Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged criminal-investigation

Rss Feed Group items tagged

Gary Edwards

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
Gary Edwards

Comey has Long History of Cases Ending Favorable to Clintons - Tea Party News - 0 views

  • Messages found stored on Clinton’s private email server show that Berger – a convicted thief of classified documents – had been advising Clinton while she served as secretary of state and had access to emails containing classified information. For example, in an email dated Sept. 22, 2009, Berger advised Clinton advised how she could leverage information to make Israeli Prime Minister Benjamin Netanyahu more cooperative in discussions with the Obama administration over a settlement freeze.
  • Law firm ties Berger, Lynch, Mills Berger worked as a partner in the Washington law firm Hogan & Hartson from 1973 to 1977, before taking a position as the deputy director of policy planning at the State Department in the Carter administration. When Carter lost his re-election bid, Berger returned to Hogan & Hartson, where he worked until he took leave in 1988 to act as foreign policy adviser in Gov. Michael Dukakis’ presidential campaign. When Dukakis was defeated, Berger returned to Hogan & Hartson until he became foreign policy adviser for Bill Clinton’s presidential campaign in 1992. On March 28, WND reported Lynch was a litigation partner for eight years at Hogan & Hartson, from March 2002 through April 2010. Mills also worked at Hogan & Hartson, for two years, starting in 1990, before she joined then President-elect Bill Clinton’s transition team, on her way to securing a position as White House deputy counsel in the Clinton administration. According to documents Hillary Clinton’s first presidential campaign made public in 2008, Hogan & Hartson’s New York-based partner Howard Topaz was the tax lawyer who filed income tax returns for Bill and Hillary Clinton beginning in 2004. In addition, Hogan & Hartson in Virginia filed a patent trademark request on May 19, 2004, for Denver-based MX Logic Inc., the computer software firm that developed the email encryption system used to manage Clinton’s private email server beginning in July 2013. A tech expert has observed that employees of MX Logic could have had access to all the emails that went through her account.
  • In 1999, President Bill Clinton nominated Lynch for the first of her two terms as U.S. attorney for the Eastern District of New York, a position she held until she joined Hogan & Hartson in March 2002 to become a partner in the firm’s Litigation Practice Group. She left Hogan & Hartson in 2010, after being nominated by President Obama for her second term as U.S. attorney for the Eastern District of New York, a position she held until Obama nominated her to serve in her current position as attorney general. A report published April 8, 2008, by The American Lawyer noted Hogan & Hartson was among Hillary Clinton’s biggest financial supporters in the legal industry during her first presidential campaign. “Firm lawyers and staff have donated nearly $123,400 to her campaign so far, according to campaign contribution data from the Center for Responsive Politics,” Nate Raymond observed in The American Lawyer article. “Christine Varney, a partner in Hogan’s Washington, D.C., office, served as chief counsel to the Clinton-Gore Campaign in 1992.” While there is no evidence that Lynch played a direct role either in the tax work done by the firm for the Clintons or in linking Hillary’s private email server to MX Logic, the ethics of the legal profession hold all partners jointly liable for the actions of other partners in a business. “If Hogan and Hartson previously represented the Clintons on tax matters, it is incumbent upon U.S. Attorney General Loretta Lynch to [disclose] what, if any, role she had in such tax matters,” said Tom Fitton, president of Washington-based Judicial Watch.
  • ...4 more annotations...
  • HSBC link When Lynch’s nomination as attorney general was considered by the Senate one year ago, as WND reported, the Senate Judiciary Committee examined her role in the Obama administration’s decision not to prosecute the banking giant HSBC for laundering funds for Mexican drug cartels and Middle Eastern terrorists. WND was first to report in a series of articles beginning in 2012 money-laundering charges brought by John Cruz, a former HSBC vice president and relationship manager, based on his more than 1,000 pages of evidence and secret audio recordings. The staff of the Senate Judiciary Committee focused on Cruz’s allegations that Lynch, acting then in her capacity as the U.S. attorney for the Eastern District of New York, engaged in a Department of Justice cover-up. Obama’s attorney general nominee allowed HSBC in December 2011 to enter into a “deferred prosecution” settlement in which the bank agreed to pay a $1.9 billion fine and admit “willful criminal conduct” in exchange for dropping criminal investigations and prosecutions of HSBC directors or employees. Cruz called the $1.92 billion fine the U.S. government imposed on HSBC “a joke” and filed a $10 million lawsuit for “retaliation and wrongful termination.” From 2002 to 2003, Comey held the position of U.S. Attorney for the Southern District of New York, the same position held by Lynch. On March 4, 2013, he joined the HSBC board of directors, agreeing to serve as an independent non-executive director and a member of the bank’s Financial System Vulnerabilities Committee, positions he held until he resigned on Aug. 3, 2013, to become head of the FBI.
  • Comey, Fitzgerald and Valerie Plame On Jan. 1, 2004, the Washington Post reported that after Attorney General John Aschroft recused himself and his staff from any involvement in the investigation of who leaked the name of CIA employee Valerie Plame after journalist Robert Novak named her in print as a CIA operative, Comey assumed the role of acting attorney general for the purposes of the investigation. Comey appointed Patrick J. Fitzgerald, a U.S. attorney in Chicago, to act as special counsel in conducting the inquiry into what became known as “Plamegate.” At the time Comey made the appointment, Fitzgerald was already godfather to one of Comey’s children. On April 13, 2015, co-authoring a USA Today op-ed piece, Plame and her husband, retired ambassador Joseph Wilson, made public their support for Hillary Clinton’s 2016 presidential campaign, openly acknowledging their political closeness to both Hillary and Bill Clinton. The first two paragraphs of the editorial read: We have known Hillary Clinton both professionally and personally for close to 20 years, dating back to before President Bill Clinton’s first trip to Africa in 1998 — a trip that they both acknowledge changed their lives, and gave considerable meaning to their post-White House years and to the activities of the Clinton Foundation. Joe, serving as the National Security Council Senior Director for African Affairs, was instrumental in arranging that historic visit. Our history became entwined with Hillary further after Valerie’s identity as a CIA officer was deliberately exposed. That criminal act was taken in retribution for Joe’s article in The New York Times in which he explained he had discovered no basis for the Bush administration’s justification for the Iraq War that Saddam Hussein was seeking yellowcake uranium to develop a nuclear weapon.
  • In January 2016, Chuck Ross in the Daily Caller reported that Hillary Clinton emails made public made clear that one of her “most frequent favor-seekers when she was secretary of state was former Ambassador Joseph Wilson, a longtime Clinton friend, an endorser of Clinton’s 2008 presidential campaign, and an Africa expert with deep business ties on the continent.” Ross noted that Wilson emailed Clinton on Dec. 22, 2009, seeking help for Symbion Power, an American engineering contractor for whom Wilson consulted, in the company’s bid to pursue a U.S. Agency of International Development contract for work in Afghanistan. In the case of the Afghanistan project, Ross noted, Clinton vouched for Wilson and Symbion as she forwarded the request to Jack Lew, who served then as deputy secretary of state for management and resources. Ross further reported Wilson’s request might also have been discussed with President Obama, as one email indicates. In 2005, Fitzgerald prosecuted Libby, a prominent adviser to then Vice President Dick Cheney, in the Plame investigation, charging him with two counts of perjury, two counts of making false statements to federal prosecutors and one count of obstruction of justice. On March 6, 2007, Libby was convicted of four of the five counts, and on June 5, 2007, was sentenced by U.S. District Judge Reggie B. Walton to two and a half years in federal prison. On April 6, 2015, the Wall Street Journal reported the publication of New York Times reporter Judith Miller’s memoir “The Story: A Reporter’s Journey” exposed “unscrupulous conduct” by Fitzgerald in the 2007 trial of Libby.
  • WSJ reporter Peter Berkowitz noted Miller “writes that Mr. Fitzgerald induced her to give what she now realizes was false testimony.” “By withholding critical information and manipulating her memory as he prepared her to testify, Ms. Miller relates, Mr. Fitzgerald ‘steered’ her ‘in the wrong direction.’” http://www.wnd.com/2016/07/comey-has-long-history-of-clinton-related-cases/
  •  
    Bend over and grab your ankles. The rats nest of Clinton operatives in Washington DC is far deeper than anyone ever imagined. "FBI Director James Comey has a long history of involvement in Department of Justice actions that arguably ended up favorable to the Clintons. In 2004, Comey, then serving as a deputy attorney general in the Justice Department, apparently limited the scope of the criminal investigation of Sandy Berger, which left out former Clinton administration officials who may have coordinated with Berger in his removal and destruction of classified records from the National Archives. The documents were relevant to accusations that the Clinton administration was negligent in the build-up to the 9/11 terrorist attack. On Tuesday, Comey announced that despite evidence of "extreme negligence by Hillary Clinton and her top aides regarding the handling of classified information through a private email server, the FBI would not refer criminal charges to Attorney General Loretta Lynch and the Justice Department. Curiously, Berger, Lynch and Cheryl Mills all worked as partners in the Washington law firm Hogan & Hartson, which prepared tax returns for the Clintons and did patent work for a software firm that played a role in the private email server Hillary Clinton used when she was secretary of state. Lynch and Comey both served as U.S. attorney for the Southern District of New York. They crossed paths in the investigation of HSBC bank, which avoided criminal charges in a massive money-laundering scandal for which the bank paid a $1.9 billion fine. After Attorney General John Aschroft recused himself in the Valerie Plame affair in 2004, Comey appointed as special counsel Patrick J. Fitzgerald, who ended up convicting "Scooter" Libby, a top aide to then Vice President Dick Cheney, of perjury and obstruction of justice. The charge affirmed the accusations of Plame and her former ambassador husband, Joe Wilson - both partisan supporters of Bill and
  •  
    The "ethical" situation is far worse than described. Attorney disciplinary rules require that a lawyer, including all lawyers in the same firm, owe a lifetime duty of loyalty to a client, a duty that does not end with representation in a particular matter. Accordingly, Lynch had what the disciplinary rules refer to as an "actual conflict of interest" between her duties of loyalty to both Hillary and the U.S. government that required her withdrawal from representing either in the decision whether to prosecute Hillary. Saying that she would rubber stamp what Comey recommended was not the required withdrawal. Comey is an investigator, not a prosecutor. This was a situation for appointment of a special counsel to represent the Department of Justice in the decision whether to prosecute, not satisfied by rubber stamping Comey's recomendation,.
Paul Merrell

Israeli Government Watchdog Investigates Military's Conduct in Gaza War - NYTimes.com - 0 views

  • Israel’s government watchdog, the state comptroller, said on Tuesday that he had opened an investigation into decisions made by military and political leaders during last summer’s 50-day war with the Hamas militant group in Gaza.The announcement was Israel’s latest effort to head off an International Criminal Court inquiry into its conduct during the war, and came days after prosecutors at the court opened a preliminary examination of possible war crimes committed in the Palestinian territories, the first formal step that could lead to charges against Israelis.
  • A United Nations Human Rights Council commission of inquiry into Israel’s military operations in the Gaza Strip is underway. The state comptroller’s announcement also came as Physicians for Human Rights-Israel, which opposes Israeli occupation of the territories captured in 1967, published a report criticizing what it said were failures of the Israeli military’s system for warning Gaza’s citizens of impending strikes during the fighting last summer. It also faulted the military for a lack of safe evacuation routes and for strikes against rescue teams.
  • The International Criminal Court generally takes on only cases concerning countries that are unwilling or unable to investigate their own actions. In a statement, the Israeli state comptroller, Joseph Haim Shapira, highlighted this point as what was apparently a motivating factor in beginning his inquiry.
  • ...1 more annotation...
  • “According to principles of international law,” the statement said, “when a state exercises its authority to objectively investigate accusations regarding violations of the laws of armed conflict, this will preclude examination of said accusations by external international tribunals (such as the International Criminal Court in The Hague).”
  •  
    The claim that self-investigation serves as an absolute bar to investigation and prosecution by the ICC drastically overstates the actual principle, which makes exceptions for situations in which the investigating state is unable or unwilling to conduct a thorough investigation and actually prosecute those most responsible for the crime, and for situations in which the state investigation is intended to shield those most responsible from criminal prosecution. An investigation by the Israeli Comptroller won't cut it. The Comptroller has no power to initiate prosecutions; he can only make recommendations to the Knesset, the Israeli parliament, He has no power to initiate criminal prosectuions. This announcement is pure and false propaganda, 
Paul Merrell

Germany Opens Criminal Investigation On Alleged NSA Merkel Phone Tap - 0 views

  • German prosecutors have opened an investigation into the alleged monitoring of Chancellor Angela Merkel’s cellphone by the U.S. National Security Agency, officials said Wednesday, in a move that could again complicate diplomatic relations between the two allies. It was not immediately clear what the new investigation might mean in terms of possible prosecutions of Americans. Documents provided by National Security Agency leaker Edward Snowden indicated in October that the U.S. was monitoring Merkel’s cellphone conversations, as well as those of 35 other foreign leaders. Merkel expressed outrage and accused Washington of a grave breach of trust. In the ensuing diplomatic fallout, President Barack Obama acknowledged Germany’s anger and promised that new guidelines would cut back on such monitoring, except in the case of a national security interest. “The leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them rather than turning to surveillance,” Obama said at the time.
  • Following the news of the German probe, Obama’s deputy national security adviser, Ben Rhodes, said the U.S. believes direct dialogue between the two countries rather than an investigation is the best way to address Germany’s concerns. “We believe we have an open line and good communication” with Merkel and her team, Rhodes told reporters aboard Air Force One as Obama flew to Brussels for a meeting of the Group of Seven nations. After mulling for months whether to open a formal probe, Chief Federal Prosecutor Harald Range determined “that sufficient factual evidence exists that unknown members of U.S. intelligence services spied on the mobile phone of Chancellor Angela Merkel,” his office said. In a similarly thorny diplomatic case, Germany got as far as issuing warrants for 13 unidentified CIA agents suspected of kidnapping a German terrorism suspect and taking him to a detention center in Afghanistan. The case was shelved in 2007 after the U.S. Justice Department said extraditing the agents would harm “American national interests.”
  • In his Wednesday announcement, Range’s office said he was not opening a formal investigation of wider allegations of blanket surveillance of telecommunications data in Germany by U.S. and British intelligence, saying that there was not yet sufficient factual evidence of concrete crimes. His office said that will remain under consideration. Merkel’s spokesman, Steffen Seibert, declined to comment on Range’s decision or on whether the government fears it will weigh on relations with the U.S. The government didn’t exert any influence on the prosecutor, Seibert told reporters. “I am not going to evaluate here the decision he has made,” he said. Separately, the German Parliament earlier this year set up a committee to investigate the scope of spying by the NSA and other intelligence services in Germany.
  •  
    There's a bit of comedy beneath the surface here. When Edward Snowden was in Hong Kong and news of the NSA leak hit, the U.S. Dept. of Justice promptly filed a criminal espionage charge against Snowden and attempted to extradite him from Hong Kong. Snowden left Hong Kong before the extradition paperwork was processed enough to result in his arrest.  Now with a pending criminal investigation of the NSA's espionage activities aimed at Germany's chancellor, the Obama White House says it wants dialog, not a criminal investigation. Would the U.S. honor its extradition treaty with Germany if NSA officials or the Director of Intelligence were charged with espionage in Germany? One might suspect that a dual-standard would be deployed, in effect saying that only espionage charges that the U.S. lodges can justify extradition. Or at least that's the way it worked when Italy tried and convicted in absentia several CIA officials and an Air Force officer of espionage activities, relating to the kidnapping and "extraordinary rendition" of a gentleman in Italy.       But this incident serves as a reminder that when the NSA officials conduct foreign intelligence activities, they will in most cases be deliberately violating the criminal laws of other nations. And the same activity aimed at U.S. citizens is also criminal, which is undoubtedly why Sen. Ron Wyden asked Director of Intelligence Clapper if the NSA had taken account of the Computer Fraud and Abuse Act in its processing of domestic digital communications. Clapper said he would get back to Wyden on that in writing. So far as I'm aware, Wyden is still waiting for that answer. There are lots of comedians in Washington, D.C. Most of them have no idea that they are comedians.   
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Paul Merrell

Turkish PM replaces 10 ministers amid graft inquiry | Reuters - 0 views

  • (Reuters) - Turkey's Prime Minister Tayyip Erdogan said he replaced ten cabinet ministers, half of his total roster, after three ministers resigned over a high-level graft inquiry on Wednesday. The replaced ministers included EU Minister Egemen Bagis, who was allegedly named in the corruption probe but had not resigned yet, and key positions such as the Economy and justice ministers.
  •  
    It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from entering police department buildings." It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from entering police department buildings." It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from
  •  
    "The United States has demanded the Turkish government condemn false news reports about US Ambassador Francis J. Ricciardone and urged Ankara to protect the strong partnership between the two countries, a Turkish daily reported on Tuesday. Jen Psaki, US State Department Spokesperson, said in a press conference that the ongoing false allegations against US ambassador is disturbing. "On Saturday, several pro-government newspapers accused the US ambassador of being behind a recent wave of arrests as part of the corruption investigation. Pro-government Yeni Şafak wrote on its front page: "Get out of this country," a headline that was apparently directed at the US ambassador. "The US Embassy denied the accusations as "lies and slander." It said through Twitter in Turkish: "No one should jeopardize Turkish-US relations through baseless claims." http://www.todayszaman.com/newsDetail_getNewsById.action;jsessionid=1F7B777659D734167420623A648E1335?newsId=334788&columnistId=0
  •  
    Another reaction came from the Contemporary Journalists Association (ÇGD) on Tuesday. The president of the ÇGD's western Central Anatolia branch, Can Hacıoğlu, said the decisions to ban journalists from entering police departments and the closure of press rooms at those departments are unacceptable. He added that the fact that police departments prefer censorship in a period when Turkey has been discussing opening press agencies at police departments and prosecutor's offices as part of the EU harmonization process is very challenging. "We journalists find this situation very odd," Hacıoğlu said. Hacıoğlu also harshly criticized Turkish Airlines (THY) for stopping the distribution of the Zaman, Today's Zaman, Bugün and Ortadoğu dailies to business class passengers on its planes on Monday without providing any explanation, though other dailies are still being handed out onboard. "Hacıoğlu accused THY of discriminating against the dailies for their coverage of the major corruption scandal involving numerous bureaucrats and the sons of three ministers." "Access to Taraf journalist Mehmet Baransu's website was blocked to users in Turkey by the Telecommunications Directorate (TİB) as of Wednesday evening for publishing photos and tapes about the recent graft investigation. The website, yenidönem.com, is still blocked." http://www.todayszaman.com/newsDetail_getNewsById.action;jsessionid=1F7B777659D734167420623A648E1335?newsId=334831&columnistId=0
Paul Merrell

US to UN Human Rights Committee: Move Along, Nothing to See Here | American Civil Liber... - 0 views

  • Yesterday the United States gave the U.N. Human Rights Committee its one year follow-up report on progress made to implement four priority recommendations made by the committee a year ago. The independent human rights experts had reviewed the United States' compliance with a major human rights treaty, the International Covenant on Civil and Political Rights (ICCPR). They found the U.S. coming up short in many areas, including accountability for torture, privacy and surveillance, Guantánamo, and gun violence. Yesterday’s disappointing 15-page submission does provide some information on Justice Department investigations regarding police misconduct, including the recent Ferguson report. But, there was nothing on accountability measures taken in the aftermath of the release of the Senate report on the CIA torture program. The need for Attorney General Eric Holder to appoint a special prosecutor remains as glaring as ever.
  • The submission notes that the Senate report’s 500-page executive summary was “declassified with minimal redactions to protect national security,” but it failed to commit to release the entire report (which the ACLU is currently fighting for in a FOIA lawsuit). And while the submission states that the U.S. “supports transparency and has taken steps to ensure that it never resorts to the use of those [harsh interrogation] techniques again,” there is no mention of any concrete actions taken to criminally investigate CIA torture, especially in light of the new information made public in the report about the brutality of the CIA’s methods, and its lies to Congress, the media, and the public about its torture program. Under the ICCPR and the Convention Against Torture, the U.S. has an obligation to effectively, independently, and impartially investigate all cases of unlawful killing or torture, as well as arbitrary detention or enforced disappearance. The U.S. also has an international legal obligation to appropriately prosecute perpetrators – including high-level policymakers.
  • The U.S. submission mentions the investigation by Justice Department prosecutor John Durham, which he closed in 2012 without any charges being filed. But, the submission fails to provide detailed information on the precise scope of Durham’s mandate. We remain concerned that the investigation may have focused on instances in which interrogators overstepped limits set by senior officials, rather than on the culpability of senior officials themselves. It also remains unclear whether investigators interviewed any prisoners who were subjected to the CIA torture program. During the November 2014 review of the United States before the U.N. Committee Against Torture in Geneva, the committee raised concerns, based on letters and accounts from torture victims or their attorneys, indicating that Durham had never interviewed any detainees. The U.S. delegation responded that it had interviewed 96 persons as part of the investigation, but it did not indicate whether any of the prisoners who were subjected to abuse and torture were amongst those interviewed.
  • ...1 more annotation...
  • A comprehensive criminal investigation by the U.S. government would dissuade future government officials from ordering or using torture and abuse. Failure to conduct an independent criminal investigation not only flouts international law but it also undermines America’s ability to advocate for human rights abroad and compromises Americans’ faith in the rule of law at home. The ACLU and other human rights groups have until May 1st to submit “shadow reports” to the Human Rights Committee, which will subsequently assess and grade U.S. implementation of the key priority recommendations.  The Obama administration can still avoid a low grade by responding to domestic and international calls to appoint a special prosecutor to conduct a comprehensive criminal investigation of the tactics described in the Senate torture report, including all acts authorizing or ordering acts of torture and other abuses and provide redress to victims of torture.  
Paul Merrell

WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief's ou... - 0 views

  • An internal CIA investigation confirmed allegations that agency personnel improperly intruded into a protected database used by Senate Intelligence Committee staff to compile a scathing report on the agency’s detention and interrogation program, prompting bipartisan outrage and at least two calls for spy chief John Brennan to resign.“This is very, very serious, and I will tell you, as a member of the committee, someone who has great respect for the CIA, I am extremely disappointed in the actions of the agents of the CIA who carried out this breach of the committee’s computers,” said Sen. Saxby Chambliss, R-Ga., the committee’s vice chairman.
  • The rare display of bipartisan fury followed a three-hour private briefing by Inspector General David Buckley. His investigation revealed that five CIA employees, two lawyers and three information technology specialists improperly accessed or “caused access” to a database that only committee staff were permitted to use.Buckley’s inquiry also determined that a CIA crimes report to the Justice Department alleging that the panel staff removed classified documents from a top-secret facility without authorization was based on “inaccurate information,” according to a summary of the findings prepared for the Senate and House intelligence committees and released by the CIA.In other conclusions, Buckley found that CIA security officers conducted keyword searches of the emails of staffers of the committee’s Democratic majority _ and reviewed some of them _ and that the three CIA information technology specialists showed “a lack of candor” in interviews with Buckley’s office.
  • The inspector general’s summary did not say who may have ordered the intrusion or when senior CIA officials learned of it.Following the briefing, some senators struggled to maintain their composure over what they saw as a violation of the constitutional separation of powers between an executive branch agency and its congressional overseers.“We’re the only people watching these organizations, and if we can’t rely on the information that we’re given as being accurate, then it makes a mockery of the entire oversight function,” said Sen. Angus King, an independent from Maine who caucuses with the Democrats.The findings confirmed charges by the committee chairwoman, Sen. Dianne Feinstein, D-Calif., that the CIA intruded into the database that by agreement was to be used by her staffers compiling the report on the harsh interrogation methods used by the agency on suspected terrorists held in secret overseas prisons under the George W. Bush administration.The findings also contradicted Brennan’s denials of Feinstein’s allegations, prompting two panel members, Sens. Mark Udall, D-Colo., and Martin Heinrich, D-N.M., to demand that the spy chief resign.
  • ...7 more annotations...
  • Another committee member, Sen. Ron Wyden, D-Ore., and some civil rights groups called for a fuller investigation. The demands clashed with a desire by President Barack Obama, other lawmakers and the CIA to move beyond the controversy over the “enhanced interrogation program” after Feinstein releases her committee’s report, which could come as soon as next weekMany members demanded that Brennan explain his earlier denial that the CIA had accessed the Senate committee database.“Director Brennan should make a very public explanation and correction of what he said,” said Sen. Carl Levin, D-Mich. He all but accused the Justice Department of a coverup by deciding not to pursue a criminal investigation into the CIA’s intrusion.
  • “I thought there might have been information that was produced after the department reached their conclusion,” he said. “What I understand, they have all of the information which the IG has.”He hinted that the scandal goes further than the individuals cited in Buckley’s report.“I think it’s very clear that CIA people knew exactly what they were doing and either knew or should’ve known,” said Levin, adding that he thought that Buckley’s findings should be referred to the Justice Department.A person with knowledge of the issue insisted that the CIA personnel who improperly accessed the database “acted in good faith,” believing that they were empowered to do so because they believed there had been a security violation.“There was no malicious intent. They acted in good faith believing they had the legal standing to do so,” said the knowledgeable person, who asked not to be further identified because they weren’t authorized to discuss the issue publicly. “But it did not conform with the legal agreement reached with the Senate committee.”
  • Feinstein called Brennan’s apology and his decision to submit Buckley’s findings to the accountability board “positive first steps.”“This IG report corrects the record and it is my understanding that a declassified report will be made available to the public shortly,” she said in a statement.“The investigation confirmed what I said on the Senate floor in March _ CIA personnel inappropriately searched Senate Intelligence Committee computers in violation of an agreement we had reached, and I believe in violation of the constitutional separation of powers,” she said.It was not clear why Feinstein didn’t repeat her charges from March that the agency also may have broken the law and had sought to “thwart” her investigation into the CIA’s use of waterboarding, which simulates drowning, sleep deprivation and other harsh interrogation methods _ tactics denounced by many experts as torture.
  • Buckley’s findings clashed with denials by Brennan that he issued only hours after Feinstein’s blistering Senate speech.“As far as the allegations of, you know, CIA hacking into, you know, Senate computers, nothing could be further from the truth. I mean, we wouldn’t do that. I mean, that’s _ that’s just beyond the _ you know, the scope of reason in terms of what we would do,” he said in an appearance at the Council on Foreign Relations.White House Press Secretary Josh Earnest issued a strong defense of Brennan, crediting him with playing an “instrumental role” in the administration’s fight against terrorism, in launching Buckley’s investigation and in looking for ways to prevent such occurrences in the future.Earnest was asked at a news briefing whether there was a credibility issue for Brennan, given his forceful denial in March.“Not at all,” he replied, adding that Brennan had suggested the inspector general’s investigation in the first place. And, he added, Brennan had taken the further step of appointing the accountability board to review the situation and the conduct of those accused of acting improperly to “ensure that they are properly held accountable for that conduct.”
  • The allegations and the separate CIA charge that the committee staff removed classified documents from the secret CIA facility in Northern Virginia without authorization were referred to the Justice Department for investigation.The department earlier this month announced that it had found insufficient evidence on which to proceed with criminal probes into either matter “at this time.” Thursday, Justice Department officials declined comment.
  • In her speech, Feinstein asserted that her staff found the material _ known as the Panetta review, after former CIA Director Leon Panetta, who ordered it _ in the protected database and that the CIA discovered the staff had it by monitoring its computers in violation of the user agreement.The inspector general’s summary, which was prepared for the Senate and the House intelligence committees, didn’t identify the CIA personnel who had accessed the Senate’s protected database.Furthermore, it said, the CIA crimes report to the Justice Department alleging that panel staffers had removed classified materials without permission was grounded on inaccurate information. The report is believed to have been sent by the CIA’s then acting general counsel, Robert Eatinger, who was a legal adviser to the interrogation program.“The factual basis for the referral was not supported, as the author of the referral had been provided inaccurate information on which the letter was based,” said the summary, noting that the Justice Department decided not to pursue the issue.
  • Christopher Anders, senior legislative counsel with the American Civil Liberties Union, criticized the CIA announcement, saying that “an apology isn’t enough.”“The Justice Department must refer the (CIA) inspector general’s report to a federal prosecutor for a full investigation into any crimes by CIA personnel or contractors,” said Anders.
  •  
    And no one but the lowest ranking staffer knew anything about it, not even the CIA lawyer who made the criminal referral to the Justice Dept., alleging that the Senate Intelligence Committee had accessed classified documents it wasn't authorized to access. So the Justice Dept. announces that there's insufficient evidence to warrant a criminal investigation. As though the CIA lawyer's allegations were not based on the unlawful surveillance of the Senate Intelligence Committee's network.  Can't we just get an official announcement that Attorney General Holder has decided that there shall be a cover-up? 
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
Paul Merrell

Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer - The Intercept - 0 views

  • The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks. Newly unsealed court documents obtained by The Intercept reveal the Justice Department won an order forcing Google to turn over more than one year’s worth of data from the Gmail account of Jacob Appelbaum (pictured above), a developer for the Tor online anonymity project who has worked with WikiLeaks as a volunteer. The order also gagged Google, preventing it from notifying Appelbaum that his records had been provided to the government. The surveillance of Appelbaum’s Gmail account was tied to the Justice Department’s long-running criminal investigation of WikiLeaks, which began in 2010 following the transparency group’s publication of a large cache of U.S. government diplomatic cables. According to the unsealed documents, the Justice Department first sought details from Google about a Gmail account operated by Appelbaum in January 2011, triggering a three-month dispute between the government and the tech giant. Government investigators demanded metadata records from the account showing email addresses of those with whom Appelbaum had corresponded between the period of November 2009 and early 2011; they also wanted to obtain information showing the unique IP addresses of the computers he had used to log in to the account.
  • The Justice Department argued in the case that Appelbaum had “no reasonable expectation of privacy” over his email records under the Fourth Amendment, which protects against unreasonable searches and seizures. Rather than seeking a search warrant that would require it to show probable cause that he had committed a crime, the government instead sought and received an order to obtain the data under a lesser standard, requiring only “reasonable grounds” to believe that the records were “relevant and material” to an ongoing criminal investigation. Google repeatedly attempted to challenge the demand, and wanted to immediately notify Appelbaum that his records were being sought so he could have an opportunity to launch his own legal defense. Attorneys for the tech giant argued in a series of court filings that the government’s case raised “serious First Amendment concerns.” They noted that Appelbaum’s records “may implicate journalistic and academic freedom” because they could “reveal confidential sources or information about WikiLeaks’ purported journalistic or academic activities.” However, the Justice Department asserted that “journalists have no special privilege to resist compelled disclosure of their records, absent evidence that the government is acting in bad faith,” and refused to concede Appelbaum was in fact a journalist. It claimed it had acted in “good faith throughout this criminal investigation, and there is no evidence that either the investigation or the order is intended to harass the … subscriber or anyone else.” Google’s attempts to fight the surveillance gag order angered the government, with the Justice Department stating that the company’s “resistance to providing the records” had “frustrated the government’s ability to efficiently conduct a lawful criminal investigation.”
  • The Justice Department wanted to keep the surveillance secret largely because of an earlier public backlash over its WikiLeaks investigation. In January 2011, Appelbaum and other WikiLeaks volunteers’ – including Icelandic parlimentarian Birgitta Jonsdottir – were notified by Twitter that the Justice Department had obtained data about their accounts. This disclosure generated widepread news coverage and controversy; the government says in the unsealed court records that it “failed to anticipate the degree of  damage that would be caused” by the Twitter disclosure and did not want to “exacerbate this problem” when it went after Appelbaum’s Gmail data. The court documents show the Justice Department said the disclosure of its Twitter data grab “seriously jeopardized the [WikiLeaks] investigation” because it resulted in efforts to “conceal evidence” and put public pressure on other companies to resist similar surveillance orders. It also claimed that officials named in the subpeona ordering Twitter to turn over information were “harassed” after a copy was published by Intercept co-founder Glenn Greenwald at Salon in 2011. (The only specific evidence of the alleged harassment cited by the government is an email that was sent to an employee of the U.S. Attorney’s office that purportedly said: “You guys are fucking nazis trying to controll [sic] the whole fucking world. Well guess what. WE DO NOT FORGIVE. WE DO NOT FORGET. EXPECT US.”)
  • ...4 more annotations...
  • Google accused the government of hyperbole and argued that the backlash over the Twitter order did not justify secrecy related to the Gmail surveillance. “Rather than demonstrating how unsealing the order will harm its well-publicized investigation, the government lists a parade of horribles that have allegedly occurred since it unsealed the Twitter order, yet fails to establish how any of these developments could be further exacerbated by unsealing this order,” wrote Google’s attorneys. “The proverbial toothpaste is out of the tube, and continuing to seal a materially identical order will not change it.” But Google’s attempt to overturn the gag order was denied by magistrate judge Ivan D. Davis in February 2011. The company launched an appeal against that decision, but this too was rebuffed, in March 2011, by District Court judge Thomas Selby Ellis, III.
  • The government agreed to unseal some of the court records on Apr. 1 this year, and they were apparently turned over to Appelbaum on May 14 through a notification sent to his Gmail account. The files were released on condition that they would contain some redactions, which are bizarre and inconsistent, in some cases censoring the name of “WikiLeaks” from cited public news reports. Not all of the documents in the case – such as the original surveillance orders contested by Google – were released as part of the latest disclosure. Some contain “specific and sensitive details of the investigation” and “remain properly sealed while the grand jury investigation continues,” according to the court records from April this year. Appelbaum, an American citizen who is based in Berlin, called the case “a travesty that continues at a slow pace” and said he felt it was important to highlight “the absolute madness in these documents.”
  • He told The Intercept: “After five years, receiving such legal documents is neither a shock nor a needed confirmation. … Will we ever see the full documents about our respective cases? Will we even learn the names of those signing so-called legal orders against us in secret sealed documents? Certainly not in a timely manner and certainly not in a transparent, just manner.” The 32-year-old, who has recently collaborated with Intercept co-founder Laura Poitras to report revelations about National Security Agency surveillance for German news magazine Der Spiegel, said he plans to remain in Germany “in exile, rather than returning to the U.S. to experience more harassment of a less than legal kind.”
  • “My presence in Berlin ensures that the cost of physically harassing me or politically harassing me is much higher than when I last lived on U.S. soil,” Appelbaum said. “This allows me to work as a journalist freely from daily U.S. government interference. It also ensures that any further attempts to continue this will be forced into the open through [a Mutal Legal Assistance Treaty] and other international processes. The German goverment is less likely to allow the FBI to behave in Germany as they do on U.S. soil.” The Justice Department’s WikiLeaks investigaton is headed by prosecutors in the Eastern District of Virginia. Since 2010, the secretive probe has seen activists affiliated with WikiLeaks compelled to appear before a grand jury and the FBI attempting to infiltrate the group with an informant. Earlier this year, it was revealed that the government had obtained the contents of three core WikiLeaks staffers’ Gmail accounts as part of the investigation.
Paul Merrell

DOJ Pushes to Expand Hacking Abilities Against Cyber-Criminals - Law Blog - WSJ - 0 views

  • The U.S. Department of Justice is pushing to make it easier for law enforcement to get warrants to hack into the computers of criminal suspects across the country. The move, which would alter federal court rules governing search warrants, comes amid increases in cases related to computer crimes. Investigators say they need more flexibility to get warrants to allow hacking in such cases, especially when multiple computers are involved or the government doesn’t know where the suspect’s computer is physically located. The Justice Department effort is raising questions among some technology advocates, who say the government should focus on fixing the holes in computer software that allow such hacking instead of exploiting them. Privacy advocates also warn government spyware could end up on innocent people’s computers if remote attacks are authorized against equipment whose ownership isn’t clear.
  • The government’s push for rule changes sheds light on law enforcement’s use of remote hacking techniques, which are being deployed more frequently but have been protected behind a veil of secrecy for years. In documents submitted by the government to the judicial system’s rule-making body this year, the government discussed using software to find suspected child pornographers who visited a U.S. site and concealed their identity using a strong anonymization tool called Tor. The government’s hacking tools—such as sending an email embedded with code that installs spying software — resemble those used by criminal hackers. The government doesn’t describe these methods as hacking, preferring instead to use terms like “remote access” and “network investigative techniques.” Right now, investigators who want to search property, including computers, generally need to get a warrant from a judge in the district where the property is located, according to federal court rules. In a computer investigation, that might not be possible, because criminals can hide behind anonymizing technologies. In cases involving botnets—groups of hijacked computers—investigators might also want to search many machines at once without getting that many warrants.
  • Some judges have already granted warrants in cases when authorities don’t know where the machine is. But at least one judge has denied an application in part because of the current rules. The department also wants warrants to be allowed for multiple computers at the same time, as well as for searches of many related storage, email and social media accounts at once, as long as those accounts are accessed by the computer being searched. “Remote searches of computers are often essential to the successful investigation” of computer crimes, Acting Assistant Attorney General Mythili Raman wrote in a letter to the judicial system’s rulemaking authority requesting the change in September. The government tries to obtain these “remote access warrants” mainly to “combat Internet anonymizing techniques,” the department said in a memo to the authority in March. Some groups have raised questions about law enforcement’s use of hacking technologies, arguing that such tools mean the government is failing to help fix software problems exploited by criminals. “It is crucial that we have a robust public debate about how the Fourth Amendment and federal law should limit the government’s use of malware and spyware within the U.S.,” said Nathan Wessler, a staff attorney at the American Civil Liberties Union who focuses on technology issues.
  • ...1 more annotation...
  • A Texas judge who denied a warrant application last year cited privacy concerns associated with sending malware when the location of the computer wasn’t known. He pointed out that a suspect opening an email infected with spyware could be doing so on a public computer, creating risk of information being collected from innocent people. A former computer crimes prosecutor serving on an advisory committee of the U.S. Judicial Conference, which is reviewing the request, said he was concerned that allowing the search of multiple computers under a single warrant would violate the Fourth Amendment’s protections against overly broad searches. The proposed rule is set to be debated by the Judicial Conference’s Advisory Committee on Criminal Rules in early April, after which it would be opened to public comment.
Paul Merrell

Feds operated yet another secret metadata database until 2013 | Ars Technica - 0 views

  • In a new court filing, the Department of Justice revealed that it kept a secret database of telephone metadata—with one party in the United States and another abroad—that ended in 2013. The three-page partially-redacted affidavit from a top Drug Enforcement Agency (DEA) official, which was filed Thursday, explained that the database was authorized under a particular federal drug trafficking statute. The law allows the government to use "administrative subpoenas" to obtain business records and other "tangible things." The affidavit does not specify which countries records were included, but specifically does mention Iran. This database program appears to be wholly separate from the National Security Agency’s metadata program revealed by Edward Snowden, but it targets similar materials and is collected by a different agency. The Wall Street Journal, citing anonymous sources, reported Friday that this newly-revealed program began in the 1990s and was shut down in August 2013.
  • The criminal case involves an Iranian-American man named Shantia Hassanshahi, who is accused of violating the American trade embargo against Iran. His lawyer, Mir Saied Kashani, told Ars that the government has clearly abused its authority. "They’ve converted this from a war on drugs to a war on privacy," he said. "[Hassanshahi] is not accused of any drug crime but they used this drug enforcement information to gather information against him, that's contrary to the law, and we will revisit that. We will bring motions in the court and we will appeal if necessary." Neither the DEA nor the Department of Justice immediately responded to Ars' query as to whether this program is continuing under a different authority.
  • The story begins in 2011, when a Department of Homeland Security (DHS) agent received a tip about someone who might be in violation of American sanctions against Iran. The source provided an e-mail from an Iranian businessman, Manoucher Sheiki, who was involved in acquiring power grid equipment. A second Homeland Security agent, Joshua Akronowitz, wrote in a 2013 affidavit that he searched Sheiki’s Iranian phone number in this database, but declined to explain exactly what kind of database it was. Akronowitz found that the Iranian number came up exactly one time in the database, and was linked to an 818 number, based in Los Angeles County. That number turned out to be the Google Voice number of Hassanshahi. DHS then subpoenaed Google, and got Hassanshahi’s call log and later, metadata on his Gmail account. By early 2012, the agency found out that he was set to return to Los Angeles from Iran. At LAX Airport, customs agents seized his phone, laptop, thumb drives, camcorder, and SIM cards and sent them to Homeland Security. Last year, Kashani, Hassanshahi’s lawyer, argued that this evidence should be suppressed on account that it was the "fruit of the poisonous tree"—obtained via illicit means. In support of his arguments, Kashani cited an important ongoing NSA-related lawsuit, Klayman v. Obama, which remains the only instance where a judge has order the NSA metadata program to be shut down—that order was stayed pending an appeal. (Earlier this month, Ars explored Klayman and other pending notable surveillance cases.)
  • ...3 more annotations...
  • In a December 2014 opinion in the Hassanshahi case, US District Judge Rudolph Contreras allowed the evidence, but also required that the government provide a "declaration summarizing the contours of the law enforcement database used by Homeland Security Investigations to discover Hassanshahi’s phone number, including any limitations on how and when the database may be used." To comply with the judge’s order, Robert Patterson, the assistant special agent in charge of the DEA, wrote in the Thursday filing: As noted, this database was a federal law enforcement database. It could be used to query a telephone number where federal law enforcement officials had a reasonable articulable suspicion that the telephone number at issue was related to an ongoing federal criminal investigation. The Iranian number was determined to meet this standard based on specific information indicating that the Iranian number was being used for the purpose of importing technological goods to Iran in violation of United States law. Previously, the government had not revealed exactly how it began its investigation of Hassanshahi, and only referred cryptically to "[DHS]-accessible law enforcement databases," in Akronowitz’ 2013 and  2014 affidavits.
  • Similarly, other privacy-minded legal experts questioned the government’s tactics in this new revelation. "We just don’t know about the scope of these things, and that’s what’s disturbing," Andrew Crocker, a legal fellow at the Electronic Frontier Foundation, told Ars. His colleague, Hanni Fakhoury, an EFF attorney who used to be a federal public defender, added that he was "not surprised." "Bulk surveillance technologies and the dangerous legal theories that are used to support them trickle down, and here's a prime example of that," he wrote by e-mail. "The DEA's mandate is of course important but not at the level of national security where as you know there are serious legal questions about the propriety of this collection of phone metadata. And if the DEA has a program like this, it wouldn't surprise me if other agencies do too for other sorts of records the government has claimed it can collect with a subpoena (like bank records)."
  • Patrick Toomey, an attorney with the American Civil Liberties Union, chimed in to say that this indeed was a clear example of government overreach. "This disclosure underscores how the government has expanded its use of bulk collection far beyond the NSA and the national-security context, to rely on mass surveillance in ordinary criminal investigations," he said by e-mail. "It’s now clear that multiple government agencies have tracked the calls that Americans make to their parents and relatives, friends, and business associates overseas, all without any suspicion of wrongdoing," Toomey continued. "The DEA program shows yet again how strained and untenable legal theories have been used to secretly justify the surveillance of millions of innocent Americans using laws that were never written for that purpose."
  •  
    The authorizing statute clearly limits the scope of the administrative subpoena authority to drug related criminal investigations. "In any investigation relating to his functions under this subchapter with respect to controlled substances, listed chemicals, tableting machines, or encapsulating machines, the Attorney General may subpena witnesses, compel the attendance and testimony of witnesses, and require the production of any records (including books, papers, documents, and other tangible things which constitute or contain evidence) which the Attorney General finds relevant or material to the investigation."
Paul Merrell

Analysis: PA 'balking' at war crimes probe - Middle East - Al Jazeera English - 0 views

  • After a document obtained by Al Jazeera revealed the Palestinian Authority (PA) has stalled the launch of a formal investigation into alleged Israeli war crimes in Gaza, Palestinian legal and human rights experts remain dubious that the PA ever truly intended to join the International Criminal Court (ICC). In a confidential letter obtained exclusively by Al Jazeera's Investigative Unit, the ICC's top prosecutor, Fatou Bensouda, said she "did not receive a positive confirmation" from PA Foreign Minister Riad al-Malki that the request submitted for an international investigation had the Palestinian government's approval. Palestinian officials have, on numerous occasions, threatened to head to the ICC to hold Israel accountable for possible war crimes and crimes against humanity. But their efforts so far, have proved fruitless. In July, a French lawyer filed a complaint with the court on behalf of the Palestinian minister of justice, accusing Israel of carrying out war crimes in the Gaza Strip. This came after a 2009 call for an ICC investigation into Israel's three-week military offensive in Gaza that was later dropped when the prosecutor said Palestine was not a court member. In August, Malki met with ICC officials to discuss the implications of ratifying the Rome Statute, the treaty that established the criminal court. "Everything that has happened...is clear evidence of war crimes committed by Israel, amounting to crimes against humanity," he told reporters in The Hague, referring to the recent 51-day Israeli military offensive on Gaza, which left more than 2,100 Palestinians dead. Six Israeli civilians were killed, along with 66 Israeli soldiers.
  • Two years ago, Palestine became recognised as a non-member observer state at the UN General Assembly. This made it eligible to join the ICC; however, to date, Palestinian officials have not signed the Rome Statute, even though almost 80 percent of Palestinians support going to the court. Senior Fatah official Mohammad Shtayyeh didn't say when the Palestinians would apply to the ICC, but said it would probably happen in another few months. "The indictment against Israel at the ICC and all the accompanying documents are ready," Shtayyeh told Al Jazeera. One of the remaining hurdles, Shtayyeh said, is getting one remaining Palestinian faction - Islamic Jihad - to sign an accession document before the Palestinians can present it. Hamas signed onto the proposal at the behest of the PA in August. "We're not in a situation of setting a deadline or making an ultimatum," he said. "We're following developments in the region and the world, and therefore, we'll wait for answers from the international community. But I believe that by November-December, the picture should be clearer."
  • In response to Al Jazeera's claims, the Palestinian Justice Minister Salim al-Saqqa said that Palestinian President Mahmoud Abbas was serious about going to the ICC and was "awaiting national dialogue" to pursue it. "This issue is our number-one priority," he said. "It is still on the table awaiting a few legal and technical procedures. We have not missed our opportunity to head to the court." So far, the Palestinians have struggled to use the court to pursue their claims, with some attributing this to the PA's use of an ICC investigation as a political bargaining chip. "The PA can go to the ICC in one day," said Shawan Jabarin, the director of Ramallah-based human rights group al-Haq. "Abbas, who has been turned this into a political issue, is balking." Many factors are working against setting off a war crimes investigation at the ICC, not least the international community's apparent opposition to the move. "It is the PA's trump card because the Israelis and the Americans have said it is a red line," said Diana Buttu, a lawyer and former adviser to the Palestine Liberation Organisation (PLO).
  • ...4 more annotations...
  • "When this red line is crossed, then the US said it won't give money to the PA. That's what we call blackmail. But at what point will Abu Mazen [Abbas] say this is a trump card but we will use it?"
  • During US-mediated peace talks between Israel and the Palestinians, Washington ensured that the PA would freeze all moves to turn to international organisations until April 2014. "The Palestinian Authority has been consistently pressured by the USA, Israel, Canada, the UK and other EU Member States not to take steps to grant the ICC jurisdiction," Amnesty International said. "Such pressure has included threats to withdraw financial assistance on which the Palestinian Authority depends."
  • But when Israel reneged on its pledge to free a total of 104 veteran Palestinian prisoners in four tranches, the PA responded by joining 15 international treaties and conventions. Israel said this spelled the end of their negotiations with the Palestinians, while the US said that the PA's moves negatively affected attempts to engage both parties in talks. "The PA's hesitancy can be attributed to several factors: The need to preserve it as a trump card, and also a fear of the US and some European countries' reaction," Jabarin said. "The problem is the method being used by Abbas; he has subjected the issue to political bargaining and to the whims of negotiations." Another reason the PA may be hesitant to set a war crimes investigation in motion is the ramifications it may have on some Palestinian factions. The ICC would likely look into Hamas and Islamic Jihad's rocket-firing o
  • In the past week, Israel said it would open a criminal investigation into several instances of what it is calling "military misconduct" in the Gaza war. Israel's swift call for a probe appears to be an attempt to pre-empt any independent investigations into allegations that its military committed war crimes in Gaza. "The PA gave the Israelis enough time to come up with a trick to prevent the court from opening any investigation," said Saad Djebbar, a London-based lawyer. Generally, the ICC launches probes in instances where the country involved is unable or unwilling to launch an investigation itself, Djebbar told Al Jazeera. "If the court tries to open an inquiry, the Israelis can claim they have jurisdiction [to do it themselves] because the ICC's jurisdiction is complementary," he explained. "The ICC is legally bound to allow an Israeli [probe] to continue."
  •  
    Which helps explain why, in a recent poll of Palestinians in both Gaza and the West Bank, the Hamas leader outpolled Abbas by something on the order of 70-30 on the question of who Palestinians would vote for as President if elections were held at that time. 
Gary Edwards

Benghazi report: Trinkets of treason - 1 views

  •  
    The truth is dribbling out, thn=anks to Douglas J. Hagmann and Canada Free Press .....................  We've been aligned and hostage to the Saudi Royal Family ever since FDR met with King Ibn Saud, Feb 14th, 1945 near the end of WWII.  It was at this meeting that FDR promised protection for the Saudi family in exchange for the right to develop Saudi oil and sell that oil exclusively in dollars.  Hence the "petro dollar" - backed by Saudi oil instead of GOLD. That agreement, and our subsequent history of our military and state departments acting to further Saudi interests has dominated America.  Our troops and military resources ae mercenaries fighting for Saudi dominance of the Globalist ruling elites.  Our politicians are bought and paid for by the Saudi Globalist Alliance.  They have sold their souls for power and money, with the destruction of the USA Constitution the only thing standing between the Globalist and their quest to rule the world. excerpt: We are witnessing one of the biggest government cover-ups since Watergate. A cover-up that involves murder, arms trafficking, and lies by high ranking officials under oath. It involves the murderous attacks in Benghazi, and congressional investigators just released a 46-page interim progress report that at least exposes Hillary Rodham Clinton and the White House lying under oath. Where's the accountability? Where's the outrage? Where's the media? A 46-page interim progress report of an ongoing investigation across five House Committees by the U.S. House of Representatives was released on Tuesday, April 23, 2013. The executive summary states that former Secretary of State Hillary Rodham Clinton signed off on a reduction of diplomatic security forces suggesting that this reduction of security was, in large part, to blame for the attack in Benghazi on September 11, 2012.  The report emphasizes that this is "inconsistent" with her sworn testimony of January 23, 2013. Simply stated, Hillary Rod
Paul Merrell

Int'l Criminal Court's Examination of U.S. Treatment of Detainees Takes Shape | Just Se... - 0 views

  • On Tuesday, the Chief Prosecutor of the International Criminal Court announced, in the most explicit and detailed terms to date, that the U.S. treatment of detainees captured in the Afghanistan conflict is under examination by her office. The statement is included in the Office of the Prosecutor’s (OTP) annual “Report on Preliminary Examination Activities,” released on the eve of the Assembly of States Parties this month.
  • In particular, the OTP is assessing the degree to which national proceedings are underway with respect to the allegations underlying the examination.  Furthermore, an affirmative determination that there is a reasonable basis to proceed with an investigation is far from a finding of strong evidence of criminal wrongdoing. Nevertheless, the appearance of the latter is surely one issue on the minds of administration officials. David Bosco, for instance, reported that “the U.S. delegation urged the court not to publish the allegations, even in preliminary form. They warned that the world would see any ICC mention of possible American war crimes as evidence of guilt, even if the court never brought a formal case.”
  • Here are the key graphs: “94. The Office has been assessing available information relating to the alleged abuse of detainees by international forces within the temporal jurisdiction of the Court. In particular, the alleged torture or ill-treatment of conflict-related detainees by US armed forces in Afghanistan in the period 2003-2008 forms another potential case identified by the Office. In accordance with the Presidential Directive of 7 February 2002, Taliban detainees were denied the status of prisoner of war under article 4 of the Third Geneva Convention but were required to be treated humanely. In this context, the information available suggests that between May 2003 and June 2004, members of the US military in Afghanistan used so-called “enhanced interrogation techniques” against conflict-related detainees in an effort to improve the level of actionable intelligence obtained from interrogations. The development and implementation of such techniques is documented inter alia in declassified US Government documents released to the public, including Department of Defense reports as well as the US Senate Armed Services Committee’s inquiry. These reports describe interrogation techniques approved for use as including food deprivation, deprivation of clothing, environmental manipulation, sleep adjustment, use of individual fears, use of stress positions, sensory deprivation (deprivation of light and sound), and sensory overstimulation.
  • ...4 more annotations...
  • The Prosecutor proceeds in 4 phases within any preliminary examination: (1) an initial assessment to analyze the seriousness of information received; (2) a jurisdictional analysis – the formal commencement of an examination involving “a thorough factual and legal assessment” of whether there is “a reasonable basis to believe that the alleged crimes fall within the subject-matter jurisdiction of the Court;” (3) an admissibility determination – assessing whether the gravity of the crimes or prospect of national investigations and prosecutions preclude the need for the ICC to proceed ; (4) prudential considerations — determining whether an investigation would serve the “interests of justice.” It appears that the examination of U.S. detention operations has reached the third phase and crossed over the important threshold of a finding that there is a reasonable basis to believe U.S. forces committed war crimes within the jurisdiction of the Court. Heller posited that some aspects of the Prosecutor’s Afghanistan examination had already reached this stage in 2013. The 2014 report provides further corroboration specifically with respect to U.S. detention practices. For example, paragraph 96 of the 2014 report states that the Office of the Prosecutor is now “analysing the relevance and genuineness of national proceedings by the competent national authorities for the alleged conduct described above as well as the gravity of the alleged crimes”—clearly a phase three inquiry. That said, paragraph 96 also states that the Office is “continuing to assess the seriousness and reliability of such allegations”—which sounds like phase two and even phase one.
  • 95. Certain of the enhanced interrogation techniques apparently approved by US senior commanders in Afghanistan in the period from February 2003 through June 2004, could, depending on the severity and duration of their use, amount to cruel treatment, torture or outrages upon personal dignity as defined under international jurisprudence. In addition, there is information available that interrogators allegedly committed abuses that were outside the scope of any approved techniques, such as severe beating, especially beating on the soles of the feet, suspension by the wrists, and threats to shoot or kill. 96. While continuing to assess the seriousness and reliability of such allegations, the Office is analysing the relevance and genuineness of national proceedings by the competent national authorities for the alleged conduct described above as well as the gravity of the alleged crimes.
  • The OTP is considering whether the war crimes of cruel treatment, torture or outrages upon personal dignity were committed by U.S. forces. Article 8 of the ICC statute places something of a qualification on the jurisdiction of the Court over war crimes. It states that the Court shall have jurisdiction over war crimes “in particular when committed as part of a plan or policy or as part of a large-scale commission of such crimes.” In 2013, the Prosecutor’s annual report stated that the Office “continues to seek information to determine whether there is any reasonable basis to believe any such alleged acts, which could amount to torture or humiliating and degrading treatment, may have been committed as part of a policy.” That reference to the “as a part of policy” qualification does not appear in the 2014 report. And, on the contrary, the 2014 report highlights elements that indicate the existence of a policy such as the Presidential Directive of 7 February 2002 on the determination of POW status and the senior US commanders’ approval of interrogation techniques.
  • Will bilateral agreements between the US and Afghanistan preclude the ICC from investigating or prosecuting “U.S. persons”? One final question that might arise from these proceedings is the legal viability of the bilateral agreement between the United States and Afghanistan regarding the surrender of persons to the International Criminal Court (full text).  Since the case arises out of Afghanistan’s status under the ICC treaty, the United States might try to claim that the bilateral agreement provides US nationals and employees immunity for actions that took place in Afghanistan. I have briefly discussed the legal viability of such article 98 agreements in an  earlier post at Just Security.
Paul Merrell

Jamie Dimon's $13 Billion Secret | The Nation - 0 views

  • In the end, the abject fear of Ben Wagner got Jamie Dimon to cave.For much of 2013, Dimon, the chairman and chief executive of the formidable JPMorgan Chase & Company, was telling anyone who would listen that it was unfair and unjust for federal and state prosecutors to blame him and his bank for the manufacture and sale of mortgage-backed securities that occurred at Bear Stearns & Company and at Washington Mutual in the years leading up to the financial crisis. When JPMorgan Chase bought those two failing firms in 2008, Dimon argued, he was just doing what Ben Bernanke, Hank Paulson and Timothy Geithner had asked him to do. Why should his bank be held financially accountable for the bad behavior at Bear and WaMu?It was a clever argument—and wrong. Dimon's relentless effort to spin his patriotic story soon collided with the fact that Wagner, the US Attorney for the Eastern District of California, had uncovered evidence that JPMorgan itself was guilty of many of the same greedy and irresponsible behaviors. Piles of subpoenaed documents and e-mails revealed that JPMorgan bankers and traders had underwritten billions of dollars' worth of questionable mortgage-backed securities that Dimon had been telling everyone had originated at Bear Stearns and WaMu. Worse, the bad behavior had occurred on Dimon's watch.
  • The likelihood that the Justice Department would file Wagner's civil complaint last fall—exposing publicly for the first time the litany of wrongdoing at JPMorgan and threatening to push it off the perch that Dimon had so artfully constructed for it over the years—ultimately brought Dimon to the table. On September 26, just weeks after the Justice Department shared a draft copy of Wagner's complaint with Dimon, the two sides arranged for a summit meeting between Dimon and Attorney General Eric Holder. By mid-November, the bank had agreed to pay $13 billion in a comprehensive settlement of mortgage-related securities claims with various branches of the federal government and a group of states, led by the attorneys general of New York, California, Illinois, Massachusetts and Delaware.It was the largest financial settlement of all time, and it kept Wagner's complaint away from the prying eyes of the public. One thing is clear: Dimon's claim that his own bankers and traders had done nothing wrong in the years leading up to the financial crisis wasn't true. "The investigators and the lawyers were uncovering very viable evidence," explains Associate Attorney General Tony West, who headed up the settlement negotiations on behalf of the Justice Department. "I think there was recognition that we had enough evidence there that would support the complaint and would support a robust lawsuit."
  • [A disclosure of my own: after JPMorgan Chase fired me as a managing director in January 2004, I brought—and lost—a wrongful-dismissal arbitration against the bank. Separately, I remain in litigation with the bank as the result of a soured investment I made in 1999.]
  • ...1 more annotation...
  • Dimon was more circumspect. In a conference call the day the settlement was announced, he mostly kept quiet while Marianne Lake, the firm's CFO, led financial analysts through the details, including how $7 billion of the $13 billion fine would be tax-deductible.
  •  
    In a Matt Taibbi-quality lengthy report, William Cohan takes the reader inside the lengthy negotiations of JPMorgan's $13 billion settlement with state and federal prosecutors. JPMorgan admitted to criminal wrongdoing, and the settlement does not include immunity from criminal prosecution for anybody. But the author notes that there is not even a hint that anyone is working on criminal charges. There's a lot of discussion of dissension within the ranks of different state and federal attorneys involved. The article paints Ben Wagner, the US Attorney for the Eastern District of California, as the hero.  In my book, no one involved deserves hero status because no criminal charges have been filed against any JPMorgan managers or board members, hence there is still no incentive for any of the fraudsters who brought down the economy in 2008 to behave differently in the future. JPMorgan emains not too big to fail but too politically connected for its principals to be jailed. According to the article, the government lawyers had iron-clad proof that a group of JPMorgan managing directors had been informed that pools of mortages they were planning to buy were toxic but "buy two of the loan pools anyway, including those with the squirrelly mortgages. JPMorgan then proceeded to bundle "hundreds of millions of dollars of loans from those pools into one security." Wagner found that between the start of 2006 and the middle of 2007-when the mortgage securitization frenzy was at its peak-JPMorgan packaged and sold securities containing thousands of mortgages that were rated by a third-party evaluator to be of extremely low quality, meeting few, if any, of the bank's underwriting standards." If true, that is very serious fraud deserving of the directors' prosecution for criminal fraud and lengthy prison sentences.   The article touches on A.G. Holder's too big to jail argument but that argument, in my opinion, deserves no credibility before antitrust actions are filed to c
Paul Merrell

Conflict Erupts in Public Rebuke on C.I.A. Inquiry - NYTimes.com - 0 views

  • A festering conflict between the Central Intelligence Agency and its congressional overseers broke into the open Tuesday when Senator Dianne Feinstein, chairwoman of the Intelligence Committee and one of the C.I.A.’s staunchest defenders, delivered an extraordinary denunciation of the agency, accusing it of withholding information about its treatment of prisoners and trying to intimidate committee staff members investigating the detention program.Describing what she called a “defining moment” for the oversight of American spy agencies, Ms. Feinstein said the C.I.A. had removed documents from computers used by Senate Intelligence Committee staff members working on a report about the agency’s detention program, searched the computers after the committee completed its report and referred a criminal case to the Justice Department in an attempt to thwart their investigation.
  • Ms. Feinstein’s disclosures came a week after it was first reported that the C.I.A. last year had monitored computers used by her staff in an effort to learn how the committee may have gained access to the agency’s own internal review of the detention and interrogation program that became perhaps the most criticized part of the American government’s response to the Sept. 11, 2001, attacks. Ms. Feinstein said the internal review bolstered the conclusions of the committee’s still-classified report on the program, which President Obama officially ended in January 2009 after sharply criticizing it during the 2008 presidential campaign. For an intelligence community already buffeted by controversies over electronic surveillance and armed drone strikes, the rupture with Ms. Feinstein, one of its closest congressional allies, could have broad ramifications.
  • “Feinstein has always pushed the agency in private and defended it in public,” said Amy B. Zegart, who studies intelligence issues at Stanford University. “Now she is skewering the C.I.A. in public. This is a whole new world for the C.I.A.”Ms. Feinstein, who had refused to comment on the dispute between the C.I.A. and her committee, took the Senate floor on Tuesday morning to say the agency’s actions had breached constitutional provisions for the separation of powers and “were a potential effort to intimidate.” “How this will be resolved will show whether the Intelligence Committee can be effective in monitoring and investigating our nation’s intelligence activities, or whether our work can be thwarted by those we oversee,” she said.
  • ...4 more annotations...
  • The dispute came to a head in mid-January when Mr. Brennan told members of the committee that the agency had carried out a search of computers used by committee investigators at a C.I.A. facility in Northern Virginia, where the committee was examining documents the agency had made available for its report. Ms. Feinstein said on Tuesday that during the meeting, Mr. Brennan told her that the C.I.A. had searched a “walled-off committee network drive containing the committee’s own internal work product and communications” and that he was going to “order further forensic evidence of the committee network to learn more about activities of the committee’s oversight staff.”
  • The C.I.A. had carried out the search to determine whether committee investigators may have gained unauthorized access to the internal review of the detention program that the agency had carried out without informing the committee. Ms. Feinstein on Tuesday vigorously disputed this allegation, saying the document had been included — intentionally or not — as part of a dump of millions of pages the C.I.A. had provided for the Intelligence Committee.
  • Mr. Brennan, in a January letter to Ms. Feinstein that a government official who did not want to be identified released on Tuesday, said the committee had not been entitled to the internal review because it contained “sensitive, deliberative, pre-decisional C.I.A. material”— and therefore was protected under executive privilege considerations. The letter, attached to a statement that Mr. Brennan issued to the agency’s employees on Tuesday, raised questions about Ms. Feinstein’s statements earlier in the day concerning at what point the committee came into possession of the internal review. The C.I.A.’s acting general counsel has referred the matter to the Justice Department as a possible criminal offense, a move Ms. Feinstein called a strong-arm tactic by someone with a conflict of interest in the case. She said that that official had previously been a lawyer in the C.I.A.’s Counterterrorism Center — the section of the spy agency that was running the detention and interrogation program — and that his name is mentioned more than 1,600 times in the committee’s report. Ms. Feinstein did not name the lawyer, but she appeared to be referring to Robert Eatinger, the C.I.A.’s senior deputy general counsel. In 2007, The New York Times reported that when a top C.I.A. official in 2005 destroyed videotapes of brutal interrogations of Al Qaeda detainees, Mr. Eatinger had been one of two lawyers to approve their destruction.
  • Ms. Feinstein said that on two occasions in 2010, the C.I.A. had removed documents totaling hundreds of pages from the computer server used by her staff at the Northern Virginia facility. She did not provide any details about the documents, but said that when committee investigators confronted the C.I.A. they received a number of answers — first a denial that the documents had been removed, then an explanation that they had been removed by contractors working at the facility, then an explanation that the removal of documents was ordered by the White House. When the committee approached the White House, she said, it denied giving such an order.Ms. Feinstein’s broadside rallied Senate Democrats, but divided Republicans.
  •  
    The separation of powers Constitutional issue here is plain. The Senate has oversight of the CIA; the CIA has no lawful oversight of the Senate and furthermore is forbidden by law from conducting surveillance within the U.S. But the CIA spied on the Senate, then used evidence it found to file a criminal complaint with the DoJ against Senate staffers. Tit for tat, a criminal complaint has been filed against the CIA staffers.   
Paul Merrell

Details of Illegal Torture That the CIA Doesn't Want You to Know About - Atlantic Mobile - 0 views

  • The Senate report on CIA torture is still being suppressed. But details are leaking out, according to a report by Jason Leopold. Citing Intelligence Committee staffers, he writes that "at least one high-value detainee was subjected to torture techniques that went beyond those authorized by George W. Bush's Justice Department." In addition, "harsh measures authorized by the Department of Justice had been applied to at least one detainee before such legal authorization was received."  The notion that Bush-era interrogations were lawful has always been highly dubious. This latest news plucks away even the fig leaf afforded by Bush Administration attorneys. Some say it would be unfair to prosecute anyone told that a tactic was permitted.  Will they call for a criminal investigation of these incidents? The CIA seems to agree that these details are important. It is seeking new assurances that the report won't lead to criminal investigations, according to Leopold's sources:
  • When Panetta briefed CIA employees on March 16, 2009, about the Senate Intelligence Committee’s review, he said Feinstein and her Republican counterpart, Kit Bond of Missouri, had “assured” him “that their goal is to draw lessons for future policy decisions, not to punish those who followed guidance from the Department of Justice.” But now that some of the report’s conclusions suggest that some of the techniques used on Abu Zubaydah and other captives either went beyond what was authorized by the Justice Department or were applied before they had been authorized, the congressional staffers and U.S. officials who spoke to Al Jazeera said CIA officials are seeking further assurances against any criminal investigation. Thus far, no such assurances have been given, according to Al Jazeera’s sources, nor is there any indication that the Senate Intelligence Committee’s report would prompt a criminal investigation. Any agreement to refrain from investigating torture as a criminal offense would itself violate the law. The UN Convention Against Torture, signed by Ronald Reagan and later ratified by the U.S. Senate, compels signatories to investigate torture and "submit the case to its competent authorities for the purpose of prosecution." Perhaps the U.S. will one day adhere to the law.
Paul Merrell

Exclusive: U.S. directs agents to cover up program used to investigate Americans - chic... - 0 views

  • WASHINGTON (Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
  • The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred. Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential. "Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."
  • A spokesman with the Department of Justice, which oversees the DEA, declined to comment. But two senior DEA officials defended the program, and said trying to "recreate" an investigative trail is not only legal but a technique that is used almost daily.
  • ...2 more annotations...
  • A former federal agent in the northeastern United States who received such tips from SOD described the process. "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it," the agent said. "PARALLEL CONSTRUCTION" After an arrest was made, agents then pretended that their investigation began with the traffic stop, not with the SOD tip, the former agent said. The training document reviewed by Reuters refers to this process as "parallel construction." The two senior DEA officials, who spoke on behalf of the agency but only on condition of anonymity, said the process is kept secret to protect sources and investigative methods. "Parallel construction is a law enforcement technique we use every day," one official said. "It's decades old, a bedrock concept." A dozen current or former federal agents interviewed by Reuters confirmed they had used parallel construction during their careers. Most defended the practice; some said they understood why those outside law enforcement might be concerned.
  • Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE. The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said. About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.
Paul Merrell

Federal Bureau of Investigation - Cincinnati [...] (via noodls) / Former Columbus Polic... - 0 views

  • COLUMBUS, OH-Former Columbus Police Officer Steven Edward Dean, 49, of Columbus, was sentenced in U.S. District Court to 30 months in prison for misappropriating and selling heavy equipment and other property the Columbus Division of Police received through a Department of Defense surplus program. Carter M. Stewart, U.S. Attorney for the Southern District of Ohio; Kevin Cornelius, Special Agent in Charge, Federal Bureau of Investigation (FBI); Brian Reihms, Special Agent in Charge, Defense Criminal Investigative Service (DCIS); and Columbus Police Chief Kim Jacobs announced the sentence handed down today by U.S. District Judge Michael H. Watson. According to court documents, an investigation by the Columbus Division of Police, the FBI and DCIS concluded that between October 1, 2005 and June 1, 2012, Dean diverted property with a fair market value of $251,570.94 the police department had received from the Defense Reutilization Marketing Office (DRMO) program. The embezzled items included $133,554.59 of heavy equipment, construction equipment, and vehicles; restaurant equipment; $94,163.25 of materials sold for scrap; and $16,353.15 worth of items, including diesel generators, sold to private persons. This conclusion was based on records obtained from the U.S. Department of Defense DRMO program, the state of Ohio offices involved with the DRMO program, scrapyard receipts, Craigslist online point-of-sale website records, restaurant supply records of sold equipment, and by viewing the items of property themselves.
  • Federal Bureau of Investigation - Cincinnati Field Office 08/13/2014 | Press release Former Columbus Police Officer Sentenced for Embezzling from Defense Department Surplus Program
  • "This is a major theft and embezzlement case involving a uniformed police officer stealing from his own department and involving property which should have otherwise been used to assist law enforcement, and all the equipment and vehicles were originally purchased with taxpayer dollars," Assistant U.S. Attorneys Doug Squires and Deborah Solove told the court prior to sentencing. "Today's sentencing demonstrates the Defense Criminal Investigative Service's ongoing commitment to combating fraud and corruption that impacts the Department of Defense's vital programs and operations," said Brian Reihms, Special Agent in Charge, Defense Criminal Investigative Service (DCIS), "DCIS, with our partner agencies, will continue to work tirelessly to investigate fraud involving the DoD's DRMO Law Enforcement Support Office which transfers excess property to law enforcement organizations across the United States." Dean pleaded guilty in February to one count of embezzlement from a program receiving federal funds and one count of theft of public property. Under terms of the plea agreement, Dean will forfeit $251,570.94 less the value of the recovered equipment. Dean was also sentenced to three years of supervised released following inprisonment. U.S. Attorney Stewart commended the investigation by DCIS, the FBI, and CPD, as well as Assistant U.S. Attorneys Doug Squires and Deborah Solove, who prosecuted the case.
  •  
    Thanks for keeping us safe, Officer Dean. Related: http://www.dispositionservices.dla.mil/leso/Pages/default.aspx (DoD section1033 law enforcement donation program) and http://www.law.cornell.edu/uscode/text/10/2576a ("Notwithstanding any other provision of law and subject to subsection (b), the Secretary of Defense may transfer to Federal and State agencies personal property of the Department of Defense, including small arms and ammunition, that the Secretary determines is- (A) suitable for use by the agencies in law enforcement activities, including counter-drug and counter-terrorism activities; and (B) excess to the needs of the Department of Defense.") 
1 - 20 of 277 Next › Last »
Showing 20 items per page