Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged chill

Rss Feed Group items tagged

Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Gary Edwards

Tom Coburn: The Health Bill Is Scary - WSJ.com - 0 views

  • the Reid bill (in sections 3403 and 2021) explicitly empowers Medicare to deny treatment based on cost. An Independent Medicare Advisory Board created by the bill—composed of permanent, unelected and, therefore, unaccountable members—will greatly expand the rationing practices that already occur in the program. Medicare, for example, has limited cancer patients' access to Epogen, a costly but vital drug that stimulates red blood cell production. It has limited the use of virtual, and safer, colonoscopies due to cost concerns. And Medicare refuses medical claims at twice the rate of the largest private insurers.
  • The bill explicitly states, on page 17, that health insurance plans "shall provide coverage for" services approved by the task force. This chilling provision represents the government stepping between doctors and patients. When the government asserts the power to provide care, it also asserts the power to deny care.
  •  
    That's Dr. Tom Coburn.  The same Dr. Tom Coburn who managed to force the public reading of Socialist Bernie Sanders health care amendment proposal designed to force government run health care on all Americans. excerpt: Every American, not just seniors, should know that the rationing provisions in the Reid bill will not only reduce their quality of life, but their life spans as well. My 25 years as a practicing physician have shown me what happens when government attempts to practice medicine: Doctors respond to government coercion instead of patient cues, and patients die prematurely. Even if the public option is eliminated from the bill, these onerous rationing provisions will remain intact.
Gary Edwards

American Apocalypse: Weiss Research, Inc. - 0 views

  •  
    I wonder if they can beat Porter Stansberry's presentation?  Porter rocks. "Inside the Meltdown" is chilling (and can be seen on line at: http://www.pbs.org/wgbh/pages/frontline/meltdown/view/
Paul Merrell

NUJ members under police surveillance mount collective legal challenge - National Union... - 0 views

  • Six NUJ members have discovered that their lawful journalistic and union activities are being monitored and recorded by the Metropolitan Police. They are now taking legal action against the Metropolitan Police Commissioner and the Home Secretary to challenge this ongoing police surveillance. The NUJ members involved in the legal challenge include Jules Mattsson, Mark Thomas, Jason Parkinson, Jess Hurd, David Hoffman and Adrian Arbib. All of them have worked on media reports that have exposed corporate and state misconduct and they have each also previously pursued litigation or complaints arising from police misconduct. In many of those cases, the Metropolitan Police Commissioner has been forced to pay damages, apologise and admit liability to them after their journalistic rights were curtailed by his officers at public events.
  • The surveillance was revealed as part of an ongoing campaign, which began in 2008, during which NUJ members have been encouraged to obtain data held about them by the authorities including the Metropolitan Police 'National Domestic Extremism and Disorder Intelligence Unit' (NDEDIU). The supposed purpose of the unit is to monitor and police so called 'domestic extremism'. In the course of the campaign, a number of NUJ members have obtained data held about them and the union fears there are many more journalists and union members being monitored.
  • The NUJ has instructed Bhatt Murphy Solicitors to pursue the case. The cases raise significant and wide-ranging concerns about: the impact on privacy, the chilling effect on the ability of NUJ members and journalists to do their jobs, and their ability to take part in legitimate trade union activity. The claim challenges the surveillance and retention of data on the basis that it is unnecessary, disproportionate and not in accordance with the law. Journalists and union members have no way of knowing the circumstances in which their activities are monitored, retained, disclosed and systematically stored on secret police 'domestic extremism' databases. The NUJ continues to offer support and assistance to the members involved and extends its support to other media workers who may be affected. The union is extremely concerned by the lack of legal safeguards to protect the press and trade unions from state interference, and believes the actions of the authorities do not abide by domestic law and the European Convention on Human Rights, including Article 8 on privacy, Article 10 on freedom of expression and Article 11 on freedom of assembly and association.
  • ...1 more annotation...
  • I'm A Photographer Not A Terrorist – NUJ supported campaign. Met's journalist files include details of sexual orientation, childhood and family medical history - Jules MattssonTimes journalist Jules Mattsson is one of six members of the NUJ to launch a legal challenge against the Metropolitan Police after finding that it keeps surveillance files on them in a database of Domestic Extremism. When police spy on journalists like me, freedom is at risk - Jason N ParkinsonPersistent requests under the Data Protection Act revealed that files were kept on journalists who were simply doing their job IFJ backs legal challenge by journalists over police surveillance in UKThe International Federation of Journalists has joined in supporting six NUJ members who have taken legal action against the Metropolitan Police and the Home Secretary. The legal challenge concerns the monitoring and recording of their lawful journalistic and union activities.
  •  
    Two excellent short videos on this page. It's disturbing that police are ignoring the EU Convention on Human Rights. Related, legislation is currently in Parliament to grant the government the power to censor any form of "extremism" on the Web, with the term "extremism" left undefined.   Civil liberties have been under attack in the UK for at least 1,000 years. Time for a new Magna Carta?
Paul Merrell

The Sound of Torture - The Intercept - 0 views

  • Suddenly there was a chilling scream. “Allah,” someone wailed. “Allah! Allah!” As I wrote at the time, this wasn’t a cry of religious ecstasy. It was the sound of deep pain, coming from elsewhere in the town library, which had been turned into a detention center by Iraqi security forces who were advised by American soldiers and contractors. I was embedded with the Americans for a week, and I had already heard two of them, from the Wisconsin National Guard, talk about seeing their Iraqi partners trussing up prisoners like animals at a slaughter. During raids, I had seen these Iraqis beat their detainees — muggings as a form of questioning — while their American advisers watched.
  • The CIA’s violations of its detainees are the tip of the torture iceberg. We run the risk, in the necessary debate sparked by the Senate’s release of 500 pages on CIA interrogation abuses, of focusing too narrowly on what happened to 119 detainees held at the agency’s black sites from 2002-2006. The problem of American torture — how much occurred, what impact it had, who bears responsibility — is much larger. Across Iraq and Afghanistan, American soldiers and the indigenous forces they fought alongside committed a large number of abuses against a considerable number of people. It didn’t begin at Abu Ghraib and it didn’t end there. The evidence, which has emerged in a drip-drip way over the years, is abundant though less dramatic than the aforementioned 500-page executive summary of the Senate’s still-classified report on the CIA.
  • Just as the CIA opposed release of the Senate torture report, the Pentagon and White House continue to do their best to suppress the evidence. The Daily Beast noted the other day that the Obama Administration, responding to pressure from the Pentagon, continues to fight in court to prevent the publication of thousands of photos of detainee abuse. The argument against release is nearly identical to the argument used by the CIA to repress the Senate’s report—it could put American lives in danger. To her credit, Sen. Dianne Feinstein pushed back and published an executive summary of her committee’s 6,000-page report (which has caused practically no protest or violence overseas). Repression is the gut instinct of institutions that have something to hide, and I came across that in Samarra, too. Shortly after I witnessed the threatened execution of a detainee (an Iraqi soldier pointed his AK-47 at a prisoner who was against a wall with his hands up), an order came down from the American command to get me out of Samarra. I was told to pack my backpack for the next convoy out of town. After I made a flurry of calls on my satellite phone, the order was rescinded. Someone wanted the truth to come out.
  • ...2 more annotations...
  • Here’s a partial reading list of essential reporting on torture in Iraq and Afghanistan: Senate Report on Abuses of Military Detainees (2008): http://media.washingtonpost.com/wp-srv/nation/pdf/12112008_detaineeabuse.pdf Haditha Killings by Tim McGirk: http://content.time.com/time/world/article/0,8599,1174649,00.html Taguba Report on Abuses at Abu Ghraib: https://www.aclu.org/sites/default/files/torturefoia/released/TR3.pdf Abu Ghraib Abuses by Seymour Hersh: http://www.newyorker.com/magazine/2004/05/10/torture-at-abu-ghraib Special Forces in Afghanistan by Matt Aikens: http://www.rollingstone.com/feature/a-team-killings-afghanistan-special-forces Constitution Project’s Task Force on Detainee Treament (See especially chapter 3): http://detaineetaskforce.org/report/ “The Dark Side” by Jane Mayer: http://www.amazon.com/The-Dark-Side-Inside-American/dp/0307456293
  • “None of Us Were Like This Before” by Joshua Phillips: http://www.amazon.com/None-Were-Like-This-Before/dp/1844678849 The Killing of Dilawar by Carlotta Gall: http://www.nytimes.com/2003/03/04/international/asia/04AFGH.html “Pay Any Price” by James Risen (See especially Chapter 7): http://www.barnesandnoble.com/w/pay-any-price-james-risen/1117916812?ean=9780544341418 “Dirty Wars” by Jeremy Scahill (a founder of The Intercept): http://www.amazon.com/Dirty-Wars-The-World-Battlefield/dp/156858671X “How to Break a Terrorist” by Matthew Alexander: http://www.amazon.com/How-Break-Terrorist-Interrogators-Brutality/dp/B0085S1S5K “The Black Banners” by Ali Soufan: http://www.amazon.com/Black-Banners-Inside-Against-al-Qaeda/dp/0393079422 “Kandahar’s Mystery Executions” by Anand Gopal: http://harpers.org/archive/2014/09/kandahars-mystery-executions/ “No Good Men Among the Living” by Anand Gopal: http://www.amazon.com/No-Good-Men-Among-Living/dp/0805091793
Paul Merrell

C.I.A. Officer Is Found Guilty in Leak Tied to Times Reporter - NYTimes.com - 0 views

  • Jeffrey A. Sterling, a former Central Intelligence Agency officer, was convicted of espionage Monday on charges that he told a reporter for The New York Times about a secret operation to disrupt Iran’s nuclear program.The conviction is a significant victory for the Obama administration, which has conducted an unprecedented crackdown on officials who speak to journalists about security matters without the administration’s approval. Prosecutors prevailed after a yearslong fight in which the reporter, James Risen, refused to identify his sources.
  • On the third day of deliberations, the jury in federal court in Alexandria, Va., convicted Mr. Sterling on nine felony counts. Mr. Sterling, who worked for the C.I.A. from 1993 to 2002 and now lives in O’Fallon, Mo., faces a maximum possible sentence of decades in prison, though the actual sentence is likely to be far shorter. Judge Leonie M. Brinkema of Federal District Court, who presided over the weeklong trial, allowed Mr. Sterling to remain free on bond and set sentencing for April 24.
  • The Justice Department had no direct proof that Mr. Sterling, who managed the Iranian operation, provided the information to Mr. Risen, but prosecutors stitched together a strong circumstantial case.
  • ...3 more annotations...
  • The trial was part Washington spectacle, part cloak and dagger. Former Secretary of State Condoleezza Rice testified, as did C.I.A. operatives who gave only their first names and last initials, with their faces shielded behind seven-foot-high partitions. A scientist was referred to only by his code name, Merlin. His wife was Mrs. Merlin.Officials revealed their preferred strategies for persuading reporters not to run sensitive stories. Jurors learned that, at the C.I.A.’s office in New York, employees could easily walk out with classified documents and never be searched.
  • Mr. Sterling is the latest in a string of former officials and contractors the Obama administration has charged with discussing national security matters with reporters. Under all previous presidents combined, three people had faced such prosecutions. Under President Obama, there have been eight cases, and journalists have complained that the crackdown has discouraged officials from discussing even unclassified security matters.
  • While the administration has defended the crackdown, Mr. Holder said he believed it went too far at times when it targeted journalists. Under Mr. Holder, prosecutors seized phone records from The Associated Press, labeled one Fox News reporter a potential criminal co-conspirator for inquiring about classified information and tried to force another to testify before a grand jury.
  •  
    "Mr. Holder said he believed it went too far at times when it targeted journalists." What Attorney-General Holder actually meant was that he believed it went too far at times when it targeted journalists *who work for major publishers."* Mr. Holder has allowed prosecutions of journalists who do not work for major publishing firms to proceed, e.g., Barrett Brown. 
Paul Merrell

New regs say passengers cannot fly without biometric ID card - Police State USA - 0 views

  • The ability to travel in the United States is about to become more restrictive as the TSA announces it will soon be enforcing new identification standards in American airports. Beginning in 2016, passengers attempting to pass through a federal TSA checkpoint will be subject to the requirements of the REAL ID Act. To that end, the TSA will put higher scrutiny on travelers’ identities, and will only accept a federal passport or a “REAL-ID” card, which is issued by the states to meet federal requirements. Passengers will not be allowed to fly through an American airport without submitting to the advanced federal specifications. Both federal passports and REAL-ID cards require a number of unique personal identifiers to be stored together in government databases, including his or her full name, date of birth, Social Security Number, scanned signature, and other identifiers. Both cards require biometric data: a front-facing digital photograph of the passenger’s face, which is ultimately used with a facial recognition database.
  • The enhanced security measures stem from the passage of the REAL ID Act of 2005, a U.S. law enacted by President Bush that states that a Federal agency may not accept state-issued identification cards without complying with a number of enhanced standards of the REAL ID Act. The states were given a number of years to comply, and many moved to pass their own laws to meet the benchmarks of the REAL ID Act. Due to some sluggish response, DHS extended the compliance deadline several times. Unfortunately, most states were all too willing to bend to the requirements of the federal government in order to obtain “state certifications” of compliance. To signify their compliance with the federal standards, many states are now issuing identity cards emblazoned with gold stars in the corner.
  • According to the Department of Homeland Security, only Arizona, Idaho, Louisiana, Maine, Minnesota, New Hampshire, New York, and American Samoa have not met REAL ID standards as of January 2015. By DHS estimates, 70%-80% of all U.S. drivers are already carrying around REAL ID cards or live in states that have received extensions for compliance. Some states have even gone as far as to require the applicant to present birth certificates, W-2 tax forms, bank statements, and/or pay stubs to verify one’s identity before handing out the new REAL-ID cards. Some cards have RFID chips embedded in them. Among the 39 benchmarks of the REAL ID Act, state ID cards have to be scannable with a bar code reader, and the states are required to share access to an electronic database with all other states.
  • ...4 more annotations...
  • Once DHS begins enforcing the REAL ID standards, Americans without a compliant state ID will be effectively prohibited from flying at a commercial airport. Passengers would need to obtain passports even to fly on planes that never leave the United States.
  • a few rose in opposition to REAL ID, including Congressman Ron Paul (R-TX), who was perhaps its most outspoken critic. Dr. Paul, a former presidential candidate, called REAL ID a “Trojan horse” which “transform[s] state drivers licenses into de facto national ID cards.” In an impassioned speech on the House floor on February 9, 2005, Paul laid out a number of specific objections to H.R. 418: The REAL ID Act establishes a national ID card by mandating that states include certain minimum identification standards on driver’s licenses. It contains no limits on the government’s power to impose additional standards. Indeed, it gives authority to the Secretary of Homeland Security to unilaterally add requirements as he sees fit.
  • Supporters claim it is not a national ID because it is voluntary. However, any state that opts out will automatically make non-persons out of its citizens. The citizens of that state will be unable to have any dealings with the federal government because their ID will not be accepted. They will not be able to fly or to take a train. In essence, in the eyes of the federal government they will cease to exist. It is absurd to call this voluntary. Republican Party talking points on this bill, which claim that this is not a national ID card, nevertheless endorse the idea that “the federal government should set standards for the issuance of birth certificates and sources of identification such as driver’s licenses.” So they admit that they want a national ID but at the same time pretend that this is not a national ID. This bill establishes a massive, centrally-coordinated database of highly personal information about American citizens: at a minimum their name, date of birth, place of residence, Social Security number, and physical and possibly other characteristics. What is even more disturbing is that, by mandating that states participate in the “Drivers License Agreement,” this bill creates a massive database of sensitive information on American citizens that will be shared with Canada and Mexico!
  • This bill could have a chilling effect on the exercise of our constitutionally guaranteed rights. It re-defines “terrorism” in broad new terms that could well include members of firearms rights and anti-abortion groups, or other such groups as determined by whoever is in power at the time. There are no prohibitions against including such information in the database as information about a person’s exercise of First Amendment rights or about a person’s appearance on a registry of firearms owners. REAL ID cards streamline the process for the centralization and federalization of our private biometric data, while offering very little true benefit. In the words of Congressman Ron Paul, the program “offers us a false sense of greater security at the cost of taking a gigantic step toward making America a police state.” Its difficult to argue otherwise when passports may soon be necessary to travel domestically.
  •  
    This is among the reasons I no longer fly. I refuse to be treated in that distrustful way by my government. Atthough I used to fly several hundred thousands of miles annually, if the airlines want my business, they need to actively and effectively oppose the emergence of the surveillance state. I reject the politics of fear that attempts to justify suppression of liberties. Where I travel is none of the government's business.
Paul Merrell

Australia's criminlisation of dissent: anti-protest law is an ominous sign of the times... - 0 views

  • Australia’s criminlisation of dissent: anti-protest law is an ominous sign of the times Share This Tags AustraliaTasmania Brendan Gogarty (TC) : The Workplaces (Protection from Protesters) Bill – locally known as the “anti-protest” bill – was passed by Tasmanian parliament late on Tuesday night. The law was introduced as part of the government’s intention to “re-build Tasmania’s forestry industry”. That is a source of controversy and division in Tasmanian society. To achieve its aim, the government has committed itself to a wide legislative agenda. This includes: amending the uniform Defamation Act 2005 to allow large companies to sue protesters; defunding community and conservation organisations; and tearing up a “peace deal” between foresters and conservationists, which had been enacted into law before the 2014 election.
  • Recognising the potential return to hostilities, the government said it would “not try and appease” protesters, but would rather “toughen the law to deter them”. The anti-protest law is its chosen mechanism of deterrence. While such hard-line policies on political opposition are not new, the severity and breadth of the law to enforce such a policy arguably is. The shift from hard-line policy to hard-line law is worrisome in a constitutional democracy. The spread of state anti-bikie laws in Australia illustrates why this law is not just of concern for Tasmanians.
  • The new law covers all acts on, or acts inhibiting access to, a business premises (all public and private land, including forestry and mining lands) which are: … in furtherance of, or for the purposes of promoting awareness of or support for an opinion, or belief, in respect of a political, environmental, social, cultural or economic issue. Any such protest is subject to significant penalties if they interrupt “business activity”. While originally such sanctions were mandatory, the government agreed in the upper house to exchange these for discretionary penalties. However, the government agreed to this only on condition that the subsequent maximum penalties would be significantly increased. This was to “send a strong message” to protesters and the courts charged with punishing them. As a consequence, protesters who repeatedly interrupt business face fines of up to A$10,000 and four years in jail.
  • ...1 more annotation...
  • From its inception, the law has been criticised by domestic and international lawyers. Three United Nations human rights rapporteurs considered the bill to breach international law, one describing it as “shocking”. They considered the legislation, as originally envisioned, to be: … disproportionate and unnecessary [creating a] chilling effect of silencing dissenters … [who are] key to raising awareness about human rights, political, [and] social concerns … holding not just governments, but also corporations accountable. A wide range of legal professionals have voiced similar criticisms. While the removal of mandatory penalties alleviated some concerns, the larger concern about a law designed solely to punish people for protesting against controversial business activities – especially publicly supported and funded ones – remains.
  •  
    Australia has neither constitution nor Bill of Rights. It shows.
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Classified Report on the C.I.A.'s Secret Prisons Is Caught in Limbo - The New York Times - 0 views

  • A Senate security officer stepped out of the December chill last year and delivered envelopes marked “Top Secret” to the Pentagon, the C.I.A., the State Department and the Justice Department. Inside each packet was a disc containing a 6,700-page classified report on the C.I.A.’s secret prison program and a letter from Senator Dianne Feinstein, urging officials to read the report to ensure that the lessons were not lost to time. Today, those discs sit untouched in vaults across Washington, still in their original envelopes. The F.B.I. has not retrieved a copy held for it in the Justice Department’s safe. State Department officials, who locked up their copy and marked it “Congressional Record — Do Not Open, Do Not Access” as soon as it arrived, have not read it either. Continue reading the main story Related Coverage document The Senate Committee’s Report on the C.I.A.’s Use of TortureDEC. 9, 2014 Panel Faults C.I.A. Over Brutality and Deceit in Terrorism InterrogationsDEC. 9, 2014 Senate Votes to Turn Presidential Ban on Torture Into LawJUNE 16, 2015 Outside Psychologists Shielded U.S. Torture Program, Report FindsJULY 10, 2015 Nearly a year after the Senate released a declassified 500-page summary of the report, the fate of the entire document remains in limbo, the subject of battles in the courts and in Congress. Until those disputes are resolved, the Justice Department has prohibited officials from the government agencies that possess it from even opening the report, effectively keeping the people in charge of America’s counterterrorism future from reading about its past. There is also the possibility that the documents could remain locked in a Senate vault for good.
  • In a letter to Attorney General Loretta E. Lynch last week, Ms. Feinstein, a California Democrat, said the Justice Department was preventing the government from “learning from the mistakes of the past to ensure that they are not repeated.”Although Ms. Feinstein is eager to see the document circulated, the Senate is now under Republican control. Her successor as head of the Intelligence Committee, Senator Richard M. Burr of North Carolina, has demanded that the Obama administration return every copy of the report. Mr. Burr has declared the report to be nothing more than “a footnote in history.”It was always clear that the full report would remain shielded from public view for years, if not decades. But Mr. Burr’s demand, which means that even officials with top security clearances might never read it, has reminded some officials of the final scene of “Raiders of the Lost Ark,” when the Ark of the Covenant is put into a wooden crate alongside thousands of others in a government warehouse of secrets.
  • The American Civil Liberties Union has sued the C.I.A. for access to the document, and at this point the case hinges on who owns it. Senate documents are exempt from public records laws, but executive branch records are not. In May, a federal judge ruled that even though Ms. Feinstein distributed the report to the executive branch, the document still belongs to Congress. That decision is under appeal, with court papers due this month.Justice Department officials defend their stance, saying that handling the document at all could influence the outcome of the lawsuit. They said that a State Department official who opened the report, read it and summarized it could lead a judge to determine that the document was an executive branch record, altering the lawsuit’s outcome. The Justice Department has also promised not to return the records to Mr. Burr until a judge settles the matter.“It’s quite bizarre, and I cannot think of a precedent,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. He said there are any number of classified Senate documents that are shared with intelligence agencies and remain as congressional records, even if they are read by members of the executive branch.
  • ...2 more annotations...
  • The full report is not expected to offer evidence of previously undisclosed interrogation techniques, but the interrogation sessions are said to be described in great detail. The report explains the origins of the program and names the officials involved. The full report also offers details on the role of each agency in the secret prison program.The Justice Department, which played a central role in approving the interrogation methods, has even prohibited its own officials from reading the full report.“The Department of Justice was among those parts of the executive branch that were misled about the program, and D.O.J. officials’ understanding of this history is critical to its institutional role going forward,” Ms. Feinstein wrote to the Justice Department last week in a letter she signed with Senator Patrick J. Leahy of Vermont, the top Democrat on the Judiciary Committee.In court, Justice Department lawyers have agreed with Mr. Burr’s contention that the document belongs to Congress. As evidence, they point to an agreement between the C.I.A. and the Senate as the Intelligence Committee began its lengthy investigation. The Senate was under Democratic control at the time.
  • The agreement says that any “documents, draft and final recommendations, reports or other materials” generated during the investigation are congressional documents. “As such these records are not C.I.A. records under the Freedom of Information Act,” the agreement says.The A.C.L.U. argues that agreement was void once Ms. Feinstein sent the report to the government agencies. Because she clearly intended the executive branch to use the report, the A.C.L.U. contends, the committee gave up control of the document.If Mr. Burr were to succeed in getting copies of the report returned to the Intelligence Committee, Mr. Aftergood said, he could slowly make it irrelevant.“The longer that it’s buried, the less relevant it becomes,” he said.
  •  
    If it is ultimately found that the report is an Executive Branch record, then the FOIA requires disclosure of all "segregable portions" that are not properly classified.  
Paul Merrell

Distrust of US surveillance threatens data deal | TheHill - 0 views

  • European privacy regulators are putting U.S. surveillance practices under the microscope, this time with a crucial transatlantic data deal hanging in the balance.Legal and privacy advocates say European nations are poised to strike down the deal if they decide the U.S. hasn't done enough to reform its spying programs.The new test comes after the European Commission and the Commerce Department — after months of tense negotiations — reached a deal this week permitting Facebook, Google and thousands of other companies to continue legally handling Europeans’ personal data.ADVERTISEMENTCritics though have long warned that unless the U.S. overhauls its privacy and national security laws, there is no legal framework that can stand up in European court, where privacy is considered a fundamental right under the EU Charter.A working group of 28 EU nations’ data protection authorities — domestic entities separate from the Commission that will be in charge of enforcing the new agreement — may now cast the deciding vote.The group is spending the next few months picking through the so-called Privacy Shield agreement to determine if it adequately protects the personal data of European citizens.
  • “The Commission has said, ‘We’re satisfied. We believe them. We believe the U.S. has substantially changed its practices,’ and they are no longer going off the [Edward] Snowden revelations in the media,” said Susan Foster, a privacy attorney at Mintz Levin who works in both the EU and the U.S.“Whether the working group will go along with it is another question.”The privacy advocate whose complaint against Facebook brought down the Privacy Shield’s 15-year-old predecessor agreement is already questioning the new deal’s validity.“With all due respect ... a couple of letters by the outgoing Obama administration is by no means a legal basis to guarantee the fundamental rights of 500 million European users in the long run, when there is explicit U.S. law allowing mass surveillance,” Max Schrems of Austria said in a statement Tuesday.The United States has been fighting against the perception that it tramples on civil liberties after ex-National Security Agency contractor Edward Snowden revealed the breadth of the agency’s snooping.One sticking point in the Privacy Shield negotiations was over the scope of an exception allowing surveillance for national security purposes.
  • In announcing the deal, Commission officials insisted that the U.S. had provided “detailed written assurances” that surveillance of Europeans’ data by intelligence agencies would be subject to appropriate limitations.“The U.S. has clarified that they do not carry out indiscriminate surveillance of Europeans,” Andrus Ansip, Vice President for the Digital Single Market on the European Commission, said Tuesday.The U.S. has also agreed to create an office in the State Department, to address complaints from EU citizens who feel their data has been inappropriately accessed by intelligence authorities.Complicating the working group’s approval of the deal is the hodgepodge of competing regulators in Europe. Each nation has an agency in charge of its own country’s regulation. Some countries — such as Germany — are seen as tougher on privacy than others, like France or the U.K.While some countries consider U.S. privacy protections to be satisfactory, in others they are seen as woefully inadequate.
  • ...2 more annotations...
  • Defenders of U.S. intelligence practices often point to France and the U.K., arguing they are equally intrusive with their citizens' data.A recent public report “pretty clearly documented that the protections are patchy, vary hugely and are nonexistent in some of the countries,” Foster noted.Privacy advocates dismiss those arguments.“You cannot pick the worst member state, like the U.K., and claim you are ‘equivalent’ to that,” Schrems said Tuesday. “First, this is not a price [sic] you want to win, secondly you have to meet the standards of the European Court of Justice, EU law and the EU Charter of Fundamental Rights — not the standard of the worst member state.”The U.S. has made significant reforms to federal spying powers under the Obama administration.The Privacy and Civil Liberties Oversight Board — a small bipartisan watchdog — on Friday said the government has begun addressing each of the nearly two-dozen recommendations it made following Snowden's revelations.“[I]mportant measures have been taken to enhance the protection of Americans’ privacy and civil liberties and to strengthen the transparency of the government’s surveillance efforts, without jeopardizing our counterterrorism efforts,” the five-member board said.
  • But whether European countries believe those changes are sufficient to sign off on the Privacy Shield is uncertain. Each of the EU’s 28 member states must approve the deal before it can be finalized.“A lot of this is going to come down to whether the data protection authorities are persuaded by the U.S.’s portrayal of the cumulative protections given to European citizens and the cumulative carving back on the NSA surveillance programs,” Foster said.If the European working group is not satisfied with the assurances from the Commerce Department, the consequences could be dire. Businesses fear a chilling of transatlantic trade, valued at $1 trillion in 2014.The most likely outcome, experts say, would be a patchwork of country-to-country regulations that would make it extremely expensive for companies to comply.Legislative changes in the U.S. seem unlikely. Congress is close to passing a privacy law considered crucial to getting seeing the Privacy Shield approved. But the bill — which gives EU citizens the right to sue in U.S. courts over the misuse of personal data — has sparked controversy on Capitol Hill.Some lawmakers are expressing frustration that the EU has used the threat of enforcement action against U.S. companies to push Congress to make more concessions.“It’s been hard enough to get the Judicial Redress Act passed — if they’re going to make more demands on Congress, there won’t be a lot of willing listeners here,” Sen. Chris Murphy (D-Conn.) told The Hill on Thursday.
Paul Merrell

Martin Shkreli Arrested on Securities Fraud Charges - 0 views

  • Martin Shkreli, a boastful pharmaceutical executive who came under withering criticism for price gouging vital drugs, denied securities fraud charges on Thursday following an early morning arrest, and was freed on a $5 million bond. While the 32-year-old has earned a rare level of infamy for his brazenness in business and his personal life, what he was charged with had nothing to do with skyrocketing drug prices. He is accused of repeatedly losing money for investors and lying to them about it, illegally taking assets from one of his companies to pay off debtors in another. “Shkreli essentially ran his company like a Ponzi scheme where he used each subsequent company to pay off defrauded investors from the prior company,” Brooklyn U.S. Attorney Robert Capers said at a press conference.
  • Evan Greebel, a New York lawyer, who is alleged in the federal indictment to have helped Shkreli in his schemes, was also arrested and charged. Like Shkreli, he pleaded not guilty, and he was freed on a $1 million bond. Both men and their lawyers declined to comment after their court appearance.
  • Read the full text of the indictment here In the federal indictment and a complaint by the Securities and Exchange Commission, authorities say Shkreli began losing money and lying to investors from the time he began managing money. In his mid-20s, he got nine investors to place $3 million with him and at one point he had only $331. Securities fraud is hardly unheard of on Wall Streeet and the amounts involved here are nowhere near on the scale of Bernie Madoff. But Shkreli’s case has drawn such attention because of his defiant price-gouging and his own up-by-the-bootstraps history. The son of immigrants from Albania and Croatia who did janitorial work and raised him and his brothers in working-class Brooklyn, Shkreli seemed at first to embody the American dream and then to mock it. After dropping out of an elite Manhattan high school, he worked as an intern for Jim Cramer’s hedge fund as a 17-year-old and quickly impressed with his ability to call stocks. He created hedge funds, taught himself biology and, after earning a BA at Baruch College in New York City, began hedge funds investing in biotech.
  • ...9 more annotations...
  • He became famous within a certain world but entered public consciousness after he raised the price more than 55-fold for Daraprim in September from $13.50 per pill to $750. It is the preferred treatment for a parasitic condition known as toxoplasmosis, which can be deadly for unborn babies and patients with compromised immune systems including those with HIV or cancer. His company, Turing Pharmaceuticals AG, bought the drug, moved it to a closed distribution system and instantly drove the price into the stratosphere. He drew shocked rebukes from Congress, doctors and presidential candidates, and brought public attention to the rising prices of older drugs. Donald Trump called Shkreli a “spoiled brat,” and the BBC dubbed him the “most hated man in America.” Bernie Sanders, the Democratic presidential candidate, rejected a $2,700 campaign donation from him, directing it to an HIV clinic. A spokesman said the campaign would not keep money “from this poster boy for drug company greed.” All the criticism seemed at first to have some impact and Shkreli said he would lower the price. Then he reneged. When Hillary Clinton tried one more time last month to get him to cut the cost, he dismissed her with the tweet “lol.” At a Forbes summit in New York this month, wearing a hooded sweatshirt, he said if he could have done it over, “I probably would have raised the price higher,” adding, “My investors expect me to maximize profits.”
  • Shkreli did further damage to his public image with other acts and boasts. He spent millions on the only copy of a Wu-Tang Clan album that music fans are desperate to hear and then told Bloomberg Businessweek that he had no immediate plans to listen to it. He takes often to Twitter and message boards, bragging about his business strategies, musical tastes and politics; he live-streams from his office for long stretches. The SEC complaint and federal indictment lay out a series of schemes and cover-ups carried out by Shkreli. Capers said authorities began investigating him as early as 2014.
  • Barely 23, he was managing hedge fund Elea Capital in New York and lost it all in 2007. Around then, a trade with Lehman Brothers ended with a $2.3 million judgment against him, prosecutors said. In 2010, he lost his clients’ $3 million investment in his new fund, MSMB Capital. In 2011, he bet that shares of Orexigen Therapeutics Inc. would fall and wound up owing $7 million to his broker, Merrill Lynch, authorities said. He couldn’t pay, and he, an unnamed accomplice and MSMB Capital eventually extinguished the debt with a $1.35 million settlement, they said. Part of that money came from his next firm, authorities said. After the collapse of MSMB Capital, Shkreli launched MSMB Healthcare with about $5 million from 13 investors. He paid himself “far in excess” of the agreed-upon 1 percent management fee and 20 percent profit incentive, according to the SEC.
  • Shkreli then used cash from MSMB Healthcare to invest in Retrophin, the pharmaceutical company he founded in 2011, even though it “had no products or assets,” prosecutors said. Later, he used the assets of Retrophin to repay angry investors in his hedge funds, prosecutors said. Shkreli is confident that he will be cleared of the charges, according to a statement on his behalf. Shkreli is particularly disappointed that his litigation with Retrophin has become a government enforcement matter, according to the statement. He also denied the charges regarding the MSMB entities, which he said involve complex accounting matters that prosecutors and the SEC fail to understand, according to the statement. “It is no coincidence that these charges, the result of investigations which have been languishing for considerable time, have been filed at the same time of Shkreli’s high-profile, controversial and yet unrelated activities,” according to the statement. “The government suggested that Mr. Shkreli was involved in a Ponzi scheme. Ponzi victims do not make money, yet Mr. Shkreli’s investors enjoyed strong results.”
  • As Shkreli’s losses mounted, so did his lies. He fabricated portfolio statements and, with his lawyer’s help, deceived the SEC and outside accountants. He backdated records, manufactured a phony loan agreement between Retrophin and a hedge fund, and created sham consulting agreements with Retrophin as a way to route the company’s cash to his earlier investors. Greebel, the arrested lawyer, made sure Retrophin’s outside accountants were unaware of Shkreli’s financial maneuvers and helped him concoct the consulting agreements used to repay the hedge fund investors, the U.S. said. The cases mirror a lawsuit brought by Retrophin. Shkreli blithely dismissed his old company’s claims, saying, “The $65 million Retrophin wants from me would not dent me. I feel great. I’m licking my chops over the suits I’m going to file against them.” Earlier, he had denied wrongdoing in a post on InvestorsHub after Retrophin disclosed it had received a subpoena from federal prosecutors and the preliminary findings from its own investigation of Shkreli. He called the company’s allegations “completely false, untrue at best and defamatory at worst.”
  • “Every transaction I’ve ever made at Retrophin was done with outside counsel’s blessing,” he said on the investment blog in February, without identifying the lawyers. When Shkreli was working for Cramer’s firm, he was still a teenager. After recommending successful trades, Shkreli eventually set up his own hedge fund, quickly developing a reputation for trashing biotechnology stocks in online chatrooms and shorting them, to enormous profit. Widely admired for his intellect and sharp eye, he set up Retrophin to develop drugs and acquire older pharmaceuticals that could be sold for higher profits. Turing, which is less than a year old and has raised $90 million in financing, has followed a similar strategy with the purchase of drugs, including Daraprim. Shkreli recently bought a majority stake in KaloBios Pharmaceuticals Inc. after Turing received a warning from the New York attorney general that the distribution network for Daraprim may violate antitrust laws. State officials made their concerns known to Turing and Shkreli in an Oct. 12 letter obtained by Bloomberg.
  • KaloBios recently acquired the license for benznidazole, a standard treatment for Chagas, a deadly parasitic infection most common in South and Central America. The firm announced plans to increase the cost from a couple hundred dollars for two months to a pricing structure like that for hepatitis-C drugs, which can run to nearly $100,000 for 12 weeks.
  • With the federal charges and regulatory actions, Shkreli could be banned from running a public company, which could put the future of KaloBios into question. Trading in KaloBios shares was halted after the stock fell 53 percent. It’s less clear what the impact could be on Turing, which is closely held.
  • Federal authorities will have to ask a judge to impose an asset freeze if they want to guarantee Shkreli doesn’t dispose of ill-gotten gains. The charges suggest that a small group of health-care firms—ones that acquire the rights to drugs and significantly increase their prices—is drawing the scrutiny of regulators and prosecutors, with a possible chilling effect on aggressive drug-pricing strategies. Legislators are already paying attention. A hearing of the Senate Special Committee on Aging on Dec. 9 scrutinized such tactics. Before Shkreli started Turing, Retrophin raised the price of Thiola, used to treat a rare condition causing debilitating recurrences of kidney stones, from $1.50 a pill to $30. “Some of these companies seem to act more like hedge funds than traditional pharmaceutical companies,” said Senator Susan Collins, a Maine Republican who ran the recent hearing. George Scangos, CEO of biotechnology giant Biogen Inc., went further, saying in an interview, “Turing is to a research-based company like a loan shark is to a legitimate bank.”
  •  
    Couldn't happen to a nicer guy.
Paul Merrell

Beware: Someone Is Trying to Convince You That Bernie Can't Win | Common Dreams | Break... - 0 views

  • Perhaps you’ve noticed. Some people and institutions are working feverishly to convince us that real social change is not possible. Their target is Bernie Sanders and the growing army of his supporters who are fed up with politics as usual and the grip of Wall Street and corporate America on our political, economic and social system. The theme is to desperately convince us that Sanders can’t win. They repeat it over and over, even though Sanders polls as well or better than Hillary Clinton does against every leading Republican candidate. Behind this effort is an alarmed corporate old guard that still runs the Democratic Party establishment and their allies in the corporate think tanks and the media, with a special nod to NBC/MSNBC, which is owned and operated by General Electric and Comcast.
  • In this scenario to blunt the Sanders’ surge, and what it represents for the millions of people who want to reverse income inequality, guarantee health care to everyone, break up the banks, carry out meaningful environmental justice and criminal justice reform, and all the other far reaching planks of Sanders’ campaign and the coalition supporting it. A thrust of their effort is to persuade Sanders supporters that he cannot win, in large part by using all the well-funded mechanisms in their control to retard wider exposure to the message of Sanders and his allies. The power elite form of turning down the gaslights. Here’s a small part of how the manipulation works. 
  • The Democratic National Committee slashes the number of debates and schedules debates on Saturday nights when far fewer people are watching, and pressures its elected officials and convention super delegates for an early endorsement in an effort to lock down a coronation of their preferred candidate. Meanwhile the media, in particular NBC/MSNBC which has the biggest network audience of presumed Democratic Party voters, limits coverage of Sanders while it’s parent company, GE, also directs its Hollywood subsidiaries, including Universal Studios (co-owned by Comcast) and its NBC shows, to line up its contracted celebrities to endorse the politics as usual campaign. Other national media, which also has a stake in the status quo, contributes as well. While Sanders has now drawn more than 400,000 people to his rallies – far more than any other candidate – he routinely receives less coverage than most of the other leading candidates. A report, circulated by Media Matters, found that on one network alone Donald Trump has been given 81 minutes of coverage compared to less than one minute for Sanders, even though, as The Nation’s John Nichols notes, Sanders has broader support among Democratic voters than Trump does among Republicans in the first voting state, Iowa.
  • ...1 more annotation...
  • In a fall speech to the DNC, Sanders put it bluntly. “The people of our country understand that given the collapse of the middle class and a grotesque level of income inequality, we do not need more establishment politics or establishment economics.”  “What we need,” Sanders emphasized, “is a political movement that is prepared to take on the billionaire class, a movement that works for all of us and not just the corporate class and a handful of the wealthiest people in this country.”  It’s a message, a campaign, and an uprising that has sent chills through those whose primarily loyalty is to the wealthy donors in mansions and corporate suites and the policy architects on Wall Street.  But it’s a message that sure has resonated in the grassroots.
  •  
    Sanders is getting the same treatment Ron Paul got last time around. But my guess is that like Trump, if elected Sanders wouldn't live long enough to take office. 
Paul Merrell

Report reveals 9 Israel lobby tactics to silence students | The Electronic Intifada - 0 views

  • Lawyers have responded to nearly 300 incidents of “censorship, punishment, or other burdening of advocacy for Palestinian rights” filed by Palestine solidarity activists on more than 65 US campuses in the last year and a half. Palestine Legal and the Center for Constitutional Rights (CCR) detail the assault in a new 124-page report, “The Palestine Exception to Free Speech: A Movement Under Attack in the US.” “As the movement for Palestinian rights is growing in the US, so too are concerted efforts to silence any and all criticism of Israel,” said Radhika Sainath, staff attorney with Palestine Legal and cooperating counsel with CCR. A video featuring students and members of faculty who have experienced silencing, repression and intimidation was also released by Palestine Legal and CCR and can be viewed above.
  • The report, which is the first of its kind, documents the suppression of Palestine advocacy in the US and identifies nine separate tactics Israel lobby groups use to crush Palestine solidarity activism — especially on campuses. The groups say that 85 percent of the hundreds of incidents to which Palestine Legal has responded since 2014 involving the targeting of students and scholars “include baseless legal complaints, administrative disciplinary actions, firings, harassment and false accusations of terrorism and anti-Semitism.” Such tactics have a chilling effect on speech, the report says. “These strategies … [result in] intimidating or deterring Palestinian solidarity activists from speaking out. The fear of punishment or career damage discourages many activists from engaging in activities that could be perceived as critical of Israel,” the report says. Sainath told The Electronic Intifada that “on the one hand, we’ve seen that peoples’ lives and reputations have been destroyed because of speaking out critically about Israel’s policies — one example is professor Steven Salaita, [whose story] is covered in the report.” Salaita was fired from the University of Illinois after he expressed his criticism of Israel’s attack on Gaza in the summer of 2014.
  • Meanwhile, lawyers and students say they are bracing for an array of dirty tactics being planned by Israel lobby groups. Earlier this year, Republican party mega-donor Sheldon Adelson, along with Haim Saban, billionaire supporter of the Democratic party, poured tens of millions of dollars into Israel lobby groups on campus with the explicit intent of suppressing Palestine rights-based organizing. “One of the things that we’re concerned about and preparing for is a wave of anti-boycott legislation,” Sainath said, “as well as increased efforts to stop students from introducing referendums or resolutions for Palestinian rights.”
  • ...2 more annotations...
  • Also today, Jewish Voice for Peace (JVP) released a 79-page report, “Stifling Dissent: How Israel’s Defenders Use False Charges of Anti-Semitism to Limit the Debate over Israel on Campus.” It lays out in detail the methods that Israel lobby groups use to stifle debate about Palestine. It also includes numerous case studies and accounts of employment discrimination against US professors who have been targeted for their political views on Israel. Tallie Ben-Daniel, academic advisory council coordinator for JVP, told The Electronic Intifada that the report grew out of concerns over “the climate of repression” around speech critical of Israel, especially following Salaita’s firing.
  • Ben-Daniel said that young Jews “are more critical of Israeli state policy than ever before, and are building coalitions through their Palestine solidarity work — and yet are silenced by the very organizations that are supposed to represent them on campus.” One section of JVP’s report “details how Jewish students are subjected to a political litmus test on Israel in order to participate in Jewish institutional life on campus.” Organizations such as Hillel, JVP points out, demand that their members abide by guidelines which prohibit co-sponsoring or supporting events of speakers who are critical of Israeli policies and who support the Palestinian-led boycott, divestment and sanctions (BDS) campaign. Ben-Daniel added that JVP’s report “only tallies the cases that gained national attention — there are innumerable more Jewish students who in all probability do not participate in institutional Jewish campus life because of this litmus test.” JVP says that the report is meant to educate and provide resources to students and faculty alike who may be facing repression or silencing on campus and in classrooms.
  •  
    A sign that BDS is beginning to make Israeli government truly worried about economic impacts, the Adelson/Saban big donations for anti-BDS work on U.S. college campuses. 
Paul Merrell

Civil Rights Coalition files FCC Complaint Against Baltimore Police Department for Ille... - 0 views

  • This week the Center for Media Justice, ColorOfChange.org, and New America’s Open Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network—and are doing so in a way that has a disproportionate impact on communities of color. Stingrays operate by mimicking a cell tower and directing all cellphones in a given area to route communications through the Stingray instead of the nearby tower. They are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship. Stingrays can also be configured to capture the content of communications. Because Stingrays operate on the same spectrum as cellular networks but are not actually transmitting communications the way a cell tower would, they interfere with cell phone communications within as much as a 500 meter radius of the device (Baltimore’s devices may be limited to 200 meters). This means that any important phone call placed or text message sent within that radius may not get through. As the complaint notes, “[d]epending on the nature of an emergency, it may be urgently necessary for a caller to reach, for example, a parent or child, doctor, psychiatrist, school, hospital, poison control center, or suicide prevention hotline.” But these and even 911 calls could be blocked.
  • The Baltimore Police Department could be among the most prolific users of cell site simulator technology in the country. A Baltimore detective testified last year that the BPD used Stingrays 4,300 times between 2007 and 2015. Like other law enforcement agencies, Baltimore has used its devices for major and minor crimes—everything from trying to locate a man who had kidnapped two small children to trying to find another man who took his wife’s cellphone during an argument (and later returned it). According to logs obtained by USA Today, the Baltimore PD also used its Stingrays to locate witnesses, to investigate unarmed robberies, and for mysterious “other” purposes. And like other law enforcement agencies, the Baltimore PD has regularly withheld information about Stingrays from defense attorneys, judges, and the public. Moreover, according to the FCC complaint, the Baltimore PD’s use of Stingrays disproportionately impacts African American communities. Coming on the heels of a scathing Department of Justice report finding “BPD engages in a pattern or practice of conduct that violates the Constitution or federal law,” this may not be surprising, but it still should be shocking. The DOJ’s investigation found that BPD not only regularly makes unconstitutional stops and arrests and uses excessive force within African-American communities but also retaliates against people for constitutionally protected expression, and uses enforcement strategies that produce “severe and unjustified disparities in the rates of stops, searches and arrests of African Americans.”
  • Adding Stingrays to this mix means that these same communities are subject to more surveillance that chills speech and are less able to make 911 and other emergency calls than communities where the police aren’t regularly using Stingrays. A map included in the FCC complaint shows exactly how this is impacting Baltimore’s African-American communities. It plots hundreds of addresses where USA Today discovered BPD was using Stingrays over a map of Baltimore’s black population based on 2010 Census data included in the DOJ’s recent report:
  • ...2 more annotations...
  • The Communications Act gives the FCC the authority to regulate radio, television, wire, satellite, and cable communications in all 50 states, the District of Columbia and U.S. territories. This includes being responsible for protecting cellphone networks from disruption and ensuring that emergency calls can be completed under any circumstances. And it requires the FCC to ensure that access to networks is available “to all people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.” Considering that the spectrum law enforcement is utilizing without permission is public property leased to private companies for the purpose of providing them next generation wireless communications, it goes without saying that the FCC has a duty to act.
  • But we should not assume that the Baltimore Police Department is an outlier—EFF has found that law enforcement has been secretly using stingrays for years and across the country. No community should have to speculate as to whether such a powerful surveillance technology is being used on its residents. Thus, we also ask the FCC to engage in a rule-making proceeding that addresses not only the problem of harmful interference but also the duty of every police department to use Stingrays in a constitutional way, and to publicly disclose—not hide—the facts around acquisition and use of this powerful wireless surveillance technology.  Anyone can support the complaint by tweeting at FCC Commissioners or by signing the petitions hosted by Color of Change or MAG-Net.
  •  
    An important test case on the constitutionality of stingray mobile device surveillance.
« First ‹ Previous 41 - 55 of 55
Showing 20 items per page