Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged chilling-speech

Rss Feed Group items tagged

Paul Merrell

Frightening People into Silence by Andrew P. Napolitano -- Antiwar.com - 0 views

  • by Andrew P. Napolitano, July 17, 2014 Print This | Share This “Chilling” is the word lawyers use to describe governmental behavior that does not directly interfere with constitutionally protected freedoms, but rather tends to deter folks from exercising them. Classic examples of “chilling” occurred in the 1970s, when FBI agents and U.S. Army soldiers, in business suits with badges displayed or in full uniform, showed up at anti-war rallies and proceeded to photograph and tape record protesters. When an umbrella group of protesters sued the government, the Supreme Court dismissed the case, ruling that the protesters lacked standing – meaning, because they could not show that they were actually harmed, they could not invoke the federal courts for redress. Yet, they were harmed, and the government knew it. Years after he died, longtime FBI boss J. Edgar Hoover was quoted boasting of the success of this program. The harm existed in the pause or second thoughts that protesters gave to their contemplated behavior because they knew the feds would be in their faces – figuratively and literally. The government’s goal, and its limited success, was to deter dissent without actually interfering with it. Even the government recognized that physical interference with and legal prosecutions of pure speech are prohibited by the First Amendment. Eventually, when this was exposed as part of a huge government plot to stifle dissent, known as COINTELPRO, the government stopped doing it.
  • Until now. Now, the government fears the verbal slings and arrows of dissenters, even as the means for promulgating one’s criticisms of the government in general and of President Obama in particular have been refined and enhanced far beyond those available to the critics of the government in the 1970s. So, what has the Obama administration done to stifle, or chill, the words of its detractors? For starters, it has subpoenaed the emails and home telephone records of journalists who have either challenged it or exposed its dark secrets. Among those journalists are James Risen of The New York Times and my colleague and friend James Rosen of Fox News. This is more personal than the NSA spying on everyone, because a subpoena is an announcement that a specific person’s words or effects have been targeted by the government, and that person continues to remain in the government’s crosshairs until it decides to let go.
  • This necessitates hiring legal counsel and paying legal fees. Yet, the targeting of Risen and Rosen was not because the feds alleged that they broke the law – there were no such allegations. Rather, the feds wanted to see their sources and their means of acquiring information. What journalist could perform his work with the feds watching? The reason we have a First Amendment is to assure that no journalist would need to endure that.
  • ...2 more annotations...
  • And just last week, Attorney General Eric Holder, while in London, opined that much of the criticism of Obama is based on race – meaning that if Obama were fully white, his critics would be silent. This is highly inflammatory, grossly misleading, patently without evidential support and, yet again, chilling. Tagging someone as a racist is the political equivalent of applying paint that won’t come off. Were the Democrats who criticized Attorney General Alberto Gonzales or Secretary of State Condoleezza Rice racists? Is it appropriate for government officials to frighten people into silence by giving them pause before they speak, during which they basically ask themselves whether the criticism they are about to hurl is worth the pain the government will soon inflict in retaliation? The whole purpose of the First Amendment is to permit, encourage and even foment open, wide, robust debate about the policies and personnel of the government. That amendment presumes that individuals – not the government – will decide what language to read and hear. Because of that amendment, the marketplace of ideas – not the government – will determine which criticisms will sink in and sting and which will fall by the wayside and be forgotten.
  • Surely, government officials can use words to defend themselves; in fact, one would hope they would. Yet, when the people fear exercising their expressive liberties because of how the governmental targets they criticize might use the power of the government to stifle them, we are no longer free. Expressing ideas, no matter how bold or brazen, is the personal exercise of a natural right that the government in a free society is powerless to touch, directly or indirectly. Yet, when the government succeeds in diminishing public discourse so that it only contains words and ideas of which the government approves, it will have succeeded in establishing tyranny. This tyranny – if it comes – will not come about overnight. It will begin in baby steps and triumph before we know it. Yet we do know that it already has begun.
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

DOJ confirms Holder OK'd search warrant for Fox News reporter's emails - Open Channel - 0 views

  • The Justice Department pledged Friday to to review its policies relating to the seizure of information from journalists after acknowledging that a controversial search warrant for a  Fox News reporter’s private emails  was approved “at the highest levels” of the Justice Department, including “discussions” with Attorney General  Eric Holder.
  • The statement, confirming an NBC News account of Holder’s role, defended the secret warrant to obtain reporter James Rosen’s emails as a legitimate step to obtain evidence as part of an investigation of Stephen Kim. A former intelligence analyst, Kim has since been indicted under the Espionage Act for leaking classified information to Rosen about North Korea. He has denied the charges.
  • Nevertheless, said the official, who spoke on condition of anonymity, Holder “understands the concerns that have been raised by the media and has initiated a re-evaluation of existing department policies and procedures.” The official said the department must strike “the appropriate balance” between preventing leaks of classified information and “First Amendment rights,”adding that passage of a new media shield law “and appropriate updates to the department”s internal guidelines” will help achieve that.   The statement comes  amid a firestorm of criticism from news media groups over the Rosen search warrant and a secret subpoena for the phone records of AP reporters. It also comes one day after President Obama addressed the issue in a major speech on counter-terrorism policy, saying "I am troubled by the possibility that leak investigations may chill the investigative journalism that holds government accountable," Obama said. "Journalists should not be at legal risk for doing their jobs."
  •  
    Re "President Obama addressed the issue in a major speech on counter-terrorism policy, saying "I am troubled by the possibility that leak investigations may chill the investigative journalism that holds government accountable," Obama said. "Journalists should not be at legal risk for doing their jobs." That's unless they're not working with a mainstream media company, of course. Witness continuing U.S. efforts to extradite and prosecute Wikileaks founder Julian Assange under the Espionage Act because of the massive leak of classified documents to Wikileaks for which Private Bradley Manning is being prosecuted.
Paul Merrell

American Writers are Self-Censoring to Avoid NSA Scrutiny (McCauley) | Informed Comment - 0 views

  • Recent disclosures of the NSA's widespread dragnet program coupled with its frequent targeting of journalists are having a 'chilling effect' on American writers, stifling their freedom of expression at great detriment to society, says a new report Chilling Effects: NSA Surveillance Drives U.S. Writers to Self Censor.
  • Published Tuesday by the group PEN America—an organization of writers dedicated to advancing literature and promoting free speech for writers around the world—surveyed 520 American writers and found they are "not only overwhelmingly worried about government surveillance, but are engaging in self-censorship as a result."
  •  
    Lots more detail about the poll in the article, giving stark evidence that NSA surveillance is causing journalists and other authors to self-censor on topics likely to result in NSA targeting, as well as avoiding email and telephone investigation of touchy subjects.  One might reasonably also cite this poll as evidence that journalists and non-fiction authors do not trust U.S. government to respect their First Amendment rights of expression and anonymous communication.  
Gary Edwards

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • “What constitutes due process in this case is a due process in war.”
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
Paul Merrell

Canadians have united to reject fear and stop Bill C-51. Will the government listen? | ... - 0 views

  • It's rare in Canadian politics to see intense public interest in government legislative proposals -- let alone to see Canadians take to the streets in the tens of thousands to protest a piece of legislation by name. Yet that's exactly what has happened in the case of Bill C-51, which critics, including The Globe and Mail's editorial team, say will undermine basic democratic values and lead to the creation of a "secret police force" in Canada. In the space of a few short months since Bill C-51 was announced, hundreds of thousands of people have taken action to stop it: signing petitions, writing letters to local newspapers, phoning and writing to their member of Parliament, and hitting the streets in nationwide demonstrations in over 70 communities across Canada. It's not hard to see why so many people are concerned. Canada's top privacy and security experts warn that this legislation will undermine democratic rights Canadians have enjoyed for generations. For example, according to professors Craig Forcese and Kent Roach, who have conducted a detailed legal analysis of the legislation, Bill C-51 will:
  • Undermine Canadians' privacy by allowing widespread information disclosures among government agencies, and by giving the Canadian Security and Intelligence Service (CSIS) access to personal information held by up to 17 government departments. Even Stephen Harper has admitted that these kinds of dragnet surveillance measures are ineffective. Chill free speech online by criminalizing what is loosely defined as the promotion of "terrorism offences in general" and even showing "reckless disregard" for whether a particular post may encourage a violent act. As Forcese and Roach point out in their testimony to the Senate Standing Committee on National Security and Defence, "The new speech crime in our view violates freedom of expression because it reaches well beyond the sort of speech that threatens actual violence." Dramatically expand the powers of CSIS, without any commensurate increase in oversight or review measures. The legislation even allows CSIS to obtain a warrant permitting them to break the law and contravene the Charter rights of Canadians. Under C-51, such warrants would be granted in a secret hearing, with no representation from the target of such measures, and with no right of appeal.
  • So it's no surprise that Canadians are worried. What is unprecedented however, is the sheer number of Canadians taking part in the campaign to stop the bill. My organization, OpenMedia, has been campaigning on privacy issues for years -- but in all our time, we've never seen a public outpouring quite like this. Our joint efforts are clearly having an impact: public opinion has swung dramatically against Bill C-51 since it was announced. Support has plummeted, with a recent Forum Research poll finding that 56 per cent of Canadians now oppose Bill C-51, with just 33 per cent in favour. The business community, civic society groups, and principled conservatives have all spoken out. Sadly, there's no sign that the government is listening. At the time of writing, the government seems determined to use its majority to ram the legislation through the Commons in the coming weeks. What's even more worrying is that this reckless, dangerous, and ineffective legislation will further undermine Canadians' privacy rights -- rights that have already been seriously damaged by the government's Bill C-13, passed late last year, and by the government's failure to address the mass surveillance activities of its Canadian Security Establishment (CSE) intelligence agency.
Paul Merrell

Report reveals 9 Israel lobby tactics to silence students | The Electronic Intifada - 0 views

  • Lawyers have responded to nearly 300 incidents of “censorship, punishment, or other burdening of advocacy for Palestinian rights” filed by Palestine solidarity activists on more than 65 US campuses in the last year and a half. Palestine Legal and the Center for Constitutional Rights (CCR) detail the assault in a new 124-page report, “The Palestine Exception to Free Speech: A Movement Under Attack in the US.” “As the movement for Palestinian rights is growing in the US, so too are concerted efforts to silence any and all criticism of Israel,” said Radhika Sainath, staff attorney with Palestine Legal and cooperating counsel with CCR. A video featuring students and members of faculty who have experienced silencing, repression and intimidation was also released by Palestine Legal and CCR and can be viewed above.
  • The report, which is the first of its kind, documents the suppression of Palestine advocacy in the US and identifies nine separate tactics Israel lobby groups use to crush Palestine solidarity activism — especially on campuses. The groups say that 85 percent of the hundreds of incidents to which Palestine Legal has responded since 2014 involving the targeting of students and scholars “include baseless legal complaints, administrative disciplinary actions, firings, harassment and false accusations of terrorism and anti-Semitism.” Such tactics have a chilling effect on speech, the report says. “These strategies … [result in] intimidating or deterring Palestinian solidarity activists from speaking out. The fear of punishment or career damage discourages many activists from engaging in activities that could be perceived as critical of Israel,” the report says. Sainath told The Electronic Intifada that “on the one hand, we’ve seen that peoples’ lives and reputations have been destroyed because of speaking out critically about Israel’s policies — one example is professor Steven Salaita, [whose story] is covered in the report.” Salaita was fired from the University of Illinois after he expressed his criticism of Israel’s attack on Gaza in the summer of 2014.
  • Meanwhile, lawyers and students say they are bracing for an array of dirty tactics being planned by Israel lobby groups. Earlier this year, Republican party mega-donor Sheldon Adelson, along with Haim Saban, billionaire supporter of the Democratic party, poured tens of millions of dollars into Israel lobby groups on campus with the explicit intent of suppressing Palestine rights-based organizing. “One of the things that we’re concerned about and preparing for is a wave of anti-boycott legislation,” Sainath said, “as well as increased efforts to stop students from introducing referendums or resolutions for Palestinian rights.”
  • ...2 more annotations...
  • Also today, Jewish Voice for Peace (JVP) released a 79-page report, “Stifling Dissent: How Israel’s Defenders Use False Charges of Anti-Semitism to Limit the Debate over Israel on Campus.” It lays out in detail the methods that Israel lobby groups use to stifle debate about Palestine. It also includes numerous case studies and accounts of employment discrimination against US professors who have been targeted for their political views on Israel. Tallie Ben-Daniel, academic advisory council coordinator for JVP, told The Electronic Intifada that the report grew out of concerns over “the climate of repression” around speech critical of Israel, especially following Salaita’s firing.
  • Ben-Daniel said that young Jews “are more critical of Israeli state policy than ever before, and are building coalitions through their Palestine solidarity work — and yet are silenced by the very organizations that are supposed to represent them on campus.” One section of JVP’s report “details how Jewish students are subjected to a political litmus test on Israel in order to participate in Jewish institutional life on campus.” Organizations such as Hillel, JVP points out, demand that their members abide by guidelines which prohibit co-sponsoring or supporting events of speakers who are critical of Israeli policies and who support the Palestinian-led boycott, divestment and sanctions (BDS) campaign. Ben-Daniel added that JVP’s report “only tallies the cases that gained national attention — there are innumerable more Jewish students who in all probability do not participate in institutional Jewish campus life because of this litmus test.” JVP says that the report is meant to educate and provide resources to students and faculty alike who may be facing repression or silencing on campus and in classrooms.
  •  
    A sign that BDS is beginning to make Israeli government truly worried about economic impacts, the Adelson/Saban big donations for anti-BDS work on U.S. college campuses. 
Paul Merrell

How the FBI Created a Terrorist - The Intercept - 0 views

  • Informant-led sting operations are central to the FBI’s counterterrorism program. Of 508 defendants prosecuted in federal terrorism-related cases in the decade after 9/11, 243 were involved with an FBI informant, while 158 were the targets of sting operations. Of those cases, an informant or FBI undercover operative led 49 defendants in their terrorism plots, similar to the way Osmakac was led in his. In these cases, the FBI says paid informants and undercover agents are foiling attacks before they occur. But the evidence suggests — and a recent Human Rights Watch report on the subject illustrates — that the FBI isn’t always nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own.
  • At least in Osmakac’s case, FBI agents seem to agree with that criticism, though they never intended for that admission to become public. In the Osmakac sting, the undercover FBI agent went by the pseudonym “Amir Jones.” He’s the guy behind the camera in Osmakac’s martyrdom video. Amir, posing as a dealer who could provide weapons, wore a hidden recording device throughout the sting. The device picked up conversations, including, apparently, back at the FBI’s Tampa Field Office, a gated compound beneath the flight path of Tampa International Airport, among agents and employees who assumed their words were private and protected. These unintentional recordings offer an exclusive look inside an FBI counterterrorism sting, and suggest that, even in the eyes of the FBI agents involved, these sting targets aren’t always the threatening figures they are made out to be.
  • OW OSMAKAC CAME to the attention of law enforcement in the first place is still unclear. In a December 2012 Senate floor speech, Dianne Feinstein, chairwoman of the Senate Intelligence Committee, cited Osmakac’s case as one of nine that demonstrated the effectiveness of surveillance under the FISA Amendments Act. Senate legal counsel later walked back those comments, saying they were misconstrued. Osmakac is among terrorism defendants who were subjected to some sort of FISA surveillance, according to court records, but whether he was under individual surveillance or identified through bulk collection is unknown. Discovery material referenced in a defense motion included a surveillance log coversheet with the description, “CT-GLOBAL EXTREMIST INSPIRED.” If he first came onto the FBI’s radar as a result of eavesdropping, then it’s plausible that as part of the sting, the FBI manufactured another explanation for his targeting. This is a long-running, if controversial process known as “parallel construction,” which has also been used by the U.S. Drug Enforcement Administration when drug offenders are identified through bulk collection and then prosecuted for drug crimes. In court records, the FBI maintained that Osmakac came to agents’ attention through Dabus. The informant reached out to the FBI after meeting Osmakac, and soon offered him a job at Java Village.
  •  
    A judge denied the defense access to FBI transcripts of conversations among agents on grounds that they would provide no assistance to the defense beyond what was available to the defense by discovery. He also entered a protective order barring their disclosure. The defendant was found guilty and sentenced to 40 years in prison.  But the FBI transcripts were leaked to The Intercept, apparently by someone inside the Dept. of Justice or the judicial system, since the defense never was provided with them. The transcripts along with evidence from the case and gathered through interviews provide a chilling look into the methods the FBI uses to manufacture "terrorists" for prosecution and conviction (in this case victimizing a young Muslim American with a severe mental illness), obviously only for propaganda and to justify its counter-terrorism budget. This is an area that needs Congressional attention. The courts' protections from entrapment are far too lax, particularly when members of a particular religion are being targeted for political reasons and anti-Muslim hysteria is sweeping the land. The government should not be permitted to manufacture criminals.
Gary Edwards

Liberal Activists Worked With AGs to Target Conservatives - 0 views

  • violate “constitutionally protected rights of freedom of speech, freedom from unreasonable searches and seizures, and due process of law and constitute the common law tort of abuse of process.”
  • ExxonMobil also alleges that Walker’s delegation of his prosecutorial power to a private law firm “likely on a contingency-fee basis” violates basic “due process of law and fundamental fairness,” particularly because that same law firm has “pursued a bitterly contested and contentious litigation in an unrelated lawsuit against ExxonMobil … which could result in a substantial fee award if Cohen Milstein’s client were to prevail.”
  • That raises “substantial doubts about whether that firm should be permitted to serve as the ‘disinterested prosecutor’ whose impartiality is demanded by law and expected by the public.”
  • ...6 more annotations...
  • ExxonMobil asks the Texas court to declare that the “issuance and mailing of the subpoena” violates various provisions of the U.S. Constitution, federal law, and the Texas Constitution.
  • . According to The Washington Free Beacon, “a small coalition of prominent climate change activists and political operatives” met on Jan. 8 in a closed door meeting at the Rockefeller Family Fund in Manhattan. Their agenda: taking down oil giant ExxonMobil through a coordinated campaign of legal action, divestment efforts, and political pressure.”
  • A copy of the agenda from that meeting states that two of the common goals of these activists are to “establish in public’s mind [sic.] that Exxon is a corrupt institution that has pushed humanity (and all creation) toward climate chaos and grave harm” and to “delegitimize them as a political actor.” Part of the discussion of their grand strategy was how to include “industry associations, scientists and front groups” in their targeting. And at the top of their list for “legal actions & related campaigns” was state “AGs.”
  • That last goal was apparently put into action. According to Fox News, a series of emails obtained by the Energy & Environmental Legal Institute showed communications between some of these same anti-fossil fuel activists and the attorneys general that are part of this “Green” coalition against climate change dissenters.
  • Some of them secretly briefed state attorneys general before their March press conference on arguments they could present to justify “climate change litigation” and the “imperative of taking action now.” The attorneys general and their staff tried to hide this discussion and coordination with the activists by “using a ‘Common Interest Agreement’… [that] sought to protect as privileged the discussions about defending President Obama’s controversial global warming rules, and going after political opponents using the Racketeer Influenced and Corrupt Organizations Act.”
  • Some state attorneys general have criticized the dangerous and misguided efforts of their inquisitorial peers. As Louisiana Attorney General Jeff Landry correctly states, they are using “prosecutorial weapons to intimidate critics, silence free speech, or chill the robust exchange of ideas” about a public policy issue. And it is just as malevolent as the burning of books in the society depicted by Bradbury in “Fahrenheit 451.”
  •  
    "In Ray Bradbury's classic dystopian novel, "Fahrenheit 451," a future society criminalizes the possession of books and burns them in order to suppress any dissenting ideas, opinions, and views. Today, we have state attorneys general trying to implement their own version of "Fahrenheit 451" to criminalize dissent over a disputed, unproven scientific theory: man-induced climate change. Recently, the attorney general of the Virgin Islands, Claude Walker, unleashed a subpoena on the Competitive Enterprise Institute seeking 10 years' worth of research and communications about climate change. It turns out that same Grand Inquisitor, Claude Walker, has hit ExxonMobil with a similar subpoena that seeks all of that company's communications, conversations, and correspondence with 88 conservative and libertarian think tanks, foundations, and universities, and 54 individual researchers, scientists, and writers."
Paul Merrell

Homeland Battlefield Act Portion Found Unconstitutional By New York Judge - 0 views

  • WASHINGTON -- A day before Congress weighs an amendment to end indefinite military detentions in the U.S., a federal judge Wednesday ruled the law that allows the practice unconstitutional. Saying the measure has "chilling impact on First Amendment rights," U.S. District Judge Katherine Forrest, of New York's Eastern District, found that a group of reporters and activists who brought the lawsuit had no way of knowing whether they could be subjected to it. That makes it an unconstitutional infringement on the First Amendment's free speech right and the Fifth Amendment's right to due process, Forrest said in a written opinion.
  • Reps. Adam Smith (D-Wash.) and Justin Amash (R-Mich.) are offering an amendment on Thursday to the 2013 Defense Authorization Act that would end the law. Amash sent an appeal to fellow lawmakers soon after the ruling, asking them to pass it. "The amendment I’m offering with Rep. Adam Smith is the ONLY amendment that ensures that persons arrested on U.S. soil aren’t detained indefinitely without charge or trial," Amash wrote. "Voting against the Smith-Amash amendment allows the government to retain the power to detain persons, picked up in the U.S., for life, on the suspicion that they 'substantially supported' forces 'associated' with our enemies." "If our constituents haven’t sent a clear enough message, tonight’s ruling surely does: Congress must act now to guarantee the constitutional right to a charge and a trial," Amash wrote.
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Obama's "War on Ebola" or War for Oil? Sending 3000 Troops to African "Ebola" Areas tha... - 0 views

  • For a Nobel Peace Prize President, Barack Obama seems destined to go down in history books as the President who presided over one of the most aggressive series of wars ever waged by a bellicose Washington Administration. Not even George Bush and Dick Cheney came close.
  • Now Obama’s advisers, no doubt led by the blood-thirsty National Security Adviser, Susan Rice, have come up with a new war. This is the War Against Ebola. On September 16, President Obama solemnly declared the war. He announced, to the surprise of most sane citizens, that he had ordered 3,000 American troops, the so-called “boots on the ground” that the Pentagon refuses to agree to in Syria, to wage a war against….a virus? In a carefully stage-managed appearance at the US Centers for Disease Control (CDC), Obama read a bone-chilling speech. He called the alleged Ebola outbreaks in west Africa, “a global threat, and it demands a truly global response. This is an epidemic that is not just a threat to regional security. It’s a potential threat to global security, if these countries break down, if their economies break down, if people panic,” Obama continued, conjuring images that would have made Andromeda Strain novelist Michael Chrichton drool with envy. Obama added, “That has profound effects on all of us, even if we are not directly contracting the disease. This outbreak is already spiraling out of control.”
  • With that hair-raising introduction, the President of the world’s greatest Superpower announced his response. In his role as Commander-in-Chief of the United States of America announced he has ordered 3,000 US troops to west Africa in what he called, “the largest international response in the history of the CDC.” He didn’t make clear if their job would be to shoot the virus wherever it reared its ugly head, or to shoot any poor hapless African suspected of having Ebola. Little does it matter that the US military doesn’t have anywhere near 3,000 troops with the slightest training in public health. Before we all panic and line up to receive the millions of doses of untested and reportedly highly dangerous “Ebola vaccines” the major drug-makers are preparing to dump on the market, some peculiarities of this Ebola outbreak in Africa are worth noting.
  • ...6 more annotations...
  • A major problem for Chan and her backers, however, is that her Ebola statistics are very, very dubious. For those whose memory is short, this is the same Dr Margaret Chan at WHO in Geneva who was guilty in 2009 of trying to panic the world into taking unproven vaccines for “Swine Flu” influenza, by declaring a Global Pandemic with statistics calling every case of symptoms that of the common cold to be “Swine Flu,” whether it was runny nose, coughing, sneezing, sore throat. That changed WHO definition of Swine Flu allowed the statistics of the disease to be declared Pandemic. It was an utter fraud, a criminal fraud Chan carried out, wittingly or unwittingly (she could be simply stupid but evidence suggests otherwise), on behalf of the major US and EU pharmaceutical cartel. In a recent Washington Post article it was admitted that sixty-nine percent of all the Ebola cases in Liberia registered by WHO have not been laboratory confirmed through blood tests. Liberia is the epicenter of the Ebola alarm in west Africa. More than half of the alleged Ebola deaths, 1,224, and nearly half of all cases, 2,046, have been in Liberia says WHO. And the US FDA diagnostic test used for the lab confirmation of Ebola is so flawed that the FDA has prohibited anyone from claiming they are safe or effective. That means, a significant proportion of the remaining 31 % of the Ebola cases lab confirmed through blood tests could be false cases.
  • Then the official WHO Ebola Fact Sheet dated September, 2014, states, “It can be difficult to distinguish EVD from other infectious diseases such as malaria, typhoid fever and meningitis.” Excuse me, Dr Margaret Chan, can you say that slowly? It can be difficult to distinguish EVD from other infectious diseases such as malaria, typhoid fever and meningitis? And you admit that 69% of the declared cases have never been adequately tested? And you state that the Ebola symptoms include “sudden onset of fever fatigue, muscle pain, headache and sore throat. This is followed by vomiting, diarrhea, rash, symptoms of impaired kidney and liver function, and in some cases, both internal and external bleeding”? In short it is all the most vague and unsubstantiated basis that lies behind President Obama’s new War on Ebola.
  • One striking aspect of this new concern of the US President for the situation in Liberia and other west African states where alleged surges of Ebola are being claimed is the presence of oil, huge volumes of untapped oil. The offshore coast of Liberia and east African ‘Ebola zones’ conveniently map with the presence of vast untapped oil and gas resources shown here The issue of oil in west Africa, notably in the waters of the Gulf of Guinea have become increasingly strategic both to China who is roaming the world in search of future secure oil import sources, and the United States, whose oil geo-politics was summed up in a quip by then Secretary of State Henry Kissinger in the 1970’s: ‘If you control the oil, you control entire nations.’
  • The Obama Administration and Pentagon policy has continued that of George W. Bush who in 2008 created the US military Africa Command or AFRICOM, to battle the rapidly-growing Chinese economic presence in Africa’s potential oil-rich countries. West Africa is a rapidly-emerging oil treasure, barely tapped to date. A US Department of Energy study projected that African oil production would rise 91 percent between 2002 and 2025, much from the region of the present Ebola alarm. Chinese oil companies are all over Africa and increasingly active in west Africa, especially Angola, Sudan and Guinea, the later in the epicenter of Obama’s new War on Ebola troop deployment.
  • If the US President were genuine about his concern to contain a public health emergency, he could look at the example of that US-declared pariah Caribbean nation, Cuba. Reuters reports that the Cuban government, a small financially distressed, economically sanctioned island nation of 11 million people, with a national budget of $50 billion, Gross Domestic Product of 121 billion and per capita GDP of just over $10,000, is dispatching 165 medical personnel to Africa to regions where there are Ebola outbreaks. Washington sends 3,000 combat troops. Something smells very rotten around the entire Ebola scare.
  • F. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine “New Eastern Outlook”
Paul Merrell

C.I.A. Officer Is Found Guilty in Leak Tied to Times Reporter - NYTimes.com - 0 views

  • Jeffrey A. Sterling, a former Central Intelligence Agency officer, was convicted of espionage Monday on charges that he told a reporter for The New York Times about a secret operation to disrupt Iran’s nuclear program.The conviction is a significant victory for the Obama administration, which has conducted an unprecedented crackdown on officials who speak to journalists about security matters without the administration’s approval. Prosecutors prevailed after a yearslong fight in which the reporter, James Risen, refused to identify his sources.
  • On the third day of deliberations, the jury in federal court in Alexandria, Va., convicted Mr. Sterling on nine felony counts. Mr. Sterling, who worked for the C.I.A. from 1993 to 2002 and now lives in O’Fallon, Mo., faces a maximum possible sentence of decades in prison, though the actual sentence is likely to be far shorter. Judge Leonie M. Brinkema of Federal District Court, who presided over the weeklong trial, allowed Mr. Sterling to remain free on bond and set sentencing for April 24.
  • The Justice Department had no direct proof that Mr. Sterling, who managed the Iranian operation, provided the information to Mr. Risen, but prosecutors stitched together a strong circumstantial case.
  • ...3 more annotations...
  • The trial was part Washington spectacle, part cloak and dagger. Former Secretary of State Condoleezza Rice testified, as did C.I.A. operatives who gave only their first names and last initials, with their faces shielded behind seven-foot-high partitions. A scientist was referred to only by his code name, Merlin. His wife was Mrs. Merlin.Officials revealed their preferred strategies for persuading reporters not to run sensitive stories. Jurors learned that, at the C.I.A.’s office in New York, employees could easily walk out with classified documents and never be searched.
  • Mr. Sterling is the latest in a string of former officials and contractors the Obama administration has charged with discussing national security matters with reporters. Under all previous presidents combined, three people had faced such prosecutions. Under President Obama, there have been eight cases, and journalists have complained that the crackdown has discouraged officials from discussing even unclassified security matters.
  • While the administration has defended the crackdown, Mr. Holder said he believed it went too far at times when it targeted journalists. Under Mr. Holder, prosecutors seized phone records from The Associated Press, labeled one Fox News reporter a potential criminal co-conspirator for inquiring about classified information and tried to force another to testify before a grand jury.
  •  
    "Mr. Holder said he believed it went too far at times when it targeted journalists." What Attorney-General Holder actually meant was that he believed it went too far at times when it targeted journalists *who work for major publishers."* Mr. Holder has allowed prosecutions of journalists who do not work for major publishing firms to proceed, e.g., Barrett Brown. 
Paul Merrell

New regs say passengers cannot fly without biometric ID card - Police State USA - 0 views

  • The ability to travel in the United States is about to become more restrictive as the TSA announces it will soon be enforcing new identification standards in American airports. Beginning in 2016, passengers attempting to pass through a federal TSA checkpoint will be subject to the requirements of the REAL ID Act. To that end, the TSA will put higher scrutiny on travelers’ identities, and will only accept a federal passport or a “REAL-ID” card, which is issued by the states to meet federal requirements. Passengers will not be allowed to fly through an American airport without submitting to the advanced federal specifications. Both federal passports and REAL-ID cards require a number of unique personal identifiers to be stored together in government databases, including his or her full name, date of birth, Social Security Number, scanned signature, and other identifiers. Both cards require biometric data: a front-facing digital photograph of the passenger’s face, which is ultimately used with a facial recognition database.
  • The enhanced security measures stem from the passage of the REAL ID Act of 2005, a U.S. law enacted by President Bush that states that a Federal agency may not accept state-issued identification cards without complying with a number of enhanced standards of the REAL ID Act. The states were given a number of years to comply, and many moved to pass their own laws to meet the benchmarks of the REAL ID Act. Due to some sluggish response, DHS extended the compliance deadline several times. Unfortunately, most states were all too willing to bend to the requirements of the federal government in order to obtain “state certifications” of compliance. To signify their compliance with the federal standards, many states are now issuing identity cards emblazoned with gold stars in the corner.
  • According to the Department of Homeland Security, only Arizona, Idaho, Louisiana, Maine, Minnesota, New Hampshire, New York, and American Samoa have not met REAL ID standards as of January 2015. By DHS estimates, 70%-80% of all U.S. drivers are already carrying around REAL ID cards or live in states that have received extensions for compliance. Some states have even gone as far as to require the applicant to present birth certificates, W-2 tax forms, bank statements, and/or pay stubs to verify one’s identity before handing out the new REAL-ID cards. Some cards have RFID chips embedded in them. Among the 39 benchmarks of the REAL ID Act, state ID cards have to be scannable with a bar code reader, and the states are required to share access to an electronic database with all other states.
  • ...4 more annotations...
  • Once DHS begins enforcing the REAL ID standards, Americans without a compliant state ID will be effectively prohibited from flying at a commercial airport. Passengers would need to obtain passports even to fly on planes that never leave the United States.
  • a few rose in opposition to REAL ID, including Congressman Ron Paul (R-TX), who was perhaps its most outspoken critic. Dr. Paul, a former presidential candidate, called REAL ID a “Trojan horse” which “transform[s] state drivers licenses into de facto national ID cards.” In an impassioned speech on the House floor on February 9, 2005, Paul laid out a number of specific objections to H.R. 418: The REAL ID Act establishes a national ID card by mandating that states include certain minimum identification standards on driver’s licenses. It contains no limits on the government’s power to impose additional standards. Indeed, it gives authority to the Secretary of Homeland Security to unilaterally add requirements as he sees fit.
  • Supporters claim it is not a national ID because it is voluntary. However, any state that opts out will automatically make non-persons out of its citizens. The citizens of that state will be unable to have any dealings with the federal government because their ID will not be accepted. They will not be able to fly or to take a train. In essence, in the eyes of the federal government they will cease to exist. It is absurd to call this voluntary. Republican Party talking points on this bill, which claim that this is not a national ID card, nevertheless endorse the idea that “the federal government should set standards for the issuance of birth certificates and sources of identification such as driver’s licenses.” So they admit that they want a national ID but at the same time pretend that this is not a national ID. This bill establishes a massive, centrally-coordinated database of highly personal information about American citizens: at a minimum their name, date of birth, place of residence, Social Security number, and physical and possibly other characteristics. What is even more disturbing is that, by mandating that states participate in the “Drivers License Agreement,” this bill creates a massive database of sensitive information on American citizens that will be shared with Canada and Mexico!
  • This bill could have a chilling effect on the exercise of our constitutionally guaranteed rights. It re-defines “terrorism” in broad new terms that could well include members of firearms rights and anti-abortion groups, or other such groups as determined by whoever is in power at the time. There are no prohibitions against including such information in the database as information about a person’s exercise of First Amendment rights or about a person’s appearance on a registry of firearms owners. REAL ID cards streamline the process for the centralization and federalization of our private biometric data, while offering very little true benefit. In the words of Congressman Ron Paul, the program “offers us a false sense of greater security at the cost of taking a gigantic step toward making America a police state.” Its difficult to argue otherwise when passports may soon be necessary to travel domestically.
  •  
    This is among the reasons I no longer fly. I refuse to be treated in that distrustful way by my government. Atthough I used to fly several hundred thousands of miles annually, if the airlines want my business, they need to actively and effectively oppose the emergence of the surveillance state. I reject the politics of fear that attempts to justify suppression of liberties. Where I travel is none of the government's business.
Paul Merrell

Beware: Someone Is Trying to Convince You That Bernie Can't Win | Common Dreams | Break... - 0 views

  • Perhaps you’ve noticed. Some people and institutions are working feverishly to convince us that real social change is not possible. Their target is Bernie Sanders and the growing army of his supporters who are fed up with politics as usual and the grip of Wall Street and corporate America on our political, economic and social system. The theme is to desperately convince us that Sanders can’t win. They repeat it over and over, even though Sanders polls as well or better than Hillary Clinton does against every leading Republican candidate. Behind this effort is an alarmed corporate old guard that still runs the Democratic Party establishment and their allies in the corporate think tanks and the media, with a special nod to NBC/MSNBC, which is owned and operated by General Electric and Comcast.
  • In this scenario to blunt the Sanders’ surge, and what it represents for the millions of people who want to reverse income inequality, guarantee health care to everyone, break up the banks, carry out meaningful environmental justice and criminal justice reform, and all the other far reaching planks of Sanders’ campaign and the coalition supporting it. A thrust of their effort is to persuade Sanders supporters that he cannot win, in large part by using all the well-funded mechanisms in their control to retard wider exposure to the message of Sanders and his allies. The power elite form of turning down the gaslights. Here’s a small part of how the manipulation works. 
  • The Democratic National Committee slashes the number of debates and schedules debates on Saturday nights when far fewer people are watching, and pressures its elected officials and convention super delegates for an early endorsement in an effort to lock down a coronation of their preferred candidate. Meanwhile the media, in particular NBC/MSNBC which has the biggest network audience of presumed Democratic Party voters, limits coverage of Sanders while it’s parent company, GE, also directs its Hollywood subsidiaries, including Universal Studios (co-owned by Comcast) and its NBC shows, to line up its contracted celebrities to endorse the politics as usual campaign. Other national media, which also has a stake in the status quo, contributes as well. While Sanders has now drawn more than 400,000 people to his rallies – far more than any other candidate – he routinely receives less coverage than most of the other leading candidates. A report, circulated by Media Matters, found that on one network alone Donald Trump has been given 81 minutes of coverage compared to less than one minute for Sanders, even though, as The Nation’s John Nichols notes, Sanders has broader support among Democratic voters than Trump does among Republicans in the first voting state, Iowa.
  • ...1 more annotation...
  • In a fall speech to the DNC, Sanders put it bluntly. “The people of our country understand that given the collapse of the middle class and a grotesque level of income inequality, we do not need more establishment politics or establishment economics.”  “What we need,” Sanders emphasized, “is a political movement that is prepared to take on the billionaire class, a movement that works for all of us and not just the corporate class and a handful of the wealthiest people in this country.”  It’s a message, a campaign, and an uprising that has sent chills through those whose primarily loyalty is to the wealthy donors in mansions and corporate suites and the policy architects on Wall Street.  But it’s a message that sure has resonated in the grassroots.
  •  
    Sanders is getting the same treatment Ron Paul got last time around. But my guess is that like Trump, if elected Sanders wouldn't live long enough to take office. 
Paul Merrell

Civil Rights Coalition files FCC Complaint Against Baltimore Police Department for Ille... - 0 views

  • This week the Center for Media Justice, ColorOfChange.org, and New America’s Open Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network—and are doing so in a way that has a disproportionate impact on communities of color. Stingrays operate by mimicking a cell tower and directing all cellphones in a given area to route communications through the Stingray instead of the nearby tower. They are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship. Stingrays can also be configured to capture the content of communications. Because Stingrays operate on the same spectrum as cellular networks but are not actually transmitting communications the way a cell tower would, they interfere with cell phone communications within as much as a 500 meter radius of the device (Baltimore’s devices may be limited to 200 meters). This means that any important phone call placed or text message sent within that radius may not get through. As the complaint notes, “[d]epending on the nature of an emergency, it may be urgently necessary for a caller to reach, for example, a parent or child, doctor, psychiatrist, school, hospital, poison control center, or suicide prevention hotline.” But these and even 911 calls could be blocked.
  • The Baltimore Police Department could be among the most prolific users of cell site simulator technology in the country. A Baltimore detective testified last year that the BPD used Stingrays 4,300 times between 2007 and 2015. Like other law enforcement agencies, Baltimore has used its devices for major and minor crimes—everything from trying to locate a man who had kidnapped two small children to trying to find another man who took his wife’s cellphone during an argument (and later returned it). According to logs obtained by USA Today, the Baltimore PD also used its Stingrays to locate witnesses, to investigate unarmed robberies, and for mysterious “other” purposes. And like other law enforcement agencies, the Baltimore PD has regularly withheld information about Stingrays from defense attorneys, judges, and the public. Moreover, according to the FCC complaint, the Baltimore PD’s use of Stingrays disproportionately impacts African American communities. Coming on the heels of a scathing Department of Justice report finding “BPD engages in a pattern or practice of conduct that violates the Constitution or federal law,” this may not be surprising, but it still should be shocking. The DOJ’s investigation found that BPD not only regularly makes unconstitutional stops and arrests and uses excessive force within African-American communities but also retaliates against people for constitutionally protected expression, and uses enforcement strategies that produce “severe and unjustified disparities in the rates of stops, searches and arrests of African Americans.”
  • Adding Stingrays to this mix means that these same communities are subject to more surveillance that chills speech and are less able to make 911 and other emergency calls than communities where the police aren’t regularly using Stingrays. A map included in the FCC complaint shows exactly how this is impacting Baltimore’s African-American communities. It plots hundreds of addresses where USA Today discovered BPD was using Stingrays over a map of Baltimore’s black population based on 2010 Census data included in the DOJ’s recent report:
  • ...2 more annotations...
  • The Communications Act gives the FCC the authority to regulate radio, television, wire, satellite, and cable communications in all 50 states, the District of Columbia and U.S. territories. This includes being responsible for protecting cellphone networks from disruption and ensuring that emergency calls can be completed under any circumstances. And it requires the FCC to ensure that access to networks is available “to all people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.” Considering that the spectrum law enforcement is utilizing without permission is public property leased to private companies for the purpose of providing them next generation wireless communications, it goes without saying that the FCC has a duty to act.
  • But we should not assume that the Baltimore Police Department is an outlier—EFF has found that law enforcement has been secretly using stingrays for years and across the country. No community should have to speculate as to whether such a powerful surveillance technology is being used on its residents. Thus, we also ask the FCC to engage in a rule-making proceeding that addresses not only the problem of harmful interference but also the duty of every police department to use Stingrays in a constitutional way, and to publicly disclose—not hide—the facts around acquisition and use of this powerful wireless surveillance technology.  Anyone can support the complaint by tweeting at FCC Commissioners or by signing the petitions hosted by Color of Change or MAG-Net.
  •  
    An important test case on the constitutionality of stingray mobile device surveillance.
1 - 17 of 17
Showing 20 items per page