Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged non-prosecution

Rss Feed Group items tagged

Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit ... - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Paul Merrell

Pentagon: 9/11 defense team linguist was CIA asset | The Miami Herald The Miami Herald - 0 views

  • The military confirmed Tuesday that a linguist tasked to serve on the death-penalty defense of an alleged Sept. 11 plotter had previously worked for the CIA but would not say whether he worked at a black site.The revelation Monday by alleged plot deputy Ramzi bin al Shibh, 42, brought this week’s resumption of the Sept. 11 hearings, the first in six months, to a screeching halt. All but one of the five alleged 9/11 conspirators said they independently recognized the stony-faced translator seated beside bin al Shibh at the war court from their years in the spy agency’s secret overseas prisons.The five men, led by alleged mastermind Khalid Sheik Mohammed, 49, are accused of orchestrating, financing and training the men who hijacked four aircraft and killed nearly 3,000 people at the World Trade Center, Pentagon and a Pennsylvania field on Sept. 11, 2001.
  • Defense attorneys accuse the CIA of torturing their clients and then seeking to hide the evidence from their death-penalty trials. They also allege U.S. government and military interference is designed to disrupt their work with the accused.The five defendants return to court Wednesday to figure a way forward after the revelation, the latest snag in pretrial hearings for the case that has no trial date. The judge, Army Col. James L. Pohl, gave lawyers Tuesday to conduct research, and trade classified court filings — starting with one by the prosecution Monday night that apparently described the controversial contract linguist’s intelligence background.Tuesday afternoon, a Pentagon spokesman, Army Lt. Col. Myles B. Caggins, said the linguist “has in the past made readily available to prospective supervisors his prior work experience with the United States government, including with the CIA.”
  • Caggins would not say whether the linguist worked at a CIA “black site,” an overseas prison where agents secretly interrogated prisoners and subjected them to brutal techniques — waterboarding, nudity, sleep deprivation, painful shackling and a quasi-medical procedure called rectal rehydration. He did, however, distance the case prosecutor, Brig. Gen. Mark Martins, from the disruption, saying his office “does not have any role in providing linguists to defense teams in military commissions.” He said defense lawyers get to vet their own linguists.“We vetted him. He denied it,” Bin al Shibh’s attorney, Jim Harrington, said Tuesday evening. Harrington said his team pointedly asked the linguist whether he had “participated in any interrogation, questioning or done any work with respect to detainees. Any place. His résumé denies it. It says he worked someplace else — Reston, Va., from 2002 to 2006.”Bin al Shibh was held in a series of secret overseas prison from his capture in Pakistan on Sept. 11, 2002until his arrival at Guantánamo four years later. Even then, according to the so-called Senate Torture Report, he remained in CIA custody.Defense lawyers want more information.
  • ...1 more annotation...
  • “We will be filing motions for discovery regarding the former CIA interpreter utilized by Mr. Bin al Shibh’s defense team,” said attorney Cheryl Bormann, defending the alleged terror trainer Walid bin Attash, 36, who she said was shaken at seeing someone from a black site.Bormann also said she would be seeking a court order from Judge Pohl similar to the one Pohl styled after disclosure that FBI agents were investigating and questioning members of the 9/11 defense team: Instructing the defense team members to disclose if they worked for the CIA or a CIA contractor, absolving them of any Non Disclosure Order they signed with the CIA.“If people aren’t truthful about their background,” Bormann said, “there’s really no way for us to determine whether or not they are inappropriately assigned to our team.”
  •  
    So, it sounds like the CIA was trying to sneak an agent who understands Arabic into the GITMO defendants' defense team. This, after the FBI was caught interrogating a defense team member. Time to dismiss the charges and free the defendants, I think. These men can't get a fair trial. 
Paul Merrell

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
Paul Merrell

Hersh Vindicated? Turkish Whistleblowers Corroborate Story on False Flag Sarin Attack i... - 0 views

  • This is quite the bombshell delivered by two CHP deputies in the Turkish parliament and reported by Today’s Zaman, one of the top dailies in Turkey. It supports Seymour Hersh’s reporting that the notorious sarin gas attack at Ghouta was a false flag orchestrated by Turkish intelligence in order to cross President Obama’s chemical weapons “red line” and draw the United States into the Syria war to topple Assad. If so, President Obama deserves credit for “holding the line” against the attack despite the grumbling and incitement of the Syria hawks at home and abroad. And it also presents the unsavory picture of an al-Qaeda operatives colluding with ISIL in a war crime that killed 1300 civilians.
  • I find the report credible, taking into full account the fact that the CHP (Erdogan’s center-left Kemalist rivals) and Today’s Zaman (whose editor-in-chief, Bulent Kenes was recently detained on live TV for insulting Erdogan in a tweet) are on the outs with Erdogan. Considering the furious reaction it can be expected to elicit from Erdogan and the Turkish government, the temerity of CHP and Today’s Zaman in running with this story is a sign of how desperate their struggle against Erdogan has become.  Note that the author is shown only as “Columnist: Today’s Zaman”. I expect the anti-Erodgan forces hope this will be a game changer in terms of U.S.and European support for Erdogan. It will be very interesting to see if and how the media in the U.S. covers this story.  In case it doesn’t acquire enough “legs” to make into US media, I attach the full Zaman piece below:
  • CHP deputies: Gov’t rejects probe into Turkey’s role in Syrian chemical attack Two deputies from the main opposition Republican People’s Party (CHP) have claimed that the government is against investigating Turkey’s role in sending toxic sarin gas which was used in an attack on civilians in Syria in 2013 and in which over 1,300 Syrians were killed. CHP deputies Eren Erdem and Ali Şeker held a press conference in İstanbul on Wednesday in which they claimed the investigation into allegations regarding Turkey’s involvement in the procurement of sarin gas which was used in the chemical attack on a civil population and delivered to the terrorist Islamic State in Iraq and the Levant (ISIL) to enable the attack was derailed. Taking the floor first, Erdem stated that the Adana Chief Prosecutor’s Office launched an investigation into allegations that sarin was sent to Syria from Turkey via several businessmen. An indictment followed regarding the accusations targeting the government.
  • ...4 more annotations...
  • “The MKE [Turkish Mechanical and Chemical Industry Corporation] is also an actor that is mentioned in the investigation file. Here is the indictment. All the details about how sarin was procured in Turkey and delivered to the terrorists, along with audio recordings, are inside the file,” Erdem said while waving the file. Erdem also noted that the prosecutor’s office conducted detailed technical surveillance and found that an al-Qaeda militant, Hayyam Kasap, acquired sarin, adding: “Wiretapped phone conversations reveal the process of procuring the gas at specific addresses as well as the process of procuring the rockets that would fire the capsules containing the toxic gas. However, despite such solid evidence there has been no arrest in the case. Thirteen individuals were arrested during the first stage of the investigation but were later released, refuting government claims that it is fighting terrorism,” Erdem noted. Over 1,300 people were killed in the sarin gas attack in Ghouta and several other neighborhoods near the Syrian capital of Damascus, with the West quickly blaming the regime of Bashar al-Assad and Russia claiming it was a “false flag” operation aimed at making US military intervention in Syria possible.
  • Suburbs near Damascus were struck by rockets containing the toxic sarin gas in August 2013. The purpose of the attack was allegedly to provoke a US military operation in Syria which would topple the Assad regime in line with the political agenda of then-Prime Minister Recep Tayyip Erdoğan and his government. CHP deputy Şeker spoke after Erdem, pointing out that the government misled the public on the issue by asserting that sarin was provided by Russia. The purpose was to create the perception that, according to Şeker, “Assad killed his people with sarin and that requires a US military intervention in Syria.”
  • He also underlined that all of the files and evidence from the investigation show a war crime was committed within the borders of the Turkish Republic. “The investigation clearly indicates that those people who smuggled the chemicals required to procure sarin faced no difficulties, proving that Turkish intelligence was aware of their activities. While these people had to be in prison for their illegal acts, not a single person is in jail. Former prime ministers and the interior minister should be held accountable for their negligence in the incident,” Şeker further commented. Erdem also added that he will launch a criminal complaint against those responsible, including those who issued a verdict of non-prosecution in the case, those who did not prevent the transfer of chemicals and those who first ordered the arrest of the suspects who were later released.
  • UN Secretary-General Ban Ki-moon announced in late August that an inquiry had been launched into the gas attacks allegedly perpetuated by both Assad’s Syrian regime and rebel groups fighting in Syria since the civil war erupted in 2011. However, Erdem is not the only figure who has accused Turkey of possible involvement in the gas attack. Pulitzer Prize winner and journalist, Seymour M. Hersh, argued in an article published in 2014 that MİT was involved with extremist Syrian groups fighting against the Assad regime. In his article, Hersh said Assad was not behind the attack, as claimed by the US and Europe, but that Turkish-Syrian opposition collaboration was trying to provoke a US intervention in Syria in order to bring down the Assad regime.
Paul Merrell

South Korean prosecutors seek arrest of impeached president Park Geun-hye - nsnbc inter... - 0 views

  • South Korean prosecutors on Monday sought to arrest impeached president Park Geun-hye over a corruption scandal embroiling Park and her longtime confidante Choi Soon-sil. 
  • The Special Investigation Headquarters of the Seoul Central District Prosecutors’ Office, tasked with the probe into the scandal, stated that concerns remained about an attempt to destroy evidence as Park denied most criminal charges despite substantial evidence against her. Park was removed from office on March 10 when the Constitutional Court upheld a motion to impeach her. The first female South Korean leader became the first South Korean president ousted by impeachment. State prosecutors, who took over the investigation from special prosecutors this month, summoned the Park last week for questioning. However, Park denied the criminal charges that were brought against her. Park recognized and apologized for misjudgments. The arrest warrant was formally delivered to a Seoul court, which would review the evidence and decide whether the warrant can be issued. The decision would be made late Wednesday or early Thursday. If issued, Park would become the third South Korean ex-leader to be taken into custody. Two former military leaders were put behind bars in 1995 for charges of treason and corruption.
  • State and special prosecutors levied a total of 13 charges against Park, including bribery, abuse of power and the leakage of state secrets. The statement said Park abused power by using her “powerful status and authority as president” to extort money and valuables from businesses and infringe on the liberty of corporate management, while leaking official secrets. Park is also accused of colluding with her decades-long friend Choi Soon-sil, who is now in custody, to solicit tens of millions of U.S. dollars in bribes from Samsung Electronics Vice Chairman Lee Jae-yong who is also arrested. The bribes were allegedly offered in return for getting assistance in the transfer of management control of Samsung Group to Vice Chairman Lee from his ailing father Chairman Lee Kun-hee. The younger Lee, an heir apparent of the country’s biggest family-controlled conglomerate, has effectively taken the helm of Samsung since his father was hospitalized after a heart attack three years ago. Choi is charged with extorting tens of millions of dollars from scores of conglomerates to establish two non-profit foundations she used for personal gains. Prosecutors already branded Park and Choi as criminal accomplices.
« First ‹ Previous 41 - 45 of 45
Showing 20 items per page