Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged law-enforcement

Rss Feed Group items tagged

Paul Merrell

Loopholes, Filing Failures, and Lax Enforcement: How the Foreign Agents Registration Ac... - 0 views

  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Executive Summary The Foreign Agents Registration Act (FARA) requires that all American citizens working to influence U.S. policy on behalf of foreign governments register with the Department of Justice and to disclose information on any and all political activity in which they engaged for foreign clients. This includes filing, within 48 hours, any informational materials disseminated to two or more people.
  • ...7 more annotations...
  • Table of Contents Executive SummaryIntroductionBackgroundWhat the Foreign Influence Database ShowsEgypt: A Case Study Of Foreign InfluenceSame-Day ContributionsSystemic Foreign InfluenceQuid Pro Quo or Coincidence?Foreign Money and the LawLax Compliance with and Enforcement of FARAEnforcementConclusionRecommendationsEndnotes
  • The law requires lobbyists for foreign interests to plainly and conspicuously identify themselves as such in any materials distributed in the course of their lobbying—for example, emails, other correspondence, or publications. We found that many documents filed with the Justice Department lack this identification statement; furthermore, many lobbyists admitted that they did not comply with this requirement. More than half (51 percent) of the registrants we examined in a sample from 2010 checked a box on a the semi-annual Justice Department questionnaire saying they had filed informational materials, and checked another box saying they had not met the legal requirement that they identify themselves in those materials as working on behalf of foreign interests. Toby Moffett, a former Member of Congress from Connecticut who is now Chairman of the Moffett Group and one of its registered lobbyists, told POGO that “Around the edges there’s a lot of loosey-goosey stuff going on. People representing foreign interests and not reporting.”[4] But even when lobbyists do report to the Justice Department, the information they provide is not easily accessible to the public. Astonishingly, informational materials are not available online, despite the fact that the Justice Department has an electronic filing system. Instead, these documents are kept in an office at the Justice Department that is only open for four hours each weekday. Hard copies of the documents are kept in folders that are often disorganized and susceptible to misfiling. This archaic system undermines the intended transparency of the law.
  • We set out to determine the extent to which lobbyists for foreign interests were filing lobbying materials at the Justice Department within the required time frame. Based on a review of filings made in 2012, in those instances where it was possible to answer the question, POGO estimates that almost half—46 percent—were filed late. Fifteen percent were filed more than 30 business days after they were distributed, and 12 percent were filed more than 100 business days after they were distributed. In many instances, the Justice Department would be hard pressed to enforce the filing deadline. Based on the records the Department maintains to enforce the law, we found that in more than a quarter (26 percent) of the 2012 filings, it was impossible to determine whether the lobbyists complied. For example, in many cases, the records did not show when the lobbyists disseminated the materials to the targets of their lobbying. In a glaring omission, the law does not require lobbyists to provide that information. Without it, there may be no way for the government or the public to know whether lobbying materials were filed on time.
  • Though federal law bars foreign money from U.S. political campaigns, there appears to be a gray area in the law that can let in such money indirectly. POGO found many instances in which members of lobbying firms made political contributions to Members of Congress on the same day that those firms were lobbying the Members of Congress or their legislative staffs on behalf of foreign clients.[1] Lobbyists who fail to comply with certain FARA requirements may have little to fear from the Justice Department. “The cornerstone of the Registration Unit’s enforcement efforts is encouraging voluntary compliance,” a Justice Department website says.[2] When lobbyists do not voluntarily comply, the Justice Department rarely uses one of the key tools at its disposal to enforce the law—seeking a court injunction. A representative of the Department’s FARA unit told POGO: “While the FARA statute and regulations authorize the pursuit of formal legal proceedings, such as injunctive remedy options, the FARA Unit [has] not pursued injunctive remedy options recently and has instead utilized other mechanisms to achieve compliance.”[3] It appears that some registered foreign agents have been distributing materials but not filing them with the Justice Department. It’s unclear the extent to which that illustrates a lack of compliance with the law or loopholes in the law. In the process of researching this report, POGO noticed that many more lobbyists were registering as foreign agents than had filed informational materials that we could locate at the FARA office. To determine what was happening, we looked at a sampling of questionnaires that the Justice Department requires registered agents to complete every six months. Some checked one box indicating they had distributed materials and another box stating they did not file them with the FARA office.
  • The Project On Government Oversight examined thousands of these materials spanning four years, as well as additional public records related to the Justice Department’s oversight of lobbyists for foreign interests. We found that lobbyists for foreign interests have routinely failed to comply with the law—a failure that prevents journalists and watchdogs from scrutinizing the lobbying activities while foreign interests are trying to influence U.S. policy. We found a pattern of lax enforcement of FARA requirements by the Justice Department. We found that the Justice Department office responsible for administering the law is a record-keeping mess. And we found loopholes in the law that often makes it difficult if not impossible for the government to police compliance or to discipline lobbyists who fail to comply. Here are some highlights of our investigation:
  • When lobbyists for foreign interests do not follow the law, when the U.S. government fails to enforce it, and when the Justice Department makes it difficult for the American people to access records to which they are legally entitled, the public is left in the dark. To bring more transparency to this opaque realm, POGO has made four years of informational materials available for the first time online with our Foreign Influence Database, allowing the public to see how lobbyists attempt to influence American policies on behalf of their foreign clients.
  • With the release of the Foreign Influence Database, the Project On Government Oversight (POGO) is making years of documents from this key set of FARA filings electronically available for the first time. The materials were previously only available in hard copy at the FARA Registration Unit in Washington, DC, which is only open to the public from 11am to 3pm on weekdays.[12] In this digital age it is surprising that these materials could not be read online and are instead stored in file folders, where they are disorganized and susceptible to misfiling. Even those that were electronically filed by the registrants are not available to the public in an electronic format. POGO’s database includes informational materials filed in 2009, 2010, 2011, and 2012.[13]
  •  
    POGO does thorough work and doesn't let up until it gets results. Forcing DoJ to puts its foreign agents registration materials online should be a fairly trivial battle. The real war, though, will be forcing better enforcement. The new database is at http://www.pogo.org/tools-and-data/foreign-influence-database/ I punched up the word "Israel" and came up with 113 documents in the search results. Each search hit lists the name of the nation involved that the lobbying was done for. Of those 113 document hits, only two were for the nation of Israel, both for its Ministry of Tourism. The rest were by other nations who had mentioned Israel in their lobbying materials.  Now that is fairly incredible, given that Israel outright controls Congress when it comes to Middle East policy.  The last administration to attempt to do something about Israeli lobbyists not registering was the the Kennedy Administration. The result was that the major Israeli lobbying group disbanded and was promptly reformed under a new corporate charter and name. That was the very last attempt at enforcing the Foreign Agents Registration Act against Israel's lobbyists in the U.S., despite the fact that the reformed group, AIPAC, has even been caught more than once being passed highly classified U.S. documents by double agents working inside the U.S. military establishment. The leakers went to prison but the AIPACers were never prosecuted. AIPAC rules.  
Gary Edwards

Ted Cruz: Legal Limit Report 4 - 0 views

  •  
    "  1 THE LEGAL LIMIT: THE OBAMA ADMINISTRATION'S ATTEMPTS TO EXPAND FEDERAL POWER  Report No. 4: The Obama Administration's Abuse of Power By U.S. Senator Ted Cruz (R-TX) Ranking Member Senate Judiciary Subcommittee on The Constitution, Civil Rights and Human Rights Of all the troubling aspects of the Obama presidency, none is more dangerous than the President's persistent pattern of lawlessness, his willingness to disregard the written law and instead enforce his own policies via executive fiat. The President's taste for unilateral action to circumvent Congress should concern every citizen, regardless of party or ideology. The great 18th-century political philosopher Montesquieu observed: "There can be no liberty where the legislative and executive powers are united in the same person, or body of magistrates." America's Founding Fathers took this warning to heart, and we should too. Rule of law doesn't simply mean that society has laws; dictatorships are often characterized by an abundance of laws. Rather, rule of law means that we are a nation ruled   by laws, not men. No one-and especially not the president-is above the law. For that reason, the U.S. Constitution imposes on every president the express duty to "take Care that the Laws be faithfully executed." R ather than honor this duty, President Obama has openly defied it by repeatedly suspending, delaying, and waiving portions of the laws that he is charged to enforce. When President Obama disagreed with federal immigration laws, he instructed the Justice Department to cease enforcing the laws. He did the same thing with federal welfare law, drug laws, and the federal Defense of Marriage Act. In the more than two centuries of our nation's history, there is simply no precedent for the White House wantonly ignoring federal law and asking others to do the same. For all those who are silent now: What would they think of a Republican president who announced that he was going to ignore th
  •  
    "  1 THE LEGAL LIMIT: THE OBAMA ADMINISTRATION'S ATTEMPTS TO EXPAND FEDERAL POWER  Report No. 4: The Obama Administration's Abuse of Power By U.S. Senator Ted Cruz (R-TX) Ranking Member Senate Judiciary Subcommittee on The Constitution, Civil Rights and Human Rights Of all the troubling aspects of the Obama presidency, none is more dangerous than the President's persistent pattern of lawlessness, his willingness to disregard the written law and instead enforce his own policies via executive fiat. The President's taste for unilateral action to circumvent Congress should concern every citizen, regardless of party or ideology. The great 18th-century political philosopher Montesquieu observed: "There can be no liberty where the legislative and executive powers are united in the same person, or body of magistrates." America's Founding Fathers took this warning to heart, and we should too. Rule of law doesn't simply mean that society has laws; dictatorships are often characterized by an abundance of laws. Rather, rule of law means that we are a nation ruled   by laws, not men. No one-and especially not the president-is above the law. For that reason, the U.S. Constitution imposes on every president the express duty to "take Care that the Laws be faithfully executed." R ather than honor this duty, President Obama has openly defied it by repeatedly suspending, delaying, and waiving portions of the laws that he is charged to enforce. When President Obama disagreed with federal immigration laws, he instructed the Justice Department to cease enforcing the laws. He did the same thing with federal welfare law, drug laws, and the federal Defense of Marriage Act. In the more than two centuries of our nation's history, there is simply no precedent for the White House wantonly ignoring federal law and asking others to do the same. For all those who are silent now: What would they think of a Republican president who announced that he was going to ignore the law, or unil
Gary Edwards

What Is or Should Be the Law? essay on Frederik Bastiat's "The Law" - 1 views

  •  
    Jeffrey Tucker at The Daily Reckoning wonders about all those Presidential Executive Orders that make Law while by-passing the Congressional process and making mockery of the USA Constitution.  He ends up referencing the great libertarian, Frederick Bastiat's seminal work, The Law - written in 1849.    
    excerpt: One party gets annoyed when the other party's president enacts laws without regard to any constitutional conventions.
    But what is the law, and what should it be? These are the bigger questions that are not part of public consciousness.
    The same was true in the time of Frédéric Bastiat (1801-50). At the very end of his life, he wrote an impassioned plea on the topic. He tried to get people to think hard about what was happening and how law had become an instrument of plunder, rather than a protector of property.
    He writes:
    ...... "It is not true that the function of law is to regulate our consciences, our ideas, our wills, our education, our opinions, our work, our trade, our talents or our pleasures. The function of law is to protect the free exercise of these rights, and to prevent any person from interfering with the free exercise of these same rights by any other person." .......
    This is from Bastiat's The Law, one of the great political essays to emerge from the whole Continental world of the 19th century. It vanished into obscurity in France, was resurrected in late 19th century English, and then disappeared again, only to reappear in the United States in the 1950s, thanks to the efforts of the Foundation of Economic Education.
    This essay asks fundamental questions that most people go through life never having thought about.
    The problem is that most people accept the law as a given, a fundamental fact. As a member of society, you obey or face the consequences. It is not safe to question why. This is because the enforcement arm of the law is the state, that peculiar agency with a unique power in society to
Gary Edwards

The Lawless President - 0 views

  •  
    Excellent read!  Peter Ferrara walks us through the latest Obama assault on the Constitution, this time his refusal to enforce laws he disagrees with.  Surprisingly, this now includes the employer mandate portion of ObamaCare!!!  Why he has to do this however is a stunning story. Bottom line:  The latest jobs report has the economy producing 195,000 new jobs in the past quarter.  The problem is, 100% of these new jobs are part-time.  Thanks to ObamaCare.   "The duties of the President of the United States are spelled out in Article II, Section 3 of the Constitution, which states, inter alia, that the President "shall take Care that the laws be faithfully executed." As Stanford Law Professor and former federal judge Michael McConnell explained in yesterday's Wall Street Journal, "This is a duty, not a discretionary power. While the president does have substantial discretion about how to enforce a law, he has no discretion about whether to do so." Section 1513(d) of the Unaffordable Care Act (aka "Obamacare") states unequivocally, "The amendments made by this section shall apply to months beginning after December 31, 2013." In other words, the provisions of Obamacare become fully effective in 2014, as a matter of duly enacted federal law. But over the long Fourth of July weekend, in a "Never Mind" moment, the Obama Administration announced, through a Deputy Assistant Secretary of the Treasury, that contrary to federal law, the employer mandate of Obamacare shall not become fully effective in months beginning after December 31, 2013, but only in months beginning after December 31, 2014. Making the announcement through such a low level Administration official to me says that Obama has contempt for the American people, and for the rule of law. Barack Obama: Lawbreaker But it does not matter who announces it. The President is the one responsible. And the announcement constitutes the assumption of authoritarian powers by President Obama. McCo
Paul Merrell

FindLaw | Cases and Codes - 0 views

  • SMITH v. MARYLAND, 442 U.S. 735 (1979)
  • The telephone company, at police request, installed at its central offices a pen register to record the numbers dialed from the telephone at petitioner's home. Prior to his robbery trial, petitioner moved to suppress "all fruits derived from" the pen register. The Maryland trial court denied this motion, holding that the warrantless installation of the pen register did not violate the Fourth Amendment. Petitioner was convicted, and the Maryland Court of Appeals affirmed. Held: The installation and use of the pen register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant was required. Pp. 739-746. (a) Application of the Fourth Amendment depends on whether the person invoking its protection can claim a "legitimate expectation of privacy" that has been invaded by government action. This inquiry normally embraces two questions: first, whether the individual has exhibited an actual (subjective) expectation of privacy; and second, whether his expectation is one that society is prepared to recognize as "reasonable." Katz v. United States, 389 U.S. 347 . Pp. 739-741.
  • (b) Petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and even if he did, his expectation was not "legitimate." First, it is doubtful that telephone users in general have any expectation of privacy regarding the numbers they dial, since they typically know that they must convey phone numbers to the telephone company and that the company has facilities for recording this information and does in fact record it for various legitimate business purposes. And petitioner did not demonstrate an expectation of privacy merely by using his home phone rather than some other phone, since his conduct, although perhaps calculated to keep the contents of his conversation private, was not calculated to preserve the privacy of the number he dialed. Second, even if petitioner did harbor some subjective expectation of privacy, this expectation was not one that society is prepared to recognize as "reasonable." When petitioner voluntarily conveyed numerical information to the phone company and "exposed" that information to its equipment in the normal course of business, he assumed the risk that the company would reveal the information [442 U.S. 735, 736]   to the police, cf. United States v. Miller, 425 U.S. 435 . Pp. 741-746. 283 Md. 156, 389 A. 2d 858, affirmed.
  •  
    The Washington Post has reported that "on July 15 [2001], the secret surveillance court allowed the NSA to resume bulk collection under the court's own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as "pen register, trap and trace," that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line." .  The seminal case on pen registers is the Supreme Court's 1979 Smith v. Maryland decision, bookmarked here and the Clerk's syllabus highlighted, with the Court's discussion on the same web page. We will be hearing a lot about this case decision in the weeks and months to come.  Let it suffice for now to record a few points of what my antenna are telling me:  -- Both technology and the law have moved on since then. We are 34 years down the line from the Smith decision. Its pronouncements have been sliced and diced by subsequent decisions. Not a single Justice who sat on the Smith case is still on the High Bench.   -- In Smith, a single pen register was used to obtain calling information from a single telephone number by law enforcement officials. In the present circumstance, we face an Orwellian situation of a secret intelligence agency with no law enforcement authority forbidden by law from conducting domestic surveillance perusing and all digital communications of the entire citizenry. -- The NSA has been gathering not only information analogous to pen register results but also the communications of American citizens themselves. The communications themselves --- the contents --- are subject to the 4th Amendment warrant requirement. Consider the circuitous route of the records ordered to be disclosed in the Verizon FISA order. Verizon was ordered to disclose them to the FBI, not to the NSA. But then the FBI apparently forwards the records to the NSA, who has both the "pen register
Paul Merrell

No, Israel Does Not Have the Right to Self-Defense In International Law Against Occupie... - 0 views

  • On the fourth day of Israel's most recent onslaught against Gaza's Palestinian population, President Barack Obama declared, “No country on Earth would tolerate missiles raining down on its citizens from outside its borders.” In an echo of Israeli officials, he sought to frame Israel's aerial missile strikes against the 360-square kilometer Strip as the just use of armed force against a foreign country. Israel's ability to frame its assault against territory it occupies as a right of self-defense turns international law on its head.  A state cannot simultaneously exercise control over territory it occupies and militarily attack that territory on the claim that it is “foreign” and poses an exogenous national security threat. In doing precisely that, Israel is asserting rights that may be consistent with colonial domination but simply do not exist under international law. 
  • Admittedly, the enforceability of international law largely depends on voluntary state consent and compliance. Absent the political will to make state behavior comport with the law, violations are the norm rather than the exception. Nevertheless, examining what international law says with regard to an occupant’s right to use force is worthwhile in light of Israel's deliberate attempts since 1967 to reinterpret and transform the laws applicable to occupied territory. These efforts have expanded significantly since the eruption of the Palestinian uprising in 2000, and if successful, Israel’s reinterpretation would cast the law as an instrument that protects colonial authority at the expense of the rights of civilian non-combatants.  
  • International Law places the responsibility upon the commanding general of preserving order, punishing crime, and protecting lives and property within the occupied territory. His power in accomplishing these ends is as great as his responsibility.  The extent and breadth of force constitutes the distinction between the right to self-defense and the right to police. Police authority is restricted to the least amount of force necessary to restore order and subdue violence. In such a context, the use of lethal force is legitimate only as a measure of last resort. Even where military force is considered necessary to maintain law and order, such force is circumscribed by concern for the civilian non-combatant population. The law of self-defense, invoked by states against other states, however, affords a broader spectrum of military force. Both are legitimate pursuant to the law of armed conflict and therefore distinguished from the peacetime legal regime regulated by human rights law. 
  • ...5 more annotations...
  • Military occupation is a recognized status under international law and since 1967, the international community has designated the West Bank and the Gaza Strip as militarily occupied. As long as the occupation continues, Israel has the right to protect itself and its citizens from attacks by Palestinians who reside in the occupied territories. However, Israel also has a duty to maintain law and order, also known as “normal life,” within territory it occupies. This obligation includes not only ensuring but prioritizing the security and well-being of the occupied population. That responsibility and those duties are enumerated in Occupation Law.  Occupation Law is part of the laws of armed conflict; it contemplates military occupation as an outcome of war and enumerates the duties of an occupying power until the peace is restored and the occupation ends. To fulfill its duties, the occupying power is afforded the right to use police powers, or the force permissible for law enforcement purposes. As put by the U.S. Military Tribunal during the Hostages Trial (The United States of America vs. Wilhelm List, et al.)
  • To equate the two is simply to confuse the legal with the linguistic denotation of the term ”defense.“ Just as ”negligence,“ in law, does not mean ”carelessness” but, rather, refers to an elaborate doctrinal structure, so ”self-defense” refers to a complex doctrine that has a much more restricted scope than ordinary notions of ”defense.“  To argue that Israel is employing legitimate “self-defense” when it militarily attacks Gaza affords the occupying power the right to use both police and military force in occupied territory. An occupying power cannot justify military force as self-defense in territory for which it is responsible as the occupant. The problem is that Israel has never regulated its own behavior in the West Bank and Gaza as in accordance with Occupation Law. 
  • Once armed conflict is initiated, and irrespective of the reason or legitimacy of such conflict, the jus in bello legal framework is triggered. Therefore, where an occupation already is in place, the right to initiate militarized force in response to an armed attack, as opposed to police force to restore order, is not a remedy available to the occupying state. The beginning of a military occupation marks the triumph of one belligerent over another. In the case of Israel, its occupation of the West Bank, the Gaza Strip, the Golan Heights, and the Sinai in 1967 marked a military victory against Arab belligerents.  Occupation Law prohibits an occupying power from initiating armed force against its occupied territory. By mere virtue of the existence of military occupation, an armed attack, including one consistent with the UN Charter, has already occurred and been concluded. Therefore the right of self-defense in international law is, by definition since 1967, not available to Israel with respect to its dealings with real or perceived threats emanating from the West Bank and Gaza Strip population. To achieve its security goals, Israel can resort to no more than the police powers, or the exceptional use of militarized force, vested in it by IHL. This is not to say that Israel cannot defend itself—but those defensive measures can neither take the form of warfare nor be justified as self-defense in international law. As explained by Ian Scobbie:  
  • When It Is Just to Begin to Fight  The laws of armed conflict are found primarily in the Hague Regulations of 1907, the Four Geneva Conventions of 1949, and their Additional Protocols I and II of 1977. This body of law is based on a crude balance between humanitarian concerns on the one hand and military advantage and necessity on the other. The post-World War II Nuremberg trials defined military exigency as permission to expend “any amount and kind of force to compel the complete submission of the enemy…” so long as the destruction of life and property is not done for revenge or a lust to kill. Thus, the permissible use of force during war, while expansive, is not unlimited.  In international law, self-defense is the legal justification for a state to initiate the use of armed force and to declare war. This is referred to as jus ad bellum—meaning “when it is just to begin to fight.” The right to fight in self-defense is distinguished from jus in bello, the principles and laws regulating the means and methods of warfare itself. Jus ad bellum aims to limit the initiation of the use of armed force in accordance with United Nations Charter Article 2(4); its sole justification, found in Article 51, is in response to an armed attack (or an imminent threat of one in accordance with customary law on the matter). The only other lawful way to begin a war, according to Article 51, is with Security Council sanction, an option reserved—in principle, at least—for the defense or restoration of international peace and security.
  • Noura Erakat
Paul Merrell

Feinstein promotes bill to strengthen NSA's hand on warrantless searches | World news |... - 0 views

  • A Senate bill promoted as a surveillance reform would codify the ability of the National Security Agency to search its troves of foreign phone and email communications for Americans’ information, and permit law enforcement agencies to search the vast databases as well. The Fisa Improvements Act, promoted by Dianne Feinstein, the California Democrat who chairs the Senate intelligence committee, would both make permanent a loophole permitting the NSA to search for Americans’ identifying information without a warrant – and, civil libertarians fear, contains an ambiguity that might allow the FBI, the DEA and other law enforcement agencies to do the same thing. “For the first time, the statute would explicitly allow the government to proactively search through the NSA data troves of information without a warrant,” said Michelle Richardson, the surveillance lobbyist for the ACLU.
  • “It may also expand current practices by allowing law enforcement to directly access US person information that was nominally collected for foreign intelligence purposes. This fourth amendment back door needs to be closed, not written into stone.” Feinstein’s bill passed the committee on an 11 to 4 vote on 31 October. An expanded report on its provisions released by the committee this week added details about the ability of both intelligence and law enforcement to sift through foreign communications databases that it accumulates under section 702 of the Fisa Amendments Act of 2008. Section 6 of Feinstein’s bill blesses what her committee colleague Ron Wyden, the Oregon Democrat and civil libertarian, has called the “backdoor search provision,” which the Guardian revealed thanks to a leak by Edward Snowden.  The section permits intelligence agencies to search “the contents of communications” collected primarily overseas for identifying information on US citizens, resident aliens and people inside the US, provided that the “purpose of the query is to obtain foreign intelligence information or information necessary to understand foreign intelligence information or to assess its importance.”
  • Section 6 bills itself as a “restriction,” but it would not stop the NSA from performing the warrantless search, merely requiring intelligence agencies to log their queries and make them “available for review” to Congress, the Fisa court, the Justice Department and inspectors general inside the executive branch. Additionally, the report on Section 6 explicitly states that the provision “does not limit the authority of law enforcement agencies to conduct queries of data acquired pursuant to Section 702 of Fisa for law enforcement purposes.” There is ambiguity surrounding whether the FBI can currently search through the NSA’s foreign communications databases, or is reliant on the NSA to pass on information from the databases relevant to the bureau. A declassified Fisa court document from 2011 refers to “FBI minimization procedures,” but it is unclear what those procedures are. A copy of the FBI minimization procedures from 2009, acquired by the ACLU under the Freedom of Information Act is almost completely redacted. So is the section in the government’s most recent report on its Section 702 collection dealing with the FBI’s role, though it contains references to how the FBI “receive[s] … unminimized Section 70 acquired communications” from the NSA. 
  • ...1 more annotation...
  • Feinstein’s bill “seems to imply there is currently some authority for law enforcement to query the database, which [intelligence community] officials have not mentioned in any of their remarks on Section 702,” said Alan Butler, an attorney with the Electronic Privacy Information Center. The provision is also unclear about whether law enforcement agencies can search through the foreign communications databases for information on US persons. Feinstein’s office did not respond to a request for clarification by deadline. The ambiguity concerns civil libertarians, as it opens a door for law enforcement agencies to sidestep warrant requirements. “If Senator Feinstein or other congressional supporters of this bill believe that it would in fact expand law enforcement access to the database, that would be an unjustified expansion of surveillance over Americans,” Butler said.
Gary Edwards

Is martial law the ultimate goal? - Tea Party Command Center - 0 views

  •  
    "During President Obama's first term he laid the ground work. President Obama issued over 900 executive orders, many dealing with martial law. As the Supreme Court already opinioned when looking at President Lincolns use of martial law, "Martial law ... destroys every guarantee of the Constitution.". This means when martial law is declared we as Americans have no rights at all. During President Obama's first term he wrote Executive Orders granting the government the power to take over all communications media, electrical power, gas, petroleum, fuels and minerals. He also wrote an Executive Order where the government can take over all modes of transportation and control of the highways and sea ports. That means Obama can confiscate your horse, your donkeys, your bicycle or even your riding lawn mower. All forms of transportation. Executive orders signed by Obama also include railroads, inland water ways, public storage facilities, airports and airplanes including commercial planes can all be taken over by the government." Executive Orders have also been signed allowing the government to mobilize civilians into work brigades under government supervision. To take over all health education and welfare functions. To allow the Housing and Finance Authority to relocate and establish new locations for populations, AND grants authority to the Department of Justice to enforce the plans set out in Executive Orders, to institute Industrial support, to establish judicial and legislative liaison, to control all aliens, to operate penal and correctional institutions, and to advise and assist the President. An Executive order has also been signed which allows the Federal Emergency Preparedness Agency to develop plans to establish control over the mechanisms of production and distribution of energy sources, wages, salaries, credit, and the flow of money in U.S. financial institutions in any undefined national emergency. It also provides that when the president declares a state of
Gary Edwards

The Civil War is Here | Frontpage Mag - 0 views

  •  
    "Daniel Greenfield, a Shillman Journalism Fellow at the Freedom Center, is a New York writer focusing on radical Islam. A civil war has begun. This civil war is very different than the last one. There are no cannons or cavalry charges. The left doesn't want to secede. It wants to rule. Political conflicts become civil wars when one side refuses to accept the existing authority. The left has rejected all forms of authority that it doesn't control. The left has rejected the outcome of the last two presidential elections won by Republicans. It has rejected the judicial authority of the Supreme Court when it decisions don't accord with its agenda. It rejects the legislative authority of Congress when it is not dominated by the left. It rejected the Constitution so long ago that it hardly bears mentioning.   It was for total unilateral executive authority under Obama. And now it's for states unilaterally deciding what laws they will follow. (As long as that involves defying immigration laws under Trump, not following them under Obama.) It was for the sacrosanct authority of the Senate when it held the majority. Then it decried the Senate as an outmoded institution when the Republicans took it over. It was for Obama defying the orders of Federal judges, no matter how well grounded in existing law, and it is for Federal judges overriding any order by Trump on any grounds whatsoever. It was for Obama penalizing whistleblowers, but now undermining the government from within has become "patriotic". There is no form of legal authority that the left accepts as a permanent institution. It only utilizes forms of authority selectively when it controls them. But when government officials refuse the orders of the duly elected government because their allegiance is to an ideology whose agenda is in conflict with the President and Congress, that's not activism, protest, politics or civil disobedience; it's treason. After losing Congress, the left consolidated
Paul Merrell

Corp Fueling Fentanyl Overdose Epidemic Lobbying to Keep Weed Illegal - 0 views

  • In 2016, cannabis is still illegal in many parts of the country, and pharmaceutical giant Insys Therapeutics Inc., a manufacturer of fentanyl, just demonstrated much of the reason why. Arizona is currently gearing up to vote on legalizing recreational cannabis. Ahead of that vote, Insys just contributed $500,000 in the fight against Proposition 205, U.S. News and other outlets report. The Arizona-based pharmaceutical company recently gave the funds to Arizonans for Responsible Drug Policy, an anti-legalization campaign group actively fighting to defeat the ballot measure. Insys’s contributions are particularly unsettling considering the company currently markets only one product — a spray version of fentanyl, a powerful opiate. Fentanyl has become one of the country’s most dangerous prescription drugs. It is more potent than traditional addictive opiates, which already claim thousands of lives every year and drive addicts to graduate to heroin use. Fentanyl is 50 times stronger than heroin and has been linked to a growing number of deaths in the United States. It isparticularly dangerous when sold on the street and cut with other drugs. Fentanyl has been blamed for worsening the sharp rise in heroin overdoses as dealers across the country have begun adding it to heroin to make it stronger.
  • Colorado has lower rates of teen cannabis consumption than the national average, and studies have shown driving while under the influence of the plant is far less dangerous than alcohol, a legal drug. Colorado has seen a spike intourism, business, and tax revenues as a result of legalization. Interestingly, a study by Johns Hopkins university last year found states with medical marijuana had lower rates of overdose from opiates. In spite of Arizonans for Responsible Drug Policy’s claims they care about communities, it is completely comfortable taking half a million dollars from a company that produces one of the most toxic and addictive drugs on the market. Unsurprisingly, Insys previously sold a synthetic cannabis product and has already gained approval from the FDA to launch a similar one in the near future. These business ventures provide an even deeper understanding of why they oppose legalization.
  • Insys’s donation is the largest any group associated with Proposition 205 has received. Around the country, the pharmaceutical fight against legalization is joined by the tobacco lobby, the alcohol lobby, the private prison lobby, and law enforcement.
  •  
    Interesting to watch the various marijuana legalization measures in different states. The lobby money to oppose it has overwhelmingly come from organizations whose financial oxen would be gored, the pharmaceutical lobby, tobacco lobby, alcohol lobby, private prison lobby, and law enforcement lobby. On the latter, state and local law enforcement get huge federal subsidies for drug law enforcement, plus forfeiture of properties in drug cases are a huge source of revenue for law enforcement.
Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Paul Merrell

US pushing local cops to stay mum on surveillance - Yahoo News - 0 views

  • WASHINGTON (AP) -- The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods, The Associated Press has learned. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any about the purchase and use of such powerful surveillance equipment. Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • One well-known type of this surveillance equipment is known as a Stingray, an innovative way for law enforcement to track cellphones used by suspects and gather evidence. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers, such as Verizon or AT&T, and can locate a phone without the user even making a call or sending a text message. But without more details about how the technology works and under what circumstances it's used, it's unclear whether the technology might violate a person's constitutional rights or whether it's a good investment of taxpayer dollars. Interviews, court records and public-records requests show the Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. That pushback has come in the form of FBI affidavits and consultation in local criminal cases.
  • "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "If public participation means anything, people should have the facts about what the government is doing to them." Harris Corp., a key manufacturer of this equipment, built a secrecy element into its authorization agreement with the Federal Communications Commission in 2011. That authorization has an unusual requirement: that local law enforcement "coordinate with the FBI the acquisition and use of the equipment." Companies like Harris need FCC authorization in order to sell wireless equipment that could interfere with radio frequencies. A spokesman from Harris Corp. said the company will not discuss its products for the Defense Department and law enforcement agencies, although public filings showed government sales of communications systems such as the Stingray accounted for nearly one-third of its $5 billion in revenue. "As a government contractor, our solutions are regulated and their use is restricted," spokesman Jim Burke said.
  • ...4 more annotations...
  • Local police agencies have been denying access to records about this surveillance equipment under state public records laws. Agencies in San Diego, Chicago and Oakland County, Michigan, for instance, declined to tell the AP what devices they purchased, how much they cost and with whom they shared information. San Diego police released a heavily censored purchasing document. Oakland officials said police-secrecy exemptions and attorney-client privilege keep their hands tied. It was unclear whether the Obama administration interfered in the AP requests. "It's troubling to think the FBI can just trump the state's open records law," said Ginger McCall, director of the open government project at the Electronic Privacy Information Center. McCall suspects the surveillance would not pass constitutional muster. "The vast amount of information it sweeps in is totally irrelevant to the investigation," she said.
  • A court case challenging the public release of information from the Tucson Police Department includes an affidavit from an FBI special agent, Bradley Morrison, who said the disclosure would "result in the FBI's inability to protect the public from terrorism and other criminal activity because through public disclosures, this technology has been rendered essentially useless for future investigations." Morrison said revealing any information about the technology would violate a federal homeland security law about information-sharing and arms-control laws — legal arguments that that outside lawyers and transparency experts said are specious and don't comport with court cases on the U.S. Freedom of Information Act. The FBI did not answer questions about its role in states' open records proceedings.
  • But a former Justice Department official said the federal government should be making this argument in federal court, not a state level where different public records laws apply. "The federal government appears to be attempting to assert a federal interest in the information being sought, but it's going about it the wrong way," said Dan Metcalfe, the former director of the Justice Department's office of information and privacy. Currently Metcalfe is the executive director of American University's law school Collaboration on Government Secrecy project. A criminal case in Tallahassee cites the same homeland security laws in Morrison's affidavit, court records show, and prosecutors told the court they consulted with the FBI to keep portions of a transcript sealed. That transcript, released earlier this month, revealed that Stingrays "force" cellphones to register their location and identifying information with the police device and enables officers to track calls whenever the phone is on.
  • One law enforcement official familiar with the Tucson lawsuit, who spoke on condition of anonymity because the official was not authorized to speak about internal discussions, said federal lawyers told Tucson police they couldn't hand over a PowerPoint presentation made by local officers about how to operate the Stingray device. Federal officials forwarded Morrison's affidavit for use in the Tucson police department's reply to the lawsuit, rather than requesting the case be moved to federal court. In Sarasota, Florida, the U.S. Marshals Service confiscated local records on the use of the surveillance equipment, removing the documents from the reach of Florida's expansive open-records law after the ACLU asked under Florida law to see the documents. The ACLU has asked a judge to intervene. The Marshals Service said it deputized the officer as a federal agent and therefore the records weren't accessible under Florida law.
  •  
    The Florida case is particularly interesting because Florida is within the jurisdiction of the U.S. Eleventh Circuit Court of Appeals, which has just ruled that law enforcement must obtain a search warrant from a court before using equipment to determine a cell phone's location.  
Paul Merrell

Australia's criminlisation of dissent: anti-protest law is an ominous sign of the times... - 0 views

  • Australia’s criminlisation of dissent: anti-protest law is an ominous sign of the times Share This Tags AustraliaTasmania Brendan Gogarty (TC) : The Workplaces (Protection from Protesters) Bill – locally known as the “anti-protest” bill – was passed by Tasmanian parliament late on Tuesday night. The law was introduced as part of the government’s intention to “re-build Tasmania’s forestry industry”. That is a source of controversy and division in Tasmanian society. To achieve its aim, the government has committed itself to a wide legislative agenda. This includes: amending the uniform Defamation Act 2005 to allow large companies to sue protesters; defunding community and conservation organisations; and tearing up a “peace deal” between foresters and conservationists, which had been enacted into law before the 2014 election.
  • Recognising the potential return to hostilities, the government said it would “not try and appease” protesters, but would rather “toughen the law to deter them”. The anti-protest law is its chosen mechanism of deterrence. While such hard-line policies on political opposition are not new, the severity and breadth of the law to enforce such a policy arguably is. The shift from hard-line policy to hard-line law is worrisome in a constitutional democracy. The spread of state anti-bikie laws in Australia illustrates why this law is not just of concern for Tasmanians.
  • The new law covers all acts on, or acts inhibiting access to, a business premises (all public and private land, including forestry and mining lands) which are: … in furtherance of, or for the purposes of promoting awareness of or support for an opinion, or belief, in respect of a political, environmental, social, cultural or economic issue. Any such protest is subject to significant penalties if they interrupt “business activity”. While originally such sanctions were mandatory, the government agreed in the upper house to exchange these for discretionary penalties. However, the government agreed to this only on condition that the subsequent maximum penalties would be significantly increased. This was to “send a strong message” to protesters and the courts charged with punishing them. As a consequence, protesters who repeatedly interrupt business face fines of up to A$10,000 and four years in jail.
  • ...1 more annotation...
  • From its inception, the law has been criticised by domestic and international lawyers. Three United Nations human rights rapporteurs considered the bill to breach international law, one describing it as “shocking”. They considered the legislation, as originally envisioned, to be: … disproportionate and unnecessary [creating a] chilling effect of silencing dissenters … [who are] key to raising awareness about human rights, political, [and] social concerns … holding not just governments, but also corporations accountable. A wide range of legal professionals have voiced similar criticisms. While the removal of mandatory penalties alleviated some concerns, the larger concern about a law designed solely to punish people for protesting against controversial business activities – especially publicly supported and funded ones – remains.
  •  
    Australia has neither constitution nor Bill of Rights. It shows.
Paul Merrell

Federal Bureau of Investigation - Cincinnati [...] (via noodls) / Former Columbus Polic... - 0 views

  • COLUMBUS, OH-Former Columbus Police Officer Steven Edward Dean, 49, of Columbus, was sentenced in U.S. District Court to 30 months in prison for misappropriating and selling heavy equipment and other property the Columbus Division of Police received through a Department of Defense surplus program. Carter M. Stewart, U.S. Attorney for the Southern District of Ohio; Kevin Cornelius, Special Agent in Charge, Federal Bureau of Investigation (FBI); Brian Reihms, Special Agent in Charge, Defense Criminal Investigative Service (DCIS); and Columbus Police Chief Kim Jacobs announced the sentence handed down today by U.S. District Judge Michael H. Watson. According to court documents, an investigation by the Columbus Division of Police, the FBI and DCIS concluded that between October 1, 2005 and June 1, 2012, Dean diverted property with a fair market value of $251,570.94 the police department had received from the Defense Reutilization Marketing Office (DRMO) program. The embezzled items included $133,554.59 of heavy equipment, construction equipment, and vehicles; restaurant equipment; $94,163.25 of materials sold for scrap; and $16,353.15 worth of items, including diesel generators, sold to private persons. This conclusion was based on records obtained from the U.S. Department of Defense DRMO program, the state of Ohio offices involved with the DRMO program, scrapyard receipts, Craigslist online point-of-sale website records, restaurant supply records of sold equipment, and by viewing the items of property themselves.
  • Federal Bureau of Investigation - Cincinnati Field Office 08/13/2014 | Press release Former Columbus Police Officer Sentenced for Embezzling from Defense Department Surplus Program
  • "This is a major theft and embezzlement case involving a uniformed police officer stealing from his own department and involving property which should have otherwise been used to assist law enforcement, and all the equipment and vehicles were originally purchased with taxpayer dollars," Assistant U.S. Attorneys Doug Squires and Deborah Solove told the court prior to sentencing. "Today's sentencing demonstrates the Defense Criminal Investigative Service's ongoing commitment to combating fraud and corruption that impacts the Department of Defense's vital programs and operations," said Brian Reihms, Special Agent in Charge, Defense Criminal Investigative Service (DCIS), "DCIS, with our partner agencies, will continue to work tirelessly to investigate fraud involving the DoD's DRMO Law Enforcement Support Office which transfers excess property to law enforcement organizations across the United States." Dean pleaded guilty in February to one count of embezzlement from a program receiving federal funds and one count of theft of public property. Under terms of the plea agreement, Dean will forfeit $251,570.94 less the value of the recovered equipment. Dean was also sentenced to three years of supervised released following inprisonment. U.S. Attorney Stewart commended the investigation by DCIS, the FBI, and CPD, as well as Assistant U.S. Attorneys Doug Squires and Deborah Solove, who prosecuted the case.
  •  
    Thanks for keeping us safe, Officer Dean. Related: http://www.dispositionservices.dla.mil/leso/Pages/default.aspx (DoD section1033 law enforcement donation program) and http://www.law.cornell.edu/uscode/text/10/2576a ("Notwithstanding any other provision of law and subject to subsection (b), the Secretary of Defense may transfer to Federal and State agencies personal property of the Department of Defense, including small arms and ammunition, that the Secretary determines is- (A) suitable for use by the agencies in law enforcement activities, including counter-drug and counter-terrorism activities; and (B) excess to the needs of the Department of Defense.") 
Paul Merrell

NSA monitors WiFi on US planes 'in violation' of privacy laws - RT USA - 0 views

  • Companies that provide WiFi on US domestic flights are handing over their data to the NSA, adapting their technology to allow security services new powers to spy on passengers. In doing so, they may be in violation of privacy laws. In a letter leaked to Wired, Gogo, the leading provider of inflight WiFi in the US, admitted to violating the requirements of the Communications Assistance for Law Enforcement Act (CALEA). The act is part of a wiretapping law passed in 1994 that requires telecoms carriers to provide law enforcement with a backdoor in their systems to monitor telephone and broadband communications. Gogo states in the letter to the Federal Communications Commission that it added new capabilities to its service that go beyond CALEA, at the behest of law enforcement agencies.
  • “In designing its existing network, Gogo worked closely with law enforcement to incorporate functionalities and protections that would serve public safety and national security interests,” Gogo attorney Karis Hastings wrote in the leaked letter, which dates from 2012. He did not elaborate as to the nature of the changes, but said Gogo “worked with federal agencies to reach agreement regarding a set of additional capabilities to accommodate law enforcement interests.” Gogo, which provides WiFi services to the biggest US airlines, are not the only ones to adapt their services to enable spying. Panasonic Avionics also added “additional functionality” to their services as per an agreement with US law enforcement, according to a report published in December. The deals with security services have civil liberties organizations up in arms. They have condemned the WiFi providers’ deals with authorities as scandalous.
Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, C... - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
Paul Merrell

Ed Markey letters from cellphone companies: How often AT&T, T-mobile give the governmen... - 0 views

  • Cellphones are the spies in our pockets, gathering information about whom we befriend, what we say, where we go, and what we read. That’s why Sen. Edward Markey, D-Mass., recently asked the nation’s major cellphone companies to disclose how frequently they receive requests from law enforcement for customer call records—including the content of communications, numbers dialed, websites visited, and location data. Sometimes police have a warrant, sometimes they don’t. Seven companies provided information in response to the inqury. The letters Markey received, which were covered today in the Boston Globe, Washington Post, and New York Times, show that the quantity of requests for these records is staggering. T-Mobile and AT&T together received nearly 600,000 requests for customer information in 2012. AT&T has to employ more than 100 full-time workers to process them. And police demand for our call records is growing rapidly, with requests to Verizon doubling in the last five years.
  • he companies keep records of where you have traveled in the past and can track you in real time—so law enforcement can do it, too. In some ways having a police officer track you in real time electronically is even worse, because you never know when it’s happening. Historical records can be even more sensitive than real-time tracking, stretching back for months or even years, and reveal your daily routine and every deviation from it.
  • Unfortunately, according to the companies’ letters, some of them appear to be handing over the content of our digital communications without a warrant. AT&T discloses stored texts or voicemails that are older than 180 days old with a subpoena—no court supervision or probable cause required. In one bright spot, T-Mobile requires a warrant for texts and voicemails. The letters also show that in its search for evidence about a handful of guilty people, law enforcement often obtains the data of hundreds or thousands of innocent people. For example, through a technique known as “tower dumps,” law enforcement agents can see all of the cellphones using a particular tower in a given time range. There were approximately 9,000 tower dumps reported in 2012 (with not all companies reporting). What happens to that data? Could it be used for future investigations? No one really knows, because there are no clear policies in place, and the people whose data is turned over are never notified.
  •  
    Note that this is about requests from *law enforcement," not from the federal spy agencies. 
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Paul Merrell

Exclusive: U.S. directs agents to cover up program used to investigate Americans - chic... - 0 views

  • WASHINGTON (Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
  • The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred. Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential. "Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."
  • A spokesman with the Department of Justice, which oversees the DEA, declined to comment. But two senior DEA officials defended the program, and said trying to "recreate" an investigative trail is not only legal but a technique that is used almost daily.
  • ...2 more annotations...
  • A former federal agent in the northeastern United States who received such tips from SOD described the process. "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it," the agent said. "PARALLEL CONSTRUCTION" After an arrest was made, agents then pretended that their investigation began with the traffic stop, not with the SOD tip, the former agent said. The training document reviewed by Reuters refers to this process as "parallel construction." The two senior DEA officials, who spoke on behalf of the agency but only on condition of anonymity, said the process is kept secret to protect sources and investigative methods. "Parallel construction is a law enforcement technique we use every day," one official said. "It's decades old, a bedrock concept." A dozen current or former federal agents interviewed by Reuters confirmed they had used parallel construction during their careers. Most defended the practice; some said they understood why those outside law enforcement might be concerned.
  • Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE. The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said. About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.
Gary Edwards

A Victory for All of Us - Liberty in the Breach - 0 views

  •  
    Details of how a federal Judge came to rule that the insideous NDAA law is un Constitutional. excerpt: Posted on May 18, 2012 By Chris Hedges In January, attorneys Carl Mayer and Bruce Afran asked me to be the lead plaintiff in a lawsuit against President Barack Obama and Defense Secretary Leon Panetta that challenged the harsh provisions of the National Defense Authorization Act (NDAA). We filed the lawsuit, worked for hours on the affidavits, carried out the tedious depositions, prepared the case and went to trial because we did not want to be passive in the face of another egregious assault on basic civil liberties, because resistance is a moral imperative, and because, at the very least, we hoped we could draw attention to the injustice of the law. None of us thought we would win. But every once in a while the gods smile on the damned. U.S. District Judge Katherine Forrest, in a 68-page opinion, ruled Wednesday that Section 1021 of the NDAA was unconstitutional. It was a stunning and monumental victory. With her ruling she returned us to a country where-as it was before Obama signed this act into law Dec. 31-the government cannot strip a U.S. citizen of due process or use the military to arrest him or her and then hold him or her in military prison indefinitely. She categorically rejected the government's claims that the plaintiffs did not have the standing to bring the case to trial because none of us had been indefinitely detained, that lack of imminent enforcement against us meant there was no need for an injunction and that the NDAA simply codified what had previously been set down in the 2001 Authorization to Use Military Force Act. The ruling was a huge victory for the protection of free speech. Judge Forrest struck down language in the law that she said gave the government the ability to incarcerate people based on what they said or wrote. Maybe the ruling won't last. Maybe it will be overturned. But we and other Americans are
1 - 20 of 359 Next › Last »
Showing 20 items per page