Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged public-opinion

Rss Feed Group items tagged

Gary Edwards

Impeach Judge James Robart for violating sovereignty and Constitution - 0 views

  •  
    "It's still hard to believe we now live in a country where a district judge can demand that we bring in refugees from state sponsors of terror and failed states saturated with terrorists and no data systems during a time of war. It's almost unfathomable that a district judge, an institution created by Congress, can overturn long-standing refugee law and bar the federal government from prioritizing persecuted religious minorities for refugee resettlement. All in contravention to statute, numerous clauses of the Constitution, the social contract, the social compact, popular sovereignty, jurisdictional sovereignty, and 200 years of case law. If Obergefell redefined the building block of all civilization, Judge James Robart's ruling redefined the building block of a sovereign nation. It's hard to comprehend a judicial opinion more divorced from our Constitution, sovereignty, fundamental laws, founding values, history, and tradition. It's also hard to imagine an opinion that is of greater consequence - unless it is ignored. In the long run, Congress must strip the federal judiciary of their power grab and restore Congress' plenary power over immigration, as it was since our founding. However, in the meantime, it's time to make impeachment great again. Impeachment was a critical check on abuse of power   Before the growth of political parties killed the separation of powers, the tool of impeachment was regarded by our founders as one of the most effective ways of checking the executive and judicial branches of government. By my count, impeachment is referenced 58 times in the Federalist Papers and countless times during the Constitutional Convention. Impeachment [U.S.CONST. art. II, §4] was not only reserved for those who engage in criminal behavior. It was clearly designed to check abuse of power. As the Congressional Research Service observes, Congress has identified "improperly exceeding or abusing the powers of the office" as a criterion for
Paul Merrell

Secret Law Isn't the Public's Fault | Just Security - 0 views

  • Officials in this administration have a funny way of blaming the victim. Did the CIA spy on Senate intelligence committee staffers who were investigating the agency’s torture program? No. OK, yes, you caught us — but the staffers were poking their nose into the CIA’s business. Are communities in some cities suffering from an uptick in crime rates? That must be because they were critical of police practices, and so the police are afraid to do their job. Are American Muslims disproportionately singled out for law enforcement scrutiny? It wouldn’t be necessary if they did a better job of identifying and rooting out the terrorists in their midst. Did a drone strike kill a 16-year-old boy who wasn’t on any target list but happened to be the son of alleged al-Qaeda operative Anwar al-Aulaqi? I guess he “should have had a more responsible father,” as then-White House press secretary Robert Gibbs helpfully explained. At the annual conference of the American Bar Association’s Standing Committee on National Security Law, officials were at it again. Both the CIA’s General Counsel, Caroline Krass, and the acting head of the Justice Department’s Office of Legal Counsel (OLC), Karl Thompson, observed that agencies are issuing fewer requests for formal OLC opinions and are seeking “informal,” unwritten advice from OLC instead. This trend undermines the public’s ability to obtain OLC opinions through FOIA requests. And, according to Krass, we have no one to blame but ourselves:
  • I do think one reason is a focus the office has gotten [in] the past 10 years or so in the public which has now led to Freedom of Information Act requests pretty much anytime the administration adopts a position in the context of domestic law or national security that could be [or] seems a little bit edgy or slightly controversial, immediately the request for the OLC opinion comes. What were we thinking? Well, we might have had in mind OLC officials’ own acknowledgment that their opinions constitute the working law of the executive branch, and are binding on agencies in the same manner that a court’s decision would be. When the public expresses interest in a controversial court opinion, that isn’t cited as a reason to move the judicial system into the shadows. To the contrary, it’s well-understood that the public has a right to know how judges are interpreting the law. That’s true regardless of whether the law deals with the rights and obligations of private parties or (as is usually the case with OLC opinions) the authorities of the government.  It’s high time we stop pretending that OLC opinions are merely attorneys’ advice, and thereby entitled to confidentiality. A private person is free to accept or reject her attorney’s advice. By contrast, as Thompson recognized, OLC opinions — even informal, unwritten ones — are “binding by custom and practice . … People are supposed to and do follow [them].” Moreover, in ordinary circumstances, it is no defense to criminal charges that the defendant’s lawyer gave bad advice. OLC opinions, on the other hand, confer effective immunity, as the Justice Department will not prosecute any official who acted in reliance on OLC’s conclusions.
  • The government nonetheless argues, and many courts have agreed, that OLC opinions are exempt from disclosure under FOIA because they are “deliberative” and “pre-decisional.” This assessment conflates two distinct decisions: the decision of an agency whether to adopt a course of conduct, and OLC’s decision regarding how to interpret the law. The latter decision may be one factor — along with other, non-legal factors, such as political viability, financial cost, and the existence of competing priorities — in the agency’s “deliberations” on the former. The agency ultimately must decide whether to move forward with a policy. But on the question of how the law should be interpreted, it is OLC, not the agency, which has the final word. If the agency were to issue a different legal interpretation, there is no question that OLC’s would take precedence, and the agency would be courting legal jeopardy by adopting a course of action in tension with OLC’s reading of the law. Perhaps the solution is simply to require the government to abide by its own characterization. If OLC opinions are to be given the status of deliberative documents and/or legal advice, so be it; but in that case, they cannot be binding on any agency or official, nor can they mitigate any official’s criminal or civil liability (unless they genuinely negate a required state of mind). If, on the other hand, the government wishes to treat OLC opinions as authoritative and a shield against prosecution or civil suit, then they must be called what they are — law — and made available to the public. Until that happens, the public will remain a victim of secret law, and there will be no one but the administration to blame.
Paul Merrell

Losing public opinion on BDS, activists turn to 'lawfare' - 0 views

  •      Champions of proposed Senate Bill SB1761, which passed both houses of the Illinois General Assembly May 18th, say it’s designed to fight anti-Semitic activism and protects Israel from the existential threat posed by the Boycott, Divestment, & Sanctions movement (BDS). Opponents of the bill say it places the economic welfare of Israel before U.S. interests, tacitly endorses the full annexation of the West Bank into Israel, and violates our country’s First Amendment rights. The bill’s opponents are right. But a potential threat of this legislation, edging closer to the criminalization of advocating for Palestinian rights and against occupation, threatens our core First Amendment rights and has been relatively absent from the discourse surrounding this bill.
  • And that’s not just here in the United States. Israeli lawmakers sought to criminalize public support of boycotts against Israel back in 2010 through their “Law for Prevention of Damage to the State of Israel through Boycott.” When I spoke with a staffer for Illinois State Rep. Sara Feigenholtz, one of the bill’s primary sponsors, inquiring if SB1761 was modeled after the 1977 amendments to the Export Administration Act (regarding the Arab League boycott of Israel), I was informed “These ‘antiboycott’ laws are the 1977 amendments to the Export Administration Act (EAA) and the Ribicoff Amendment to the 1976 Tax Reform Act (TRA). I hope this helps.…SB1761 falls in line with these federal laws”
  • Referencing EAA is another indication of the move toward weakening our First Amendment rights, as that amendment was meant to criminalize people who adhered to the Arab League’s boycott of Israel. Melissa Redmiles writes of the 70’s legislation in International Boycott Reports, 2003 and 2004 (pdf), from the IRS.gov website: “Those U.S persons who agree to participate in such boycotts are subject to criminal and civil penalties.” SB1761 seems to be the latest manifestation of a trend toward enacting a kind of trickle-down suppression. From the Center For Constitutional Rights website for Palestine Solidarity Legal Support: “These bills must be opposed in order to protect the right to engage in boycotts that reflect collective action to address a human rights issue, which the US Supreme Court has declared is protected speech… These bills would make it state policy to discourage support of human rights boycotts against Israel… and have the potential to stifle expressions of political beliefs…”
  • ...3 more annotations...
  • SB1761 requires all five public retirement benefits systems of the Illinois Pension Code to divest “all direct holdings” from any company which engages in boycotting Israel. This is designed to financially punish companies which participate in BDS; presumably European companies. But it will also burden an already severely crippled,“worst in nation”, Illinois pension system. Illinois Governor Bruce Rauner was quoted by Jewish United Fund News (JUF) earlier this month as saying, “I made a pledge that Illinois would become the first state in America to divest its public pension funds from any company in the world that boycotts Israel.” Rauner includes U.S. companies in his threat of divestment when he says “any company in the world.”
  • Relatedly from SB1761 itself: “It is not the intent [of this bill]… to cause divestiture from any company based in the United States of America.” Not intended? This soft language clearly leaves the door open to require Illinois public retirement systems’ divestiture from U.S. companies that participate in BDS. So, while politicians endorsing this bill can point to this statement of “intent” as some kind of safeguard for American companies, this same sentence simultaneously functions as a veiled threat to those companies.
  • SB1761 characterizes the motivations of the BDS movement as “intending to penalize… Israel.” Similarly, JUF News this month quoted JUF President Steven B. Nasatir saying, “At the core of the BDS movement is a quest to delegitimize Israel as a Jewish state.” That’s like stating that the intent of the Civil Rights Montgomery bus boycott was to “penalize white people.
  •  
    As though ACLU didn't already have enough lawsuits going. But this takes the cake. Although anti-BDS legislation has been introduced several times in Congress but never got off the ground because of the First Amendment barrier. Similar measures pending in Europe too.  The good news here is that Israel's right-wing government is getting desperate. The BDS movement is mushrooming globally and routinely is achieving success in convincing companies (and recording artists, etc.) to pull out of Israel. More so in Europe, but BDS is off to a great start in the U.S. Kerry warned Netanyahu before the latter blew up the last round of negotations with the Palestinians that BDS would soon make it politically impossible for the U.S. to continue providing cover for Israel on the U.N. Security Council. There's a big shift of public opinion in the U.S. about Israel's abuse of Palestinians well under way. It won't be long before introducing Israel Lobby measures in Congress will stop happening. 
Paul Merrell

Still Secret: Second Circuit Keeps More Drone Memos From the Public | Just Security - 0 views

  • Secret law has been anathema to our democracy since its Founding, but a federal appeals court just gave us more of it.
  • We might forgive the citizenry’s confusion, though, in attempting to square those principles with the decision by the Second Circuit Court of Appeals, published yesterday, holding that the government may continue to keep secret nine legal memoranda by the Justice Department’s Office of Legal Counsel analyzing the legality of targeted killings carried out by the US government. It was just more than a year ago that the same panel of the same court ordered the government to disclose key portions of a July 2010 OLC memorandum that authorized the targeted killing of an American citizen in Yemen. At the time, the court’s opinion seemed to promise at least a partial solution to a problem straight (as the district court in the same case put it) from Alice in Wonderland: that [a] thicket of laws and precedents … effectively allow the Executive Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws, while keeping the reasons for its conclusion a secret.
  • Yesterday’s opinion retreats from that promise by keeping much of the government’s law of the targeted killing program secret. (In this and two other cases, the ACLU continues to seek more than 100 other legal memoranda authored by various agencies concerning targeted killing.) It does so in two ways that warrant attention. First, the court suggests that OLC merely gives advice to executive branch agencies, and that OLC’s legal memoranda do not establish the “working law” of the government because agencies might not “adopt” the memoranda’s legal analysis as their own. This argument is legally flawed and, moreover, it flies in the face of the public evidence concerning how the executive branch treats opinions issued by OLC. In an OLC memorandum published, ironically or not, the same day (July 16, 2010) and over the same signature (David Barron’s) as the targeted killing memorandum released at the Second Circuit’s behest last year, the OLC explains that its “central function” is to provide “controlling legal advice to Executive Branch officials.” And not even two weeks ago, the acting head of the OLC told the public that even informally drafted legal advice emanating from his office is “binding by custom and practice in the executive branch,” that “[i]t’s the official view of the office, and that “[p]eople are supposed to and do follow it.”
  • ...2 more annotations...
  • But that’s not what the government told the Second Circuit, and it’s not what the Second Circuit has now suggested is the law. Second, the Second Circuit’s new opinion endorses the continued official secrecy over any discussion of a document that has supplied a purported legal basis for the targeted killing program since almost immediately after the September 11 attacks. The document — a September 17, 2001 “Memorandum of Notification” — is not much of a secret. The government publicly identified it in litigation with the ACLU eight years ago; the Senate Intelligence Committee cited it numerous times in its recent torture report; and the press frequently makes reference to it. Not only that, but the Central Intelligence Agency’s former top lawyer, John Rizzo, freely discussed it in his recent memoir. According to Rizzo, the September 17 MON is “the most comprehensive, most ambitious, most aggressive, and most risky” legal authorization of the last decade and a half — which is saying something. Rizzo explains that the MON authorizes targeted killings of suspected terrorists by the CIA, and in his new book, Power Wars, Charlie Savage reports that the MON is the original source of the controversial (and legally novel) “continuing and imminent threat” standard the government uses to govern the lethal targeting of individuals outside of recognized battlefields. The MON is also likely to have authorized an end run around the assassination “ban” in Executive Order 12333 — a legal maneuver that is discussed in, but almost entirely redacted from, an earlier OLC analysis of targeted killing.
  • In yesterday’s opinion, the Second Circuit upheld the government’s withholding of a 2002 OLC memorandum that “concerns Executive Order 12333,” which almost certainly analyzes the effect of the September 17 MON, as well as of five other memoranda that “discuss another document that remains entitled to protection.” If indeed that “document” is the MON, it would seem to be yet another case of what the DC Circuit pointedly criticized, in a 2013 opinion, as the granting of judicial “imprimatur to a fiction of deniability that no reasonable person would regard as plausible.” In that case, the DC Circuit went on to quote Justice Frankfurter: “‘There comes a point where … Court[s] should not be ignorant as judges of what [they] know as men’ and women.” Last year, the Second Circuit took that admonishment to heart when it published the July 2010 OLC memorandum. Unfortunately, yesterday, rather than once again opening the country’s eyes to the law our government is applying behind closed doors, the Second Circuit closed its own.
Paul Merrell

ACLU Demands Secret Court Hand Over Crucial Rulings On Surveillance Law - 0 views

  • The American Civil Liberties Union (ACLU) has filed a motion to reveal the secret court opinions with “novel or significant interpretations” of surveillance law, in a renewed push for government transparency. The motion, filed Wednesday by the ACLU and Yale Law School’s Media Freedom and Information Access Clinic, asks the Foreign Intelligence Surveillance Act (FISA) Court, which rules on intelligence gathering activities in secret, to release 23 classified decisions it made between 9/11 and the passage of the USA Freedom Act in June 2015. As ACLU National Security Project staff attorney Patrick Toomey explains, the opinions are part of a “much larger collection of hidden rulings on all sorts of government surveillance activities that affect the privacy rights of Americans.” Among them is the court order that the government used to direct Yahoo to secretly scanits users’ emails for “a specific set of characters.” Toomey writes: These court rulings are essential for the public to understand how federal laws are being construed and implemented. They also show how constitutional protections for personal privacy and expressive activities are being enforced by the courts. In other words, access to these opinions is necessary for the public to properly oversee their government.
  • Although the USA Freedom Act requires the release of novel FISA court opinions on surveillance law, the government maintains that the rule does not apply retroactively—thereby protecting the panel from publishing many of its post-9/11 opinions, which helped create an “unprecedented buildup” of secret surveillance laws. Even after National Security Agency (NSA) whistleblower Edward Snowden revealed the scope of mass surveillance in 2013, sparking widespread outcry, dozens of rulings on spying operations remain hidden from the public eye, which stymies efforts to keep the government accountable, civil liberties advocates say. “These rulings are necessary to inform the public about the scope of the government’s surveillance powers today,” the ACLU’s motion states.
  • Toomey writes that the rulings helped influence a number of novel spying activities, including: The government’s use of malware, which it calls “Network Investigative Techniques” The government’s efforts to compel technology companies to weaken or circumvent their own encryption protocols The government’s efforts to compel technology companies to disclose their source code so that it can identify vulnerabilities The government’s use of “cybersignatures” to search through internet communications for evidence of computer intrusions The government’s use of stingray cell-phone tracking devices under the Foreign Intelligence Surveillance Act (FISA) The government’s warrantless surveillance of Americans under FISA Section 702—a controversial authority scheduled to expire in December 2017 The bulk collection of financial records by the CIA and FBI under Section 215 of the Patriot Act Without these rulings being made public, “it simply isn’t possible to understand the government’s claimed authority to conduct surveillance,” Toomey writes. As he told The Intercept on Wednesday, “The people of this country can’t hold the government accountable for its surveillance activities unless they know what our laws allow. These secret court opinions define the limits of the government’s spying powers. Their disclosure is essential for meaningful public oversight in our democracy.”
Paul Merrell

Court Rebukes White House Over "Secret Law" - Secrecy News - 1 views

  • DC District Judge Ellen Segal Huvelle yesterday ordered the Obama Administration to release a copy of an unclassified presidential directive, and she said the attempt to withhold it represented an improper exercise of “secret law.” The Obama White House has a “limitless” view of its authority to withhold presidential communications from the public, she wrote, but that view is wrong. “The government appears to adopt the cavalier attitude that the President should be permitted to convey orders throughout the Executive Branch without public oversight– to engage in what is in effect governance by ‘secret law’,” Judge Huvelle wrote in her December 17 opinion. “The Court finds equally troubling the government’s complementary suggestion that ‘effective’ governance requires that a President’s substantive and non-classified directives to Executive Branch agencies remain concealed from public scrutiny,” she wrote.
  • The directive in question, Presidential Policy Directive (PPD) 6, “is a widely-publicized, non-classified Presidential Policy Directive on issues of foreign aid and development that has been distributed broadly within the Executive Branch and used by recipient agencies to guide decision-making,” the Judge noted. “Even though issued as a directive, the PPD-6 carries the force of law as policy guidance to be implemented by recipient agencies, and it is the functional equivalent of an Executive Order.” “Never before has a court had to consider whether the [presidential communications] privilege protects from disclosure under FOIA a final, non-classified, presidential directive.”
  • Several significant points emerge from this episode. First, President Obama’s declared commitment to “creating an unprecedented level of openness in Government” has not been internalized even by the President’s own staff. This latest case of “unbounded” secrecy cannot be blamed on the CIA or an overzealous Justice Department attorney. It is entirely an Obama White House production, based on a White House policy choice. Second, and relatedly, it has proved to be an error to expect the executive branch to unilaterally impose transparency on itself. To do so is to ignore, or to wish away, the Administration’s own conflicting interests in secrecy and disclosure.  Instead, it is the role of the other branches of government to check the executive and to compel appropriate disclosure.
  • ...3 more annotations...
  • Significantly, Judge Huvelle insisted on examining the document herself in camera instead of simply relying on the Administration’s characterization of the document.  Having done so, she found that it “is not ‘revelatory of the President’s deliberations’ such that its public disclosure would undermine future decision-making.” She criticized the government for “the unbounded nature” of its claim. “In the government’s view, it can shield from disclosure under FOIA any presidential communication, even those — like the PPD-6 — that carry the force of law, simply because the communication originated with the President…. The Court rejects the government’s limitless approach….”
  • An official Fact Sheet on PPD-6 (which has not yet been released) is available here. The Electronic Privacy Information Center is currently pursuing release of another presidential directive, the Bush Administration’s NSPD-54 on cyber security. In October, Judge Beryl Howell unexpectedly ruled that that directive was exempt from disclosure because, she said, it was not an “agency record” that would be subject to the FOIA.  Her opinion came as a surprise and was not persuasive to everyone. In a footnote in yesterday’s ruling, Judge Huvelle said that the arguments over the two directives were sufficiently distinguishable that “this Court need not decide if it will follow Judge Howell’s rationale”– suggesting that if pressed, she might not have done so.  Yesterday, EPIC filed a notice of its intent to appeal the decision.
  • DC District Judge Ellen Segal Huvelle yesterday ordered the Obama Administration to release a copy of an unclassified presidential directive, and she said the attempt to withhold it represented an improper exercise of “secret law.” The Obama White House has a “limitless” view of its authority to withhold presidential communications from the public, she wrote, but that view is wrong. “The government appears to adopt the cavalier attitude that the President should be permitted to convey orders throughout the Executive Branch without public oversight– to engage in what is in effect governance by ‘secret law’,” Judge Huvelle wrote in her December 17 opinion. “The Court finds equally troubling the government’s complementary suggestion that ‘effective’ governance requires that a President’s substantive and non-classified directives to Executive Branch agencies remain concealed from public scrutiny,” she wrote.
  •  
    Outrageous. I read the court's opinion. This happened only because: [i] federal judges are reluctant to impose sanctions on government attorneys; and [ii] government attorneys know that. In all my years of legal practice, I read only one court opinion where an assistant U.S. attorney was sanctioned and instead of the normal sanction of paying the other side's attorney fees and expenses of litigation, the judge just awarded a $500 sanction. That is also why litigating against the Feds is such a chore; you spend half your time shooting down blatantly implausible arguments. That's far less of a problem when facing attorneys who are in private practice. But so much for Obama's "transparency" platform; this was the result of the Obama Administration itself asserting a preposterous privilege claim supported only by ridiculous arguments, no more than a delaying action.  
Paul Merrell

Obama's NSA Speech Has Little Impact on Skeptical Public | Pew Research Center for the ... - 0 views

  • President Obama’s speech on Friday outlining changes to the National Security Agency’s collection of telephone and internet data did not register widely with the public. Half say they have heard nothing at all about his  proposed changes to the NSA, and another 41% say they heard only a little bit. Even among those heard about Obama’s speech, few think the changes will improve privacy protections, or make it more difficult for the government to fight terrorism.
  • The new national survey by the Pew Research Center and USA TODAY, conducted Jan. 15-19 among 1,504 adults, finds that overall approval of the program has declined since last summer, when the story first broke based on Edward Snowden’s leaked information. Today, 40% approve of the government’s collection of telephone and internet data as part of anti-terrorism efforts, while 53% disapprove. In July, more Americans approved (50%) than disapproved (44%) of the program. In addition, nearly half (48%) say there are not adequate limits on what telephone and internet data the government can collect; fewer (41%) say there are adequate limits on the government’s data collection. About four-in-ten Republicans (39%) and independents (38%) – and about half of Democrats (48%) – think there are adequate limits on the information that the government can collect.
  • Reflecting the limited impact of Obama’s address, overall approval of the program and opinions about whether adequate safeguards are in place were no different in three nights of interviewing conducted after the speech (Jan. 17-19) than during the two nights of interviewing conducted prior to the address (Jan. 15-16). Overall, the public is divided about whether Edward Snowden’s leak of classified information, which brought the program to light, has served or harmed the public interest: 45% say it has served the public interest while 43% say it harmed it. Nonetheless, a 56% majority wants to see the government pursue a criminal case against Snowden, while 32% oppose this. This is little changed from June, shortly after Snowden’s first leaks of information about the program.
  • ...6 more annotations...
  • The public is split on whether Edward Snowden’s leaks served the public interest, with 45% saying they did and 43% saying the leaks harmed public interest. But by 56% to 32%, most think that the government should pursue a criminal case against Snowden. These opinions are largely unchanged from last June, when Snowden first disclosed classified information to news organizations. There is a large age gap when it comes to views of the NSA revelations and the public interest. More adults ages 50 and older believe that the leaks harmed the public interest (49%) than served the public interest (37%). Among adults 18-29, sentiment is reversed, with 57% saying Snowden served the public interest and 35% saying he harmed it. There are no significant differences on this issue by party, as both Republicans and Democrats are divided.
  • Democrats remain more supportive of the NSA surveillance program than Republicans, though support is down across party lines. Today, Democrats are divided (46% approve, 48% disapprove) in their view of the program. Last June, they approved by a 20-point margin (58% vs. 38%). Republicans now disapprove of the program by a 56% to 37% margin. Approval is down eight points among Republicans from 45% last June. There continues to be a substantial divide within the Republican base: Republicans and Republican leaners who agree with the Tea Party are overwhelmingly opposed to the NSA program, while those who do not identify with the Tea Party are more divided. The decline in approval of the NSA surveillance program spans most demographic groups, though the drop in support is particularly evident among minority groups. Last June, 60% of both blacks and Hispanics approved of the government’s surveillance program. That has fallen to 43% among blacks and 40% among Hispanics today. Among whites, 39% approve of the program today, little changed from 44% in June.
  • Obama’s proposed changes to the NSA’s data collection program did not register widely with the public. Just 49% say they heard about the proposed changes, with little difference across partisan groups. Among those that did hear about the proposals, large majorities of Republicans (86%) and independents (78%) say these changes will not make much difference when it comes to protecting people’s privacy. Among Democrats who have heard of the changes, 56% say they won’t make much difference. There is little concern that the changes to the NSA’s surveillance activities will hurt the government’s ability to fight terrorism. Overall, 79% of those who have heard about the proposals say they won’t make much difference in the government’s ability to fight terrorism; this view is shared by 85% of independents, 77% of Democrats and 75% of Republicans.
  • Those who attended college are more likely than those who didn’t to see the leaks as serving the public interest. About half of college graduates (49%) and those with some college experience (51%) say this, compared with 38% of those with no more than a high school degree.
  • While most of the public wants the government to pursue a criminal case against Snowden, young people offer the least support for his prosecution. Those younger than 30 are divided, with 42% wanting a criminal case against Snowden and 42% saying the government should not pursue one. Support for prosecution is much higher among those 50 and older, who think the government should pursue a case by more than two-to-one. Both Democrats (62%-27%) and Republicans (54%-28%) think the government should pursue a criminal case. About half of independents (51%) want a criminal case against Snowden, while four-in-ten (39%) say the government should not pursue one. Fully 70% of those who approve of the government’s surveillance program favor Snowden’s prosecution. Those who disapprove of the program are divided: 45% say the government should pursue a criminal case against Snowden while 43% are opposed.
  • Barack Obama’s job approval rating has shown little change from last month. In the current survey, 49% disapprove of how he is handling his job and 43% approve. Obama’s ratings had steadily declined from May to November of last year, before he regained some ground in December. In the last month, there have been no significant changes in partisan approval. About three-quarters of Democrats (77%) approve and 17% disapprove; among Republicans, 12% approve and 84% disapprove. Independents, on balance, continue to view his job performance negatively — 37% approve and 53% disapprove.
Paul Merrell

Huge swath of GCHQ mass surveillance is illegal, says top lawyer | UK news | The Guardian - 0 views

  • GCHQ's mass surveillance spying programmes are probably illegal and have been signed off by ministers in breach of human rights and surveillance laws, according to a hard-hitting legal opinion that has been provided to MPs.The advice warns that Britain's principal surveillance law is too vague and is almost certainly being interpreted to allow the agency to conduct surveillance that flouts privacy safeguards set out in the European convention on human rights (ECHR).The inadequacies, it says, have created a situation where GCHQ staff are potentially able to rely "on the gaps in the current statutory framework to commit serious crime with impunity".
  • Last year, Hague told MPs: "It has been suggested GCHQ uses our partnership with the US to get around UK law, obtaining information that they cannot legally obtain in the UK. I wish to be absolutely clear that this accusation is baseless."However, the legal advice poses awkward new questions about the framework GCHQ operates within, the role of ministers and the legality of transferring bulk data to other spy agencies.The advice makes clear Ripa does not allow GCHQ to conduct mass surveillance on communications between people in the UK, even if the data has briefly left British shores because the call or email has travelled to an internet server overseas.
  • The legal advice has been sent to the 46 members of the all-party parliamentary group on drones, which is chaired by the Labour MP, Tom Watson.
  • ...6 more annotations...
  • In a 32-page opinion, the leading public law barrister Jemima Stratford QC raises a series of concerns about the legality and proportionality of GCHQ's work, and the lack of safeguards for protecting privacy.
  • The opinion notes that the UK has not adopted the doctrine of "anticipatory self-defence" in the same way as the US to provide legal cover for drone strikes in countries where it is not involved in an international armed conflict."Accordingly, in our view, if GCHQ transferred data to the NSA in the knowledge that it would or might be used for targeting drone strikes, that transfer is probably unlawful," the advice states."The transferor would be an accessory to murder for the purposes of domestic law … We consider that, pursuant to the transfer, the agent is likely to become an accessory to murder."Watson said he would be submitting the legal opinion to the parliamentary intelligence and security committee, which is undertaking an inquiry into mass surveillance."MPs now have strong independent advice questioning the legality of major UK intelligence programmes," he said.
  • The advice concludes: "In short, the rules concerning communications data are too uncertain and do not provide sufficient clarity to be in accordance with the law … we consider the mass interception of communications via a transatlantic cable to be unlawful, and that these conclusions would apply even if some or all of the interception is taking place outside UK territorial waters."Leaving decisions about whether data can be shared with agencies abroad to the "unfettered discretion" of ministers is also a probable breach of the convention, the advice warns.
  • "First, the transfer of private data is a significant interference with an individual's article 8 rights. That interference will only be lawful when proportionate."Secondly, the ECHR has held on more than one occasion that surveillance, and the use of surveillance data, is an area in which governments must conduct themselves in a transparent and 'predictable' manner. The current framework is uncertain: it relies on the discretion of one individual."Thirdly, on a pragmatic level,there is a real possibility that the NSA might function as GCHQ's unofficial 'backup' service. If GCHQ is not entitled to hold onto data itself, it might transfer it to the NSA. In time, and if relevant, that data might be transferred back to GCHQ. Without strong guidelines and scrutiny, the two services might support each other to (in effect) circumvent the requirements of their domestic legislation."The opinion adds: "If GCHQ transfers communications data to other governments it does so without any statutory restrictions. Such transfers are a disproportionate interference with the article 8 rights of the individuals concerned. There are no restrictions, checks or restraints on the transfer of that data."
  • At its most extreme, the advice raises issues about the possible vulnerability of staff at GCHQ if it could be proved that intelligence used for US drone strikes against "non-combatants" had been passed on or supplied by the British before being used in a missile attack."An individual involved in passing that information is likely to be an accessory to murder. It is well arguable, on a variety of different bases, that the government is obliged to take reasonable steps to investigate that possibility," the advice says.
  • "If ministers are prepared to allow GCHQ staff to be potential accessories to murder, they must be very clear that they are responsible for allowing it. We have seen a step change in mass covert surveillance and intelligence gathering, underpinned on dubious legal grounds and with virtually no parliamentary oversight. "The leadership of all the main parties should stop turning a blind eye to a programme that has far-reaching consequences around the globe."
  •  
    The lawyer who wrote the opinion is a QC, or Queen's Counsel. See http://en.wikipedia.org/wiki/Queen's_Counsel This opinion *will* result in changes in UK law and oversight of GCHQ. And because much of it is based on the European Convention on Human Rights, the opinion will stoke the anti-spying sentiment in the European Community, which is already at fever-pitch. The ECHR is Europe's implementation of several U.N. treaties on human rights, so the blowback may well extend beyond the EU and UK.  
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

CIA SUCCESSFULLY CONCEALS BAY OF PIGS HISTORY - 0 views

  • May 21, 2014 – The U.S. Court of Appeals for the D.C. Circuit yesterday joined the CIA's cover-up of its Bay of Pigs disaster in 1961 by ruling that a 30-year-old volume of the CIA's draft "official history" could be withheld from the public under the "deliberative process" privilege, even though four of the five volumes have previously been released with no harm either to national security or any government deliberation. "The D.C. Circuit's decision throws a burqa over the bureaucracy," said Tom Blanton, director of the National Security Archive (www.nsarchive.org), the plaintiff in the case. "Presidents only get 12 years after they leave office to withhold their deliberations," commented Blanton, "and the Federal Reserve Board releases its verbatim transcripts after five years. But here the D.C. Circuit has given the CIA's historical office immortality for its drafts, because, as the CIA argues, those drafts might 'confuse the public.'" "Applied to the contents of the National Archives of the United States, this decision would withdraw from the shelves more than half of what's there," Blanton concluded.
  • The 2-1 decision, authored by Judge Brett Kavanaugh (a George W. Bush appointee and co-author of the Kenneth Starr report that published extensive details of the Monica Lewinsky affair), agreed with Justice Department and CIA lawyers that because the history volume was a "pre-decisional and deliberative" draft, its release would "expose an agency's decision making process in such a way as to discourage candid discussion within the agency and thereby undermine the agency's ability to perform its functions." This language refers to the fifth exemption (known as b-5) in the Freedom of Information Act. The Kavanaugh opinion received its second and majority vote from Reagan appointee Stephen F. Williams, who has senior status on the court.
  • On the 50th anniversary of the Bay of Pigs invasion in 2011, the National Security Archive's Cuba project director, Peter Kornbluh, requested, through the FOIA, the complete release of "The Official History of the Bay of Pigs Operation" — a massive, five-volume study compiled by a CIA staff historian, Jack Pfeiffer, in the 1970s and early 1980s. Volume III had already been released under the Kennedy Assassination Records Act; and a censored version of Volume IV had been declassified years earlier pursuant to a request by Pfeiffer himself. The Archive's FOIA request pried loose Volumes I and II of the draft history, along with a less-redacted version of Volume IV, but the CIA refused to release Volume V, so the Archive filed suit under FOIA in 2012, represented by the expert FOIA litigator, David Sobel. In May 2012, U.S. District Judge Gladys Kessler held that Volume V was covered by the deliberative process privilege, and refused to order any segregation of "non-deliberative" material, as required by FOIA.
  • ...2 more annotations...
  • The Archive appealed the lower court's decision, and with representation from the distinguished firm of Skadden Arps Meagher Slate & Flom, brought the case to the D.C. Circuit, with oral argument in December 2013. The National Coalition for History, including the American Historical Association and other historical and archival professional organizations, joined the case with an amicus curiae brief authored by the Jones Day law firm arguing for release of the volume. Titled "CIA's Internal Investigation of the Bay of Pigs Operation," Volume V apparently contains Pfeiffer's aggressive defense of the CIA against a hard-hitting 1961 internal review, written by the agency's own Inspector General, which held the CIA singularly responsible for the poor assumptions, faulty planning and incompetence that led to the quick defeat of the paramilitary exile brigade by Fidel Castro's military at the Bahia de Cochinos between April 17 and April 20, 1961. The Archive obtained under FOIA and published the IG Report in 1998. The CIA has admitted in court papers that the Pfeiffer study contains "a polemic of recriminations against CIA officers who later criticized the operation," as well as against other Kennedy administration officials who Pfeiffer contended were responsible for this foreign policy disaster. In the dissenting opinion from the D.C. Circuit's 2-1 decision yesterday, Judge Judith Rogers (appointed by Bill Clinton) identified multiple contradictions in the CIA's legal arguments. Judge Rogers pointed out that the CIA had failed to justify why release of Volume V would "lead to public confusion" when CIA had already released Volumes I-IV. She noted that neither the CIA nor the majority court opinion had explained "why release of the draft of Volume V 'would expose an agency's decision making process,'" and discourage future internal deliberations within the CIA's historical office any more than release of the previous four volumes had done.
  • Prior to yesterday's decision, the Obama administration had bragged that reducing the government's invocation of the b-5 exemption was proof of the impact of the President's Day One commitment to a "presumption of disclosure." Instead, the bureaucracy has actually increased in the last two years its use of the b-5 exemption, which current White House counselor John Podesta once characterized as the "withhold if you want to" exemption. The majority opinion also left two openings for transparency advocates. It invites Congress to set a time limit for applying the b-5 exemption, as Congress has done in the Presidential Records Act. Second, it concludes that any "factual material" contained in the draft should be reachable through Freedom of Information requests.
  •  
    "Causing public confusion" is a weak grounds for withholding government records because the agency has the option of issuing clarifying statements. Indeed, much of what government does causes public confusion. Hopefully, the Archive will pursue en banc reconsideration and/or seek Supreme Court review. 
Paul Merrell

Push for New Sanctions on Iran Stalls Amid Growing Resistance | The Nation - 0 views

  • A bid to slap Iran with a new round of economic sanctions appears to have stalled in the Senate, after leading Democrats amplified concern about the threat such a move poses to a fragile diplomatic process. Early in the week, reports that a bill introduced by Republican Mark Kirk and Democrat Robert Menendez was within striking distance of a veto-proof majority cast a shadow over news that negotiators had finalized a temporary agreement to freeze Iran’s nuclear program, beginning Monday. New sanctions would likely kill negotiations for a final deal, the White House warned lawmakers, and increase the chances of an armed conflict with Iran. But Senate majority leader Harry Reid has given no indication that he will bring the bill up for a vote, and the pressure to do so is falling now that top Democrats have intensified opposition to the proposed legislation. The Kirk-Menendez bill gained no new endorsements this week, and even one supportive senator admitted Wednesday to a break in momentum.
  • The gorilla in the room is the American Israeli Public Affairs Committee, which has been calling for new sanctions for months. Of the 16 Democrats who have endorsed the Kirk-Menendez legislation, several are up for re-election in closely contested states; Senator Kirk himself suggested Tuesday that a vote for new sanctions would be an opportunity for lawmakers to shore up support from the powerful lobby. “The great thing, since we represent a nationwide community — the pro-Israel community is going to be heavily present in most states — this is a chance for senators to go back and tell them, ‘I’m with you,’” Kirk said. Other Democrats pushing for the bill have close ties with the group, particularly Chuck Schumer and Cory Booker. Tellingly, the Kirk-Menendez bill states that if Israel takes "military action in legitimate self-defense against Iran's nuclear weapons program,” the US "should stand with Israel and provide…diplomatic, military, and economic support to the Government of Israel in its defense of its territory, people, and existence." The language is nonbinding, but it raises flags about whose interests the legislation would truly serve.
  • Dianne Feinstein addressed this point more directly than perhaps any other politician so far. “While I recognize and share Israel’s concern, we cannot let Israel determine when and where the US goes to war,” she said. “By stating that the US should provide military support to Israel should it attack Iran, I fear that is exactly what this bill will do.” Such outspokenness about the relationship between US policymaking in the Middle East and Israeli interests is remarkable. But other lawmakers are signalling that they too are shrugging off the lobby: Democratic Representative Debbie Wasserman-Shultz, normally a high-profile ally for AIPAC, reportedly argued against the Kirk-Menendez bill at a White House meeting attended by several dozen of her colleagues on Wednesday night. How things play out in the next week, and in the duration of the talks with Iran, will be a good test of AIPAC’s influence, which seemed diminished when Congress considered military strikes in Syria last year. Progressives claimed a victory when diplomacy prevailed then; as Peter Beinart points out, the current debate presents a real opportunity for the anti-war left to reassert itself, not only to punish lawmakers who start wars, but to set new expectations for a diplomacy-first approach.
  • ...1 more annotation...
  • Read Next: Robert Scheer on the 1953 CIA-supported coup in Iran.
  •  
    More signs that the power of the Israel Lobby in Congress is on the wane and that it is now a fit topic for open discussion. Might we yet again see the day when members of the Israel Lobby will be required to register as agents of a foreign power, as required by law?  (That bit about "Progressives claimed a victory when diplomacy prevailed then" is in my opinion off the wall. There are exceedingly few true "progressives" in Congress; they can be counted on the fingers of one hand. The statement ignores that members of Congress in both parties came out in opposition to war on Syria, as did the Pentagon. The precipitating sarin gas attack was quickly exposed as a false flag  attack cooperatively mounted by the Saudis and U.S. government officials to justify the planned U.S missile strikes. Public opinion was overwhelmingly against war on Syria and Russian diplomats offered Obama a face-saving path of retreat. Oh, yeah. Mid-term elections are coming up this year, and no Congressman up for reelection relished the thought of facing voter wrath on this issue.     it was public opinion against war with Syria, Russia capitalizing on John Kerry's hoof-in-mouth disease, 
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

T h e L i b e r t a r i a n: Is US public opinion on Israel shifting? - 0 views

  • A recent public opinion poll asked Americans which of two options they would favour if a two-state solution to the Israel-Palestine conflict was no longer on the table. (It is in the rhetoric of leaders and diplomats but not in reality.) The two options were: The continuation of Israel’s Jewish majority [presumably this assumes permanent Israeli occupation of the West Bank and continuing ethnic cleansing of it by stealth] even if it means that Palestinians will not have citizenship and full rights. One democratic state for all in which Jews and Arabs would be equal.   Only 24 per cent supported the continuation of things as they are.
  •  According to the poll,  65 per cent of those asked for their opinion preferred the one-state option. What explains this? Is it that an apparent majority of Americans are at last understanding and supporting the need and rights of the Palestinians for justice, or is it something else – an indication that while they are not much concerned about the rights of the Palestinians, an apparent majority of Americans are fed up with an Israel they rightly perceive to be the obstacle to peace?
  • Whatever the reason for it – empathy with the Palestinian claim for justice or not – a significant shift in American public opinion really does seem to be underway. Staying with Gideon Levy’s analogy, this might explain why President Obama felt free enough to suggest to occupation addict Netanyahu that he and Israel should consider rehab.
  • ...5 more annotations...
  • We do not know whether or not Obama had the balls to say this to Netanyahu face to face, but even if he didn’t, Netanyahu would still have got the message. Akiva Eldar’s interpretation of Obama’s message to Netanyahu via Goldberg was that he, the president, “is sick and tired of fighting on Netanyahu’s behalf vis-a-vis the Europeans and automatically vetoing (in the UN Security Council) their proposals condemning the settlements”.
  • And he explained what he meant with these words. “If Israel sees no peace deal and continued aggressive settlement construction,” and “if Palestinians come to believe that the possibility of a contiguous sovereign Palestinian state is no longer within reach, then our ability to manage the international fallout is going to be limited.”
  • Obama did so in an interview with Jeffrey Goldberg for “Bloomberg View“ shortly before he received Netanyahu in the White House. Obama’s message to Netanyahu via Goldberg included the statement that “There is a limit to the power of the man who bears the title leader of the free world.”
  •  But there was more to Obama’s message than that. He was effectively saying that if Israel continues to be opposed to peace on terms the Palestinians can accept, no occupant of the White House will be able to protect Israel from the tightening noose of isolation and sanctions.
  • Note In a most remarkable article for Haaretz on 7 March (“If I were an American Jew, I’d worry about Israel’s racist cancer”), Daniel Blatman, a history professor at the Hebrew University of Jerusalem, called on American Jews to end their silence “and cooperate with the shrinking groups of Israelis who have not yet lost hope that it’s possible to stop this downslide towards the abyss.”
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Gary Edwards

Chris Dodd's carve-outs for cronies - NYPOST.com - 0 views

  •  
    Dangerous and sickening!  In Dodd's Bill, The Property Transaction Industry (Mortgage, Real Estate, Insurance, Legal, Appraisal, and Title) are exempted from the 1974 RESPA full disclosure act!   Regulators are authorized to take over and "bail out" any financial operation they deem troubled. excerpt: The financial-regulatory bill now before the Senate is so filled with special-interest loopholes and exclusions that it makes the health-care "reform" bill, with its "Cornhusker Kickback" and "Louisiana Purchase," look like a model of rectitude.The Senate bill, sponsored by Democrat Chris Dodd, claims to subject all "too big to fail" institutions to greater federal supervision, but in fact it only mandates such regulation for bank-holding companies. Regulators would have to make a case-by-case decision on whether to apply it to other financial companies.The Senate financial-regulation bill offers a stark choice: Do we aspire to be a country where everyone is subject to the same rules? Or do we accept a system where power, influence and money can buy exclusions and exemptions?The public needs to understand that, far from protecting the little guy and sticking it to the fat cats, this bill keeps good, old-fashioned political patronage alive and well. Read more: http://www.nypost.com/p/news/opinion/opedcolumnists/chris_dodd_carve_outs_for_cronies_MT1U7GBEPvzX3QXProqC9L#ixzz0mKJmEdn4 Read more: http://www.nypost.com/p/news/opinion/opedcolumnists/chris_dodd_carve_outs_for_cronies_MT1U7GBEPvzX3QXProqC9L#ixzz0mKJmEdn4Read more: http://www.nypost.com/p/news/opinion/opedcolumnists/chris_dodd_carve_outs_for_cronies_MT1U7GBEPvzX3QXProqC9L#ixzz0mKJcsmlN
Paul Merrell

Conflicts of interest in the Syria debate | Public Accountability Initiative - 1 views

  • During the public debate around the question of whether to attack Syria, Stephen Hadley, former national security adviser to George W. Bush, made a series of high-profile media appearances. Hadley argued strenuously for military intervention in appearances on CNN, MSNBC, Fox News, and Bloomberg TV, and authored a Washington Post op-ed headlined “To stop Iran, Obama must enforce red lines with Assad.” In each case, Hadley’s audience was not informed that he serves as a director of Raytheon, the weapons manufacturer that makes the Tomahawk cruise missiles that were widely cited as a weapon of choice in a potential strike against Syria. Hadley earns $128,500 in annual cash compensation from the company and chairs its public affairs committee. He also owns 11,477 shares of Raytheon stock, which traded at all-time highs during the Syria debate ($77.65 on August 23, making Hadley’s share’s worth $891,189). Despite this financial stake, Hadley was presented to his audience as an experienced, independent national security expert.
  • Though Hadley’s undisclosed conflict is particularly egregious, it is not unique. The following report documents the industry ties of Hadley, 21 other media commentators, and seven think tanks that participated in the media debate around Syria. Like Hadley, these individuals and organizations have strong ties to defense contractors and other defense- and foreign policy-focused firms with a vested interest in the Syria debate, but they were presented to their audiences with a veneer of expertise and independence, as former military officials, retired diplomats, and independent think tanks. The report offers a new look at an issue raised by David Barstow’s 2008 Pulitzer Prize-winning New York Times series on the role military analysts played in promoting the Bush Administration’s narrative on Iraq. In addition to exposing coordination with the Pentagon, Barstow found that many cable news analysts had industry ties that were not disclosed on air. If the recent debate around Syria is any guide, media outlets have done very little to address the gaps in disclosure and abuses of the public trust that Barstow exposed. Some analysts have stayed the same, others are new, and the issues and range of opinion are different. But the media continues to present former military and government officials as venerated experts without informing the public of their industry ties – the personal financial interests that may be shaping their opinions of what is in the national interest.
  • This report details these ties, in addition to documenting the industry backing of think tanks that played a prominent role in the Syria debate. It reveals the extent to which the public discourse around Syria was corrupted by the pervasive influence of the defense industry, to the point where many of the so-called experts appearing on American television screens were actually representatives of companies that profit from heightened US military activity abroad. The threat of war with Syria may or may not have passed, but the threat that these conflicts of interest pose to our public discourse – and our democracy – is still very real.
Paul Merrell

Kerry portrait of Syria rebels at odds with intelligence reports | Reuters - 0 views

  • Secretary of State John Kerry's public assertions that moderate Syrian opposition groups are growing in influence appear to be at odds with estimates by U.S. and European intelligence sources and nongovernmental experts, who say Islamic extremists remain by far the fiercest and best-organized rebel elements. At congressional hearings this week, while making the case for President Barack Obama's plan for limited military action in Syria, Kerry asserted that the armed opposition to Syrian President Bashar al-Assad "has increasingly become more defined by its moderation, more defined by the breadth of its membership, and more defined by its adherence to some, you know, democratic process and to an all-inclusive, minority-protecting constitution."And the opposition is getting stronger by the day," Kerry told the Senate Foreign Relations Committee on Tuesday.U.S. and allied intelligence sources and private experts on the Syrian conflict suggest that assessment is optimistic.
  •  
    The linked article points to multiple intelligence reports and disagreeing opinions by experts, both inside government and out.  To top it off, Kerry's stated source of information, the author of a Wall Street Journal article, concealed her ties to a Syrian opposition lobbying group along with her own prior inconsistent statements. See e.g., Daniel Greenfield, The Wall Street Journal's Misleading Report on the "Moderate" Syrian Opposition, Front Page Mag (2 September 2013), http://frontpagemag.com/2013/dgreenfield/the-wall-street-journals-misleading-report-on-the-moderate-syrian-opposition/ (debunking Journal article using its author's own prior statements) Charles C. Johnson, Woman informing Kerry, McCain's opinions on Syria also an advocate for Syrian rebels, The Daily Caller (5 September 2013), http://dailycaller.com/2013/09/05/woman-informing-kerry-mccains-opinions-on-syria-also-an-advocate-for-syrian-rebels/ Michael Calderone, Wall Street Journal Op-Ed Draws Scrutiny Over Writer's Ties To Syrian Rebel Advocacy Group, Huffington Post (6 September 2013), http://www.huffingtonpost.com/2013/09/06/wall-street-journal-syria-elizabeth-obagy_n_3881477.html Max Blumenthal, Shady PR operatives, pro-Israel ties, anti-Castro money: Inside the Syrian opposition's DC spin machine, Mondoweiss (7 September 2013), nofollow
Paul Merrell

Friends of the Earth - 0 views

  • Tell Chairman Macfarlane: Shut down Diablo Canyon! This week, the Associated Press revealed that the nuclear reactors at Diablo Canyon are surrounded by faults capable of causing an earthquake far larger than they were designed to withstand. There is no way that the NRC should allow these reactors to continue to operate given this new information. Demand that Chairman Macfarlane put peoples' safety ahead of profits and shut down Diablo Canyon!
  •  
    Dear Chairman Macfarlane: It has come to my attention that the former Senior Resident Inspector at the Diablo Canyon Nuclear Power Plant filed a differing professional opinion with the NRC in which he recommended that the Commission shut Diablo Canyon while addressing the fact that the reactors and internal equipment are no longer correctly tested and licensed given new earthquake information that exists in regard to the Shoreline, Los Osos and San Luis Bay faults which surround the plant. It is unconscionable that the NRC has allowed Diablo Canyon to continue operating without fully analyzing seismic threats to the reactors.  It is also astonishing to me that your agency has not only failed to act on this report but has suppressed the publication of the report despite the request by the author that his paper be made public. I understand that Friends of the Earth has now petitioned the agency to close the reactors and to force Pacific Gas and Electric to undergo a public licensing review should they wish to continue to operate these reactors.  I strongly support this petition and ask that you take immediate action to comply. As a geologist, I am sure that you are aware that USGS technical staff posit that the Shoreline, Los Osos, San Luis Bay, and Hosgri faults could be connected, potentially causing larger earthquakes than Diablo Canyon was designed to withstand. According to PG&E itself, the Shoreline, Los Osos and San Luis Bay faults could all produce ground motion beyond that considered as the basis for both Diablo's license and safety evaluation. This means that the reactors and internal equipment have not been tested and certified to withstand the kind of earthquakes that we now know are possible in the area. This is unacceptable. If there were a proposal to build reactors on the Diablo Canyon site today, there is no way, knowing what we do now, that it would be accepted. Don't let what we didn't know decades ago be an excuse for keeping people an
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

History of the Federal Judiciary - 0 views

  •  Olmstead v. United States: The Constitutional Challenges of Prohibition Enforcement Historical Documents Dissenting opinion of Justice Louis D. Brandeis in Olmstead v. United States Justice Brandeis’s dissenting opinion is one of the more notable dissents in Supreme Court history. He attempted to define a general right of privacy based on the Fourth and Fifth Amendments. Brandeis had long been interested in the problem of privacy in the modern age; years earlier he and his law partner, Samuel Warren, published what many consider the seminal article on the topic (Samuel Warren & Louis D. Brandeis, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890)). Brandeis’s opinion in Olmstead attempted to apply to the current era what he said were the principles of the Fourth and Fifth Amendments. Historians often overlook how much his approach draws on the dissenting opinion of Judge Rudkin in the circuit court, but Brandeis himself acknowledged his debt to Rudkin in the text. The quotation about “the form that evil had theretofore taken” referred to the Supreme Court decision in Weems v. United States, in which Justice Joseph McKenna wrote of the need for the Court to apply the general principles of the Constitution to new problems.
  • Moreover, “in the application of a constitution, our contemplation cannot be only of what has been but of what may be.” The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. “That places the liberty of every man in the hands of every petty officer” was said by James Otis of much lesser intrusions than these. To Lord Camden, a far slighter intrusion seemed “subversive of all the comforts of society.” Can it be that the Constitution affords no protection against such invasions of individual security? . . .
  • In Ex parte Jackson, 96 U.S. 727, it was held that a sealed letter entrusted to the mail is protected by the Amendments. The mail is a public service furnished by the Government. The telephone is a public service furnished by its authority. There is, in essence, no difference between the sealed letter and the private telephone message. As Judge Rudkin said below: “True, the one is visible, the other invisible; the one is tangible, the other intangible; the one is sealed, and the other unsealed, but these are distinctions without a difference.” The evil incident to invasion of the privacy of the telephone is far greater than that involved in tampering with the mails. Whenever a telephone line is tapped, the privacy of the persons at both ends of the line is invaded and all conversations between them upon any subject, and, although proper, confidential and privileged, may be overheard. Moreover, the tapping of one man’s telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire-tapping.
  • ...2 more annotations...
  • Time and again, this Court in giving effect to the principle underlying the Fourth Amendment, has refused to place an unduly literal construction upon it. This was notably illustrated in the Boyd case itself. Taking language in its ordinary meaning, there is no “search” or “seizure” when a defendant is required to produce a document in the orderly process of a court’s procedure. “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,” would not be violated, under any ordinary construction of language, by compelling obedience to a subpoena. But this Court holds the evidence inadmissible simply because the information leading to the issue of the subpoena has been unlawfully secured. . . . The provision against self-incrimination in the Fifth Amendment has been given an equally broad construction. . . .
  • Decisions of this Court applying the principle of the Boyd case have settled these things. Unjustified search and seizure violates the Fourth Amendment, whatever the character of the paper; whether the paper when taken by the federal officers was in the home, in an office, or elsewhere; whether the taking was effected by force, by fraud, or in the orderly process of a court’s procedure. From these decisions, it follows necessarily that the Amendment is violated by the officer’s reading the paper without a physical seizure, without his even touching it; and that use, in any criminal proceeding, of the contents of the paper so examined—as where they are testified to by a federal officer who thus saw the document, or where, through knowledge so obtained, a copy has been procured elsewhere—any such use constitutes a violation of the Fifth Amendment. The protection guaranteed by the Amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man’s spiritual nature, of his feelings, and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. And the use, as evidence in a criminal proceeding, of facts ascertained by such intrusion must be deemed a violation of the Fifth.
  •  
    The linked opinion is Justice Brandeis' dissent in Olmstead v. U.S., the first Supreme Court decision to approve the use of secret wiretap evidence in a criminal proceeding, even though gathered without a search warrant. The warrant requirement would later be imposed in 1967 by the decision in Katz v. U.S., which established that the Fourth Amendment the privacy of people, not places, reviving the Brandeis dissent to a large degree. Since Katz and the advent of broad government surveillance, Justice Brandeis' dissent is gaining still more attention. 
1 - 20 of 281 Next › Last »
Showing 20 items per page