trained to not look for U.S. persons,” NSA privacy and civil liberties officer Rebecca Richards said on Thursday.
  • “We’re not interested in those U.S. persons. We’re trying to look away from those,” she added. “Instead, we’re looking for where are our targets?”Richards’s comments came up during a Capitol Hill panel discussion about a new report on U.S. spying from the Brennan Center for Justice.The analysis looks at aspects of a presidential order that dates back to Ronald Reagan and was updated by then-President George W. Bush, called Executive Order 12333.
  • Programs under the order, which is meant to guide foreign surveillance, “have implications for Americans’ privacy that could well be greater than those of their domestic counterparts,” the organization wrote in its analysis. “The vast majority of Americans — whether wittingly or not — engage in communication that is transmitted or stored overseas.”“This reality of the digital age renders Americans’ communications and data highly vulnerable to NSA surveillance abroad.”
  • ...2 more annotations...
  • NSA surveillance under Executive Order 12333 is separate from the agency’s higher profile bulk collection of Americans’ phone records, which ended last year. It also occurs under separate legal powers than a controversial provision of the 2008 update to the Foreign Intelligence Surveillance Act, which comes up for renewal at the end of 2017.The executive order targets foreigners, but can “incidentally” pick up data about Americans if their activity on the Internet crosses international borders, Richards acknowledged.“Our procedures are designed to say: There are occasions when you are going to get U.S. persons,” she said, “and when you get those U.S. persons, here’s the rules.”
  • Richards is the agency’s first ever civil liberties officer. She was hired in early 2014, on the heels of fallout from Edward Snowden’s leaks about the spy agency. 
  •  
    Not interested. Apparently that's why NSA was turning over raw search results to Israel without filtering out "U.S. persons" data. And why they just decided to give other agencies including law enforcement access to raw search results. And why Gen. Keith Alexander personally put together a program to ruin people's reputations including a "U.S. person." And why Russell Tice said that he personally had Obama's NSA dossier in his hands when Obama was running for the U.S. Senate. And why Tice says NSA had similar dossiers on members of Congress and the justices of the U.S. Supreme Court and targeted "lots of lawyers." On and on.  Ms. Richards appears to have become a quick study in NSA's hallmark skill of lying to the public. 
Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
1 - 20 of 37 Next ›
Showing 20 items per page