Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged secret-law

Rss Feed Group items tagged

Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Paul Merrell

FindLaw | Cases and Codes - 0 views

  • SMITH v. MARYLAND, 442 U.S. 735 (1979)
  • The telephone company, at police request, installed at its central offices a pen register to record the numbers dialed from the telephone at petitioner's home. Prior to his robbery trial, petitioner moved to suppress "all fruits derived from" the pen register. The Maryland trial court denied this motion, holding that the warrantless installation of the pen register did not violate the Fourth Amendment. Petitioner was convicted, and the Maryland Court of Appeals affirmed. Held: The installation and use of the pen register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant was required. Pp. 739-746. (a) Application of the Fourth Amendment depends on whether the person invoking its protection can claim a "legitimate expectation of privacy" that has been invaded by government action. This inquiry normally embraces two questions: first, whether the individual has exhibited an actual (subjective) expectation of privacy; and second, whether his expectation is one that society is prepared to recognize as "reasonable." Katz v. United States, 389 U.S. 347 . Pp. 739-741.
  • (b) Petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and even if he did, his expectation was not "legitimate." First, it is doubtful that telephone users in general have any expectation of privacy regarding the numbers they dial, since they typically know that they must convey phone numbers to the telephone company and that the company has facilities for recording this information and does in fact record it for various legitimate business purposes. And petitioner did not demonstrate an expectation of privacy merely by using his home phone rather than some other phone, since his conduct, although perhaps calculated to keep the contents of his conversation private, was not calculated to preserve the privacy of the number he dialed. Second, even if petitioner did harbor some subjective expectation of privacy, this expectation was not one that society is prepared to recognize as "reasonable." When petitioner voluntarily conveyed numerical information to the phone company and "exposed" that information to its equipment in the normal course of business, he assumed the risk that the company would reveal the information [442 U.S. 735, 736]   to the police, cf. United States v. Miller, 425 U.S. 435 . Pp. 741-746. 283 Md. 156, 389 A. 2d 858, affirmed.
  •  
    The Washington Post has reported that "on July 15 [2001], the secret surveillance court allowed the NSA to resume bulk collection under the court's own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as "pen register, trap and trace," that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line." .  The seminal case on pen registers is the Supreme Court's 1979 Smith v. Maryland decision, bookmarked here and the Clerk's syllabus highlighted, with the Court's discussion on the same web page. We will be hearing a lot about this case decision in the weeks and months to come.  Let it suffice for now to record a few points of what my antenna are telling me:  -- Both technology and the law have moved on since then. We are 34 years down the line from the Smith decision. Its pronouncements have been sliced and diced by subsequent decisions. Not a single Justice who sat on the Smith case is still on the High Bench.   -- In Smith, a single pen register was used to obtain calling information from a single telephone number by law enforcement officials. In the present circumstance, we face an Orwellian situation of a secret intelligence agency with no law enforcement authority forbidden by law from conducting domestic surveillance perusing and all digital communications of the entire citizenry. -- The NSA has been gathering not only information analogous to pen register results but also the communications of American citizens themselves. The communications themselves --- the contents --- are subject to the 4th Amendment warrant requirement. Consider the circuitous route of the records ordered to be disclosed in the Verizon FISA order. Verizon was ordered to disclose them to the FBI, not to the NSA. But then the FBI apparently forwards the records to the NSA, who has both the "pen register
Paul Merrell

ACLU Demands Secret Court Hand Over Crucial Rulings On Surveillance Law - 0 views

  • The American Civil Liberties Union (ACLU) has filed a motion to reveal the secret court opinions with “novel or significant interpretations” of surveillance law, in a renewed push for government transparency. The motion, filed Wednesday by the ACLU and Yale Law School’s Media Freedom and Information Access Clinic, asks the Foreign Intelligence Surveillance Act (FISA) Court, which rules on intelligence gathering activities in secret, to release 23 classified decisions it made between 9/11 and the passage of the USA Freedom Act in June 2015. As ACLU National Security Project staff attorney Patrick Toomey explains, the opinions are part of a “much larger collection of hidden rulings on all sorts of government surveillance activities that affect the privacy rights of Americans.” Among them is the court order that the government used to direct Yahoo to secretly scanits users’ emails for “a specific set of characters.” Toomey writes: These court rulings are essential for the public to understand how federal laws are being construed and implemented. They also show how constitutional protections for personal privacy and expressive activities are being enforced by the courts. In other words, access to these opinions is necessary for the public to properly oversee their government.
  • Although the USA Freedom Act requires the release of novel FISA court opinions on surveillance law, the government maintains that the rule does not apply retroactively—thereby protecting the panel from publishing many of its post-9/11 opinions, which helped create an “unprecedented buildup” of secret surveillance laws. Even after National Security Agency (NSA) whistleblower Edward Snowden revealed the scope of mass surveillance in 2013, sparking widespread outcry, dozens of rulings on spying operations remain hidden from the public eye, which stymies efforts to keep the government accountable, civil liberties advocates say. “These rulings are necessary to inform the public about the scope of the government’s surveillance powers today,” the ACLU’s motion states.
  • Toomey writes that the rulings helped influence a number of novel spying activities, including: The government’s use of malware, which it calls “Network Investigative Techniques” The government’s efforts to compel technology companies to weaken or circumvent their own encryption protocols The government’s efforts to compel technology companies to disclose their source code so that it can identify vulnerabilities The government’s use of “cybersignatures” to search through internet communications for evidence of computer intrusions The government’s use of stingray cell-phone tracking devices under the Foreign Intelligence Surveillance Act (FISA) The government’s warrantless surveillance of Americans under FISA Section 702—a controversial authority scheduled to expire in December 2017 The bulk collection of financial records by the CIA and FBI under Section 215 of the Patriot Act Without these rulings being made public, “it simply isn’t possible to understand the government’s claimed authority to conduct surveillance,” Toomey writes. As he told The Intercept on Wednesday, “The people of this country can’t hold the government accountable for its surveillance activities unless they know what our laws allow. These secret court opinions define the limits of the government’s spying powers. Their disclosure is essential for meaningful public oversight in our democracy.”
Paul Merrell

Senators accuse government of using 'secret law' to collect Americans' data | World new... - 0 views

  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say.
  • "This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."This is the strongest attack yet from Congress since the disclosures began, and comes after Clapper admitted he had given "the least untruthful answer possible" when pushed on these issues by Senators at a hearing before the latest revelations by the Guardian and the Washington Post.In a press statement, the group of senators added: "The recent public disclosures of secret government surveillance programs have exposed how secret interpretations of the USA Patriot Act have allowed for the bulk collection of massive amounts of data on the communications of ordinary Americans with no connection to wrongdoing."
  • They said: "Reliance on secret law to conduct domestic surveillance activities raises serious civil liberty concerns and all but removes the public from an informed national security and civil liberty debate." A spokesman for the office of the director of national intelligence (ODNI) acknowledged the letter. "The ODNI received a letter from 26 senators this morning requesting further engagement on vital intelligence programs recently disclosed in the media, which we are still evaluating. The intelligence and law enforcement communities will continue to work with all members of Congress to ensure the proper balance of privacy and protection for American citizens."The letter was organised by Oregan Democrat Ron Wyden, a member of the intelligence committee, but includes four Republican senators: Mark Kirk, Mike Lee, Lisa Murkowski and Dean Heller.
  • ...3 more annotations...
  • The senators said they were seeking public answers to the following questions in order to give the American people the information they need to conduct an informed public debate. The specific questions include:• How long has the NSA used Patriot Act authorities to engage in bulk collection of Americans' records? Was this collection underway when the law was reauthorized in 2006?• Has the NSA used USA Patriot Act authorities to conduct bulk collection of any other types of records pertaining to Americans, beyond phone records?• Has the NSA collected or made any plans to collect Americans' cell-site location data in bulk?• Have there been any violations of the court orders permitting this bulk collection, or of the rules governing access to these records? If so, please describe these violations.
  • They ask Clapper to publicly provide information about the duration and scope of the program and provide examples of its effectiveness in providing unique intelligence, if such examples exist.The senators also expressed their concern that the program itself has a significant impact on the privacy of law-abiding Americans and that the Patriot Act could be used for the bulk collection of records beyond phone metadata."The Patriot Act's 'business records' authority can be used to give the government access to private financial, medical, consumer and firearm sales records, among others," said a press statement.In addition to raising concerns about the law's scope, the senators noted that keeping the official interpretation of the law secret and the instances of misleading public statements from executive branch officials prevented the American people from having an informed public debate about national security and domestic surveillance.
  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say."This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."
Paul Merrell

Still Secret: Second Circuit Keeps More Drone Memos From the Public | Just Security - 0 views

  • Secret law has been anathema to our democracy since its Founding, but a federal appeals court just gave us more of it.
  • We might forgive the citizenry’s confusion, though, in attempting to square those principles with the decision by the Second Circuit Court of Appeals, published yesterday, holding that the government may continue to keep secret nine legal memoranda by the Justice Department’s Office of Legal Counsel analyzing the legality of targeted killings carried out by the US government. It was just more than a year ago that the same panel of the same court ordered the government to disclose key portions of a July 2010 OLC memorandum that authorized the targeted killing of an American citizen in Yemen. At the time, the court’s opinion seemed to promise at least a partial solution to a problem straight (as the district court in the same case put it) from Alice in Wonderland: that [a] thicket of laws and precedents … effectively allow the Executive Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws, while keeping the reasons for its conclusion a secret.
  • Yesterday’s opinion retreats from that promise by keeping much of the government’s law of the targeted killing program secret. (In this and two other cases, the ACLU continues to seek more than 100 other legal memoranda authored by various agencies concerning targeted killing.) It does so in two ways that warrant attention. First, the court suggests that OLC merely gives advice to executive branch agencies, and that OLC’s legal memoranda do not establish the “working law” of the government because agencies might not “adopt” the memoranda’s legal analysis as their own. This argument is legally flawed and, moreover, it flies in the face of the public evidence concerning how the executive branch treats opinions issued by OLC. In an OLC memorandum published, ironically or not, the same day (July 16, 2010) and over the same signature (David Barron’s) as the targeted killing memorandum released at the Second Circuit’s behest last year, the OLC explains that its “central function” is to provide “controlling legal advice to Executive Branch officials.” And not even two weeks ago, the acting head of the OLC told the public that even informally drafted legal advice emanating from his office is “binding by custom and practice in the executive branch,” that “[i]t’s the official view of the office, and that “[p]eople are supposed to and do follow it.”
  • ...2 more annotations...
  • But that’s not what the government told the Second Circuit, and it’s not what the Second Circuit has now suggested is the law. Second, the Second Circuit’s new opinion endorses the continued official secrecy over any discussion of a document that has supplied a purported legal basis for the targeted killing program since almost immediately after the September 11 attacks. The document — a September 17, 2001 “Memorandum of Notification” — is not much of a secret. The government publicly identified it in litigation with the ACLU eight years ago; the Senate Intelligence Committee cited it numerous times in its recent torture report; and the press frequently makes reference to it. Not only that, but the Central Intelligence Agency’s former top lawyer, John Rizzo, freely discussed it in his recent memoir. According to Rizzo, the September 17 MON is “the most comprehensive, most ambitious, most aggressive, and most risky” legal authorization of the last decade and a half — which is saying something. Rizzo explains that the MON authorizes targeted killings of suspected terrorists by the CIA, and in his new book, Power Wars, Charlie Savage reports that the MON is the original source of the controversial (and legally novel) “continuing and imminent threat” standard the government uses to govern the lethal targeting of individuals outside of recognized battlefields. The MON is also likely to have authorized an end run around the assassination “ban” in Executive Order 12333 — a legal maneuver that is discussed in, but almost entirely redacted from, an earlier OLC analysis of targeted killing.
  • In yesterday’s opinion, the Second Circuit upheld the government’s withholding of a 2002 OLC memorandum that “concerns Executive Order 12333,” which almost certainly analyzes the effect of the September 17 MON, as well as of five other memoranda that “discuss another document that remains entitled to protection.” If indeed that “document” is the MON, it would seem to be yet another case of what the DC Circuit pointedly criticized, in a 2013 opinion, as the granting of judicial “imprimatur to a fiction of deniability that no reasonable person would regard as plausible.” In that case, the DC Circuit went on to quote Justice Frankfurter: “‘There comes a point where … Court[s] should not be ignorant as judges of what [they] know as men’ and women.” Last year, the Second Circuit took that admonishment to heart when it published the July 2010 OLC memorandum. Unfortunately, yesterday, rather than once again opening the country’s eyes to the law our government is applying behind closed doors, the Second Circuit closed its own.
Paul Merrell

Court Accepts DOJ's 'State Secrets' Claim to Protect Shadowy Neocons: a New Low - The I... - 0 views

  • A truly stunning debasement of the U.S. justice system just occurred through the joint efforts of the Obama Justice Department and a meek and frightened Obama-appointed federal judge, Edgardo Ramos, all in order to protect an extremist neocon front group from scrutiny and accountability. The details are crucial for understanding the magnitude of the abuse here. At the center of it is an anti-Iranian group calling itself “United Against Nuclear Iran” (UANI), which is very likely a front for some combination of the Israeli and U.S. intelligence services. When launched, NBC described its mission as waging “economic and psychological warfare” against Iran. The group was founded and is run and guided by a roster of U.S., Israeli and British neocon extremists such as Joe Lieberman, former Bush Homeland Security adviser (and current CNN “analyst”) Fran Townsend, former CIA Director James Woolsey, and former Mossad Director Meir Dagan. One of its key advisers is Olli Heinonen, who just co-authored a Washington Post Op-Ed with former Bush CIA/NSA Director Michael Hayden arguing that Washington is being too soft on Tehran.
  • This group of neocon extremists was literally just immunized by a federal court from the rule of law. That was based on the claim — advocated by the Obama DOJ and accepted by Judge Ramos — that subjecting them to litigation for their actions would risk disclosure of vital “state secrets.” The court’s ruling was based on assertions made through completely secret proceedings between the court and the U.S. government, with everyone else — including the lawyers for the parties — kept in the dark. In May 2013, UANI launched a “name and shame” campaign designed to publicly identify — and malign — any individuals or entities enabling trade with Iran. One of the accused was the shipping company of Greek billionaire Victor Restis, who vehemently denies the accusation. He hired an American law firm and sued UANI for defamation in a New York federal court, claiming the “name and shame” campaign destroyed his reputation.
  • Up until that point, there was nothing unusual about any of this: just a garden-variety defamation case brought in court by someone who claims that public statements made about him are damaging and false. That happens every day. But then something quite extraordinary happened: In September of last year, the U.S. government, which was not a party, formally intervened in the lawsuit, and demanded that the court refuse to hear Restis’s claims and instead dismiss the lawsuit against UANI before it could even start, on the ground that allowing the case to proceed would damage national security. When the DOJ intervened in this case and asserted the “state secrets privilege,” it confounded almost everyone. The New York Times’s Matt Apuzzo noted at the time that “the group is not affiliated with the government, and lists no government contracts on its tax forms. The government has cited no precedent for using the so­-called state­ secrets privilege to quash a private lawsuit that does not focus on government activity.” He quoted the ACLU’s Ben Wizner as saying: “I have never seen anything like this.” Reuters’s Allison Frankel labeled the DOJ’s involvement a “mystery” and said “the government’s brief is maddeningly opaque about its interest in a private libel case.”
  • ...2 more annotations...
  • But in this case, there is no apparent U.S. government conduct at issue in the lawsuit. At least based on what they claim about themselves, UANI is just “a not-for-profit, non-partisan, advocacy group” that seeks to “educate” the public about the dangers of Iran’s nuclear program. Why would such a group like this even possess “state secrets”? It would be illegal to give them such material. Or could it be that the CIA or some other U.S. government agency has created and controls the group, which would be a form of government-disseminated propaganda, which happens to be illegal? What else could explain the basis for the U.S. government’s argument that allowing UANI to be sued would risk the disclosure of vital “state secrets” besides a desire to cover up something quite untoward if not illegal? What “state secrets” could possibly be disclosed by suing a nice, little “not-for-profit, non-partisan, advocacy group”?
  • This sham worked. This week, Judge Ramos issued his ruling dismissing the entire lawsuit (see below). As a result of the DOJ’s protection, UANI cannot be sued. Among other things, it means this group of neocon extremists now has a license to defame anyone they want. They can destroy your reputation with false accusations in a highly public campaign, and when you sue them for it, the DOJ will come in and whisper in the judge’s ear that national security will be damaged if — like everyone else in the world — UANI must answer in a court of law for their conduct. And subservient judicial officials like Judge Ramos will obey the U.S. government’s dictates and dismiss your lawsuit before it begins, without your having any idea why that even happened. Worse, in his written ruling, the judge expressly acknowledges that dismissal of the entire lawsuit at the start on secrecy grounds is what he calls a “harsh sanction,” and also acknowledges that “it is particularly so in this case because Plaintiffs not only do not get their day in court, but cannot be told why” (emphasis added). But he does it anyway, in a perfunctory 18-page opinion that does little other than re-state some basic legal principles, and then just concludes that everything the government whispered in his ear should be accepted.
  •  
    Unless the district court decision is overturned by a higher court, the Restis case looks to be over. The secrecy concerns of the Dark State trump justice, again. It should be noted that the Constitution is silent on the issue of state secrets (the so-called "state secrets privilege" was manufactured from whole cloth by the Supreme Court in the early 1950s). On the other hand, several provisions of the Constitution expressly require that justice be done, not the least of which is the Due Process clause.  
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, C... - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
Paul Merrell

Secret Law Isn't the Public's Fault | Just Security - 0 views

  • Officials in this administration have a funny way of blaming the victim. Did the CIA spy on Senate intelligence committee staffers who were investigating the agency’s torture program? No. OK, yes, you caught us — but the staffers were poking their nose into the CIA’s business. Are communities in some cities suffering from an uptick in crime rates? That must be because they were critical of police practices, and so the police are afraid to do their job. Are American Muslims disproportionately singled out for law enforcement scrutiny? It wouldn’t be necessary if they did a better job of identifying and rooting out the terrorists in their midst. Did a drone strike kill a 16-year-old boy who wasn’t on any target list but happened to be the son of alleged al-Qaeda operative Anwar al-Aulaqi? I guess he “should have had a more responsible father,” as then-White House press secretary Robert Gibbs helpfully explained. At the annual conference of the American Bar Association’s Standing Committee on National Security Law, officials were at it again. Both the CIA’s General Counsel, Caroline Krass, and the acting head of the Justice Department’s Office of Legal Counsel (OLC), Karl Thompson, observed that agencies are issuing fewer requests for formal OLC opinions and are seeking “informal,” unwritten advice from OLC instead. This trend undermines the public’s ability to obtain OLC opinions through FOIA requests. And, according to Krass, we have no one to blame but ourselves:
  • I do think one reason is a focus the office has gotten [in] the past 10 years or so in the public which has now led to Freedom of Information Act requests pretty much anytime the administration adopts a position in the context of domestic law or national security that could be [or] seems a little bit edgy or slightly controversial, immediately the request for the OLC opinion comes. What were we thinking? Well, we might have had in mind OLC officials’ own acknowledgment that their opinions constitute the working law of the executive branch, and are binding on agencies in the same manner that a court’s decision would be. When the public expresses interest in a controversial court opinion, that isn’t cited as a reason to move the judicial system into the shadows. To the contrary, it’s well-understood that the public has a right to know how judges are interpreting the law. That’s true regardless of whether the law deals with the rights and obligations of private parties or (as is usually the case with OLC opinions) the authorities of the government.  It’s high time we stop pretending that OLC opinions are merely attorneys’ advice, and thereby entitled to confidentiality. A private person is free to accept or reject her attorney’s advice. By contrast, as Thompson recognized, OLC opinions — even informal, unwritten ones — are “binding by custom and practice . … People are supposed to and do follow [them].” Moreover, in ordinary circumstances, it is no defense to criminal charges that the defendant’s lawyer gave bad advice. OLC opinions, on the other hand, confer effective immunity, as the Justice Department will not prosecute any official who acted in reliance on OLC’s conclusions.
  • The government nonetheless argues, and many courts have agreed, that OLC opinions are exempt from disclosure under FOIA because they are “deliberative” and “pre-decisional.” This assessment conflates two distinct decisions: the decision of an agency whether to adopt a course of conduct, and OLC’s decision regarding how to interpret the law. The latter decision may be one factor — along with other, non-legal factors, such as political viability, financial cost, and the existence of competing priorities — in the agency’s “deliberations” on the former. The agency ultimately must decide whether to move forward with a policy. But on the question of how the law should be interpreted, it is OLC, not the agency, which has the final word. If the agency were to issue a different legal interpretation, there is no question that OLC’s would take precedence, and the agency would be courting legal jeopardy by adopting a course of action in tension with OLC’s reading of the law. Perhaps the solution is simply to require the government to abide by its own characterization. If OLC opinions are to be given the status of deliberative documents and/or legal advice, so be it; but in that case, they cannot be binding on any agency or official, nor can they mitigate any official’s criminal or civil liability (unless they genuinely negate a required state of mind). If, on the other hand, the government wishes to treat OLC opinions as authoritative and a shield against prosecution or civil suit, then they must be called what they are — law — and made available to the public. Until that happens, the public will remain a victim of secret law, and there will be no one but the administration to blame.
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Paul Merrell

Chicago federal court case raises questions about NSA surveillance - The Washington Post - 0 views

  • Four days before a sweeping government surveillance law was set to expire last year, Sen. Dianne Feinstein, the chairman of the chamber’s Intelligence Committee, took to the Senate floor. She touted the law’s value by listing some of the terrorist attacks it had helped thwart, including “a plot to bomb a downtown Chicago bar” that fall. “So I believe the FISA Amendments Act is important,” the California Democrat said before a vote to extend the 2008 law, “and these cases show the program has worked.”Today, however, the government is refusing to say whether that law was used to develop evidence to charge Adel Daoud, a 19-year-old Chicago man accused of the bomb plot.And Daoud’s lawyers said in a motion filed Friday that the reason is simple. The government, they said, wants to avoid a constitutional challenge to the law, which governs a National Security Agency surveillance program that has once again become the focus of national debate over its reach into Americans’ private communications.“Whenever it is good for the government to brag about its success, it speaks loudly and publicly,” lawyers Thomas Durkin and Joshua Herman wrote in their motion. “When a criminal defendant’s constitutional rights are at stake, however, it quickly and unequivocally clams up under the guise of State Secrets.”
  • Four days before a sweeping government surveillance law was set to expire last year, Sen. Dianne Feinstein, the chairman of the chamber’s Intelligence Committee, took to the Senate floor. She touted the law’s value by listing some of the terrorist attacks it had helped thwart, including “a plot to bomb a downtown Chicago bar” that fall. “So I believe the FISA Amendments Act is important,” the California Democrat said before a vote to extend the 2008 law, “and these cases show the program has worked.”Today, however, the government is refusing to say whether that law was used to develop evidence to charge Adel Daoud, a 19-year-old Chicago man accused of the bomb plot.And Daoud’s lawyers said in a motion filed Friday that the reason is simple. The government, they said, wants to avoid a constitutional challenge to the law, which governs a National Security Agency surveillance program that has once again become the focus of national debate over its reach into Americans’ private communications.“Whenever it is good for the government to brag about its success, it speaks loudly and publicly,” lawyers Thomas Durkin and Joshua Herman wrote in their motion. “When a criminal defendant’s constitutional rights are at stake, however, it quickly and unequivocally clams up under the guise of State Secrets.”
  • If the government acknowledged that it had used evidence derived from the FISA Amendments Act, Daoud would have standing to challenge the law’s constitutionality. Specifically, Daoud’s lawyers would be able to take on a provision known as Section 702. The law permits the interception of foreign targets’ ­e-mails and phone calls without an individual warrant, including when the foreigners are in communication with Americans or legal residents.The U.S. Supreme Court in February rejected a constitutional challenge to Section 702 by a group of journalists, lawyers and human rights advocates, saying they had no standing to sue because they had not proved that their communications had been intercepted.But the court also said that if the government intends to use information derived from the Section 702 surveillance in a prosecution “it must provide advance notice of its intent,” and a defendant may challenge the lawfulness of the surveillance. The government assured the court that it would give such notice to criminal defendants.In a filing this month in Chicago, U.S. Attorney Gary S. Shapiro refused to say whether the evidence was obtained under Section 702. Instead, he said, the government told Daoud the evidence was acquired pursuant to a traditional FISA court order, rather than under the expanded surveillance program authorized in 2008. A traditional order requires the government to go to a FISA judge and show probable cause that the target is an agent of a foreign power.Daoud’s attorneys say in their pleading that the government is being disingenuous. “We believe it is clear that the evidence . . . came from Section 702,” Durkin said in an interview. “Either Senator Feinstein’s information was correct in December 2012, or she was given wrong information. The government has never disputed what she said.”
  • ...1 more annotation...
  • “The most troubling part of the case is the government seems to be trying to hide the ball,” said Alex Abdo, a staff attorney for the American Civil Liberties Union, which argued the Supreme Court case on behalf of the journalists, lawyers and activists. “They told the Supreme Court not to worry about reviewing the FISA Amendments Act because it would get reviewed in a criminal case. They said if they used the evidence in a criminal case, they’d give notice. Now they’re telling criminal defendants they don’t have to tell them. It’s a game of three-card monte with the privacy rights of millions of Americans.”Abdo said the original FISA statute, passed in 1978, requires the government to notify defendants when evidence being used against them is derived from surveillance authorized by the law. The court, he said, should require the government to abide by the law. “Otherwise,” he said, “the most sweeping surveillance program ever enacted by Congress will never be reviewed in public by a court.”Similarly, Stephen I. Vladeck, a law professor at American University, said, “Everyone knows the role that Section 702 is playing in a case like this.” But, he said, “thanks in part to the Supreme Court, the government can use Section 702 and then never have to defend its constitutionality.”
  •  
    Another "sting" type prosecution where the FBI enticed a defendant to perform a terrorist act. But now a direct challenge to government refusal to disclose whether the email that triggered the government's interest in the defendant was unconstitutionally obtained. If so, long established criminal procedure would require that the email and all evidence discovered because of it would have to be excluded from trial unless the government could meet once of the narrow exceptions.    
Paul Merrell

Spying by N.S.A. Ally Entangled U.S. Law Firm - NYTimes.com - 0 views

  • The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: American lawyers. A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. Related Coverage Text: Document Describes Eavesdropping on American Law FirmFEB. 15, 2014 The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. It reports that the N.S.A.’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the American law firm, and offered to share the information.
  • The Australians told officials at an N.S.A. liaison office in Canberra, Australia, that “information covered by attorney-client privilege may be included” in the intelligence gathering, according to the document, a monthly bulletin from the Canberra office. The law firm was not identified, but Mayer Brown, a Chicago-based firm with a global practice, was then advising the Indonesian government on trade issues. On behalf of the Australians, the liaison officials asked the N.S.A. general counsel’s office for guidance about the spying. The bulletin notes only that the counsel’s office “provided clear guidance” and that the Australian agency “has been able to continue to cover the talks, providing highly useful intelligence for interested US customers.” The N.S.A. declined to answer questions about the reported surveillance, including whether information involving the American law firm was shared with United States trade officials or negotiators.
  • Most attorney-client conversations do not get special protections under American law from N.S.A. eavesdropping. Amid growing concerns about surveillance and hacking, the American Bar Association in 2012 revised its ethics rules to explicitly require lawyers to “make reasonable efforts” to protect confidential information from unauthorized disclosure to outsiders.Last year, the Supreme Court, in a 5-to-4 decision, rebuffed a legal challenge to a 2008 law allowing warrantless wiretapping that was brought in part by lawyers with foreign clients they believed were likely targets of N.S.A. monitoring. The lawyers contended that the law raised risks that required them to take costly measures, like traveling overseas to meet clients, to protect sensitive communications. But the Supreme Court dismissed their fears as “speculative.”The N.S.A. is prohibited from targeting Americans, including businesses, law firms and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the N.S.A. does not use the spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada and New Zealand — to skirt the law.
  • ...4 more annotations...
  • The N.S.A.’s protections for attorney-client conversations are narrowly crafted, said Stephen Gillers, an expert on legal ethics at New York University’s School of Law. The agency is barred from sharing with prosecutors intercepted attorney-client communications involving someone under indictment in the United States, according to previously disclosed N.S.A. rules. But the agency may still use or share the information for intelligence purposes. Andrew M. Perlman, a Suffolk University law professor who specializes in legal ethics and technology issues, said the growth of surveillance was troubling for lawyers. He helped create the bar association’s ethics code revisions that require lawyers to try to avoid being overheard by eavesdroppers. “You run out of options very quickly to communicate with someone overseas,” he said. “Given the difficulty of finding anything that is 100 percent secure, lawyers are in a difficult spot to ensure that all of the information remains in confidence.” 
  • Still, the N.S.A. can intercept the communications of Americans if they are in contact with a foreign intelligence target abroad, such as Indonesian officials. The N.S.A. is then required to follow so-called minimization rules to protect their privacy, such as deleting the identity of Americans or information that is not deemed necessary to understand or assess the foreign intelligence, before sharing it with other agencies. An N.S.A. spokeswoman said the agency’s Office of the General Counsel was consulted when issues of potential attorney-client privilege arose and could recommend steps to protect such information. “Such steps could include requesting that collection or reporting by a foreign partner be limited, that intelligence reports be written so as to limit the inclusion of privileged material and to exclude U.S. identities, and that dissemination of such reports be limited and subject to appropriate warnings or restrictions on their use,” said Vanee M. Vines, the spokeswoman.
  • In justifying the agency’s sweeping powers, the Obama administration often emphasizes the N.S.A.’s role in fighting terrorism and cyberattacks, but disclosures in recent months from the documents leaked by Mr. Snowden show the agency routinely spies on trade negotiations, communications of economic officials in other countries and even foreign corporations.
  • Other documents obtained from Mr. Snowden reveal that the N.S.A. shares reports from its surveillance widely among civilian agencies. A 2004 N.S.A. document, for example, describes how the agency’s intelligence gathering was critical to the Agriculture Department in international trade negotiations. “The U.S.D.A. is involved in trade operations to protect and secure a large segment of the U.S. economy,” that document states. Top agency officials “often rely on SIGINT” — short for the signals intelligence that the N.S.A. eavesdropping collects — “to support their negotiations.”
  •  
    Outrageous.
Paul Merrell

Exclusive: U.S. may use secrets act to stop suit against Iran sanctions group | Reuters - 0 views

  • (Reuters) - The U.S. government is considering using a powerful national security law to halt a private lawsuit against a non-profit group, United Against A Nuclear Iran, according to a source familiar with the case. Greek businessman and ship owner Victor Restis last year sued UANI for defamation after the New York-based group, whose advisors include former intelligence officials from the United States, Europe and Israel, accused him of violating sanctions on Iran by exporting oil from the country.Earlier this year, U.S. government lawyers declared their interest in the lawsuit, warning that information related to UANI could jeopardize law enforcement activities.An intervention by the government in a private civil lawsuit is rare, and its use of a privilege under state secrets statutes to clamp down on the case would be a highly unusual move. Other cases where the government has invoked the privilege include lawsuits filed against the National Security Agency in the wake of leaks to journalists by former NSA contractor Edward Snowden.
  • Restis' lawyer, Abbe Lowell, also declined to comment, but pointed to court filings in which he argued that the state secrets privilege could not be used without the government first explaining the true nature of its relationship to UANI.Restis denies doing illegal business with Iran. As part of the lawsuit, his lawyers have demanded that UANI produce whatever evidence it had that Restis was violating the sanctions and explain where it came from.Iran denies Western accusations that it has been seeking the capability to assemble nuclear weapons. Diplomatic talks between Iran and the United States, France, Russia, Britain, China and Germany are expected to resume in September, with the aim of reaching a settlement by Nov. 24 that would scale back Iran's nuclear program in exchange for lifting sanctions. An effort by government lawyers to mediate a settlement between UANI and Restis appears to have failed, the source said.
  • UANI advocates economic pressure on Iran to keep the country from building a nuclear arsenal. One of the group's tactics is to name and shame companies and people who do business in Iran.UANI has a small budget. It spent $1.5 million in 2013, according to its tax filings. The group, however, uses sources such as commercially sold satellite imagery for its campaigns.Among its advisory board members are Meir Dagan, the former director of the Israeli intelligence agency Mossad, and August Hanning, the former director of Germany's Federal Intelligence Service.Its chief executive, Mark Wallace, is also the CEO of Tigris Financial Group, an investment company backed by the billionaire American gold investor Thomas Kaplan. Restis did not originally name Kaplan in the defamation lawsuit, but his lawyer is seeking to depose Kaplan as part of the proceedings.
  • ...2 more annotations...
  • The government and lawyers for UANI have previously sought to delay evidence gathering in the case. UANI lawyers have told the court they could not produce certain documents requested by Restis because they would reveal U.S. government secrets.In March, a Justice Department lawyer wrote to U.S. District Judge Edgardo Ramos, who is presiding over the case in Manhattan, confirming the government's interest and requesting a temporary halt to proceedings while the government decided what to do. Ramos granted the stay, but ordered the government to explain why it wanted the material suppressed.In an April 9 letter, Assistant U.S. Attorney Michael Byars wrote that the material in question could be protected under a privilege designed to prevent the public release of law enforcement techniques, confidential sources, undercover operatives and active investigations. But if it invoked the powerful state secrets privilege, the government would be claiming the information would not only interfere with law enforcement efforts but also jeopardize national security.
  • The government has until Sept. 12 to decide whether to use the state secrets privilege.The privilege can be used to block the release of information in a lawsuit, but the government has also used it to force the dismissal of lawsuits. It is unclear whether the privilege would be applied only to certain information in the Restis case or whether it would cause the case to be closed completely.The case is Restis et al v. American Coalition Against Nuclear Iran Inc, (dba United Against A Nuclear Iran) et al, in U.S. District Court for the Southern District of New York, No. 13-05032.
  •  
    More detail on the very interesting Restis case against UANI. The normal rule is that a privilege, once the privileged information is disclosed to one who is not entitled to the privilege, is deemed waived. So Restis' lawyer is correct in stating that the state secrets privilege cannot be used without the government explaining the true nature of its relationship to UANI, assuming the information was not stolen by UANI. The disclosure is new of UANI having former directors of Israeli and German intelligence services on its advisory board. This case looks like a cyst on the verge of rupturing and spewing forth a whole bunch of Dark Government pus.   
Paul Merrell

Revealed: the top secret rules that allow NSA to use US data without a warrant | World ... - 0 views

  • Fisa court submissions show broad scope of procedures governing NSA's surveillance of Americans' communication• Document one: procedures used by NSA to target non-US persons• Document two: procedures used by NSA to minimise data collected from US persons
  • Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant.The Guardian is publishing in full two documents submitted to the secret Foreign Intelligence Surveillance Court (known as the Fisa court), signed by Attorney General Eric Holder and stamped 29 July 2009. They detail the procedures the NSA is required to follow to target "non-US persons" under its foreign intelligence powers and what the agency does to minimize data collected on US citizens and residents in the course of that surveillance.The documents show that even under authorities governing the collection of foreign intelligence from foreign targets, US communications can still be collected, retained and used.
  • The procedures cover only part of the NSA's surveillance of domestic US communications. The bulk collection of domestic call records, as first revealed by the Guardian earlier this month, takes place under rolling court orders issued on the basis of a legal interpretation of a different authority, section 215 of the Patriot Act.
  •  
    Lots of gruesome detail in the article and even more in the documents. Another major leaked disclosure from the Big Brother secret arm of U.S. government. A cautionary warning: these are merely documents. They are not regulations as that term is understood under the Administrative Procedures Act. There may or may not be one or more secret Executive Orders requiring Agency personnel to adhere to what the documents say.  Even with agencies that are far more open to public scrutiny, it is common for agency staff to ignore regulations and statutes. Every time someone wins a lawsuit pursuant to the combination of the Administrative Procedures Act and some other federal law or regulation, one of the most common types of lawsuits against federal agencies, it is because agency staff violated the law or the regulation. It's a common situation even with agencies that have to operate in the sunlight. An agency allowed to operate without any right of the public to challenge its actions has even less incentive to adhere to its formal procedures.   So particularly with an agency permitted to operate in secret, the existence of these documents does not mean that they get more than an occasional wink and a nod by agency staff. That said, this is pretty gruesome reading for a civil libertarian and is also rife with vagueness, ambiguity, and loopholes. Not surprisingly though for an experienced lawyer; those who deliberately trample on others' rights rarely write written confessions.
Paul Merrell

Britain has passed the 'most extreme surveillance law ever passed in a democracy' | ZDNet - 0 views

  • It's 2016 going on 1984. The UK has just passed a massive expansion in surveillance powers, which critics have called "terrifying" and "dangerous".
  • The new law, dubbed the "snoopers' charter", was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government. Four years and a general election later -- May is now prime minister -- the bill was finalized and passed on Wednesday by both parliamentary houses. But civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government "document everything we do online". It's no wonder, because it basically does. The law will force internet providers to record every internet customer's top-level web history in real-time for up to a year, which can be accessed by numerous government departments; force companies to decrypt data on demand -- though the government has never been that clear on exactly how it forces foreign firms to do that that; and even disclose any new security features in products before they launch.
  • Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens (known as equipment interference), although some protected professions -- such as journalists and medical staff -- are layered with marginally better protections. In other words, it's the "most extreme surveillance law ever passed in a democracy," according to Jim Killock, director of the Open Rights Group. The bill was opposed by representatives of the United Nations, all major UK and many leading global privacy and rights groups, and a host of Silicon Valley tech companies alike. Even the parliamentary committee tasked with scrutinizing the bill called some of its provisions "vague".
  • ...1 more annotation...
  • And that doesn't even account for the three-quarters of people who think privacy, which this law almost entirely erodes, is a human right. There are some safeguards, however, such as a "double lock" system so that the secretary of state and an independent judicial commissioner must agree on a decision to carry out search warrants (though one member of the House of Lords disputed that claim). A new investigatory powers commissioner will also oversee the use of the powers. Despite the uproar, the government's opposition failed to scrutinize any significant amendments and abstained from the final vote. Killock said recently that the opposition Labour party spent its time "simply failing to hold the government to account". But the government has downplayed much of the controversy surrounding the bill. The government has consistently argued that the bill isn't drastically new, but instead reworks the old and outdated Regulation of Investigatory Powers Act (RIPA). This was brought into law in 2000, to "legitimize" new powers that were conducted or ruled on in secret, like collecting data in bulk and hacking into networks, which was revealed during the Edward Snowden affair. Much of those activities were only possible thanks to litigation by one advocacy group, Privacy International, which helped push these secret practices into the public domain while forcing the government to scramble to explain why these practices were legal. The law will be ratified by royal assent in the coming weeks.
Paul Merrell

Court Rebukes White House Over "Secret Law" - Secrecy News - 1 views

  • DC District Judge Ellen Segal Huvelle yesterday ordered the Obama Administration to release a copy of an unclassified presidential directive, and she said the attempt to withhold it represented an improper exercise of “secret law.” The Obama White House has a “limitless” view of its authority to withhold presidential communications from the public, she wrote, but that view is wrong. “The government appears to adopt the cavalier attitude that the President should be permitted to convey orders throughout the Executive Branch without public oversight– to engage in what is in effect governance by ‘secret law’,” Judge Huvelle wrote in her December 17 opinion. “The Court finds equally troubling the government’s complementary suggestion that ‘effective’ governance requires that a President’s substantive and non-classified directives to Executive Branch agencies remain concealed from public scrutiny,” she wrote.
  • The directive in question, Presidential Policy Directive (PPD) 6, “is a widely-publicized, non-classified Presidential Policy Directive on issues of foreign aid and development that has been distributed broadly within the Executive Branch and used by recipient agencies to guide decision-making,” the Judge noted. “Even though issued as a directive, the PPD-6 carries the force of law as policy guidance to be implemented by recipient agencies, and it is the functional equivalent of an Executive Order.” “Never before has a court had to consider whether the [presidential communications] privilege protects from disclosure under FOIA a final, non-classified, presidential directive.”
  • Several significant points emerge from this episode. First, President Obama’s declared commitment to “creating an unprecedented level of openness in Government” has not been internalized even by the President’s own staff. This latest case of “unbounded” secrecy cannot be blamed on the CIA or an overzealous Justice Department attorney. It is entirely an Obama White House production, based on a White House policy choice. Second, and relatedly, it has proved to be an error to expect the executive branch to unilaterally impose transparency on itself. To do so is to ignore, or to wish away, the Administration’s own conflicting interests in secrecy and disclosure.  Instead, it is the role of the other branches of government to check the executive and to compel appropriate disclosure.
  • ...3 more annotations...
  • Significantly, Judge Huvelle insisted on examining the document herself in camera instead of simply relying on the Administration’s characterization of the document.  Having done so, she found that it “is not ‘revelatory of the President’s deliberations’ such that its public disclosure would undermine future decision-making.” She criticized the government for “the unbounded nature” of its claim. “In the government’s view, it can shield from disclosure under FOIA any presidential communication, even those — like the PPD-6 — that carry the force of law, simply because the communication originated with the President…. The Court rejects the government’s limitless approach….”
  • An official Fact Sheet on PPD-6 (which has not yet been released) is available here. The Electronic Privacy Information Center is currently pursuing release of another presidential directive, the Bush Administration’s NSPD-54 on cyber security. In October, Judge Beryl Howell unexpectedly ruled that that directive was exempt from disclosure because, she said, it was not an “agency record” that would be subject to the FOIA.  Her opinion came as a surprise and was not persuasive to everyone. In a footnote in yesterday’s ruling, Judge Huvelle said that the arguments over the two directives were sufficiently distinguishable that “this Court need not decide if it will follow Judge Howell’s rationale”– suggesting that if pressed, she might not have done so.  Yesterday, EPIC filed a notice of its intent to appeal the decision.
  • DC District Judge Ellen Segal Huvelle yesterday ordered the Obama Administration to release a copy of an unclassified presidential directive, and she said the attempt to withhold it represented an improper exercise of “secret law.” The Obama White House has a “limitless” view of its authority to withhold presidential communications from the public, she wrote, but that view is wrong. “The government appears to adopt the cavalier attitude that the President should be permitted to convey orders throughout the Executive Branch without public oversight– to engage in what is in effect governance by ‘secret law’,” Judge Huvelle wrote in her December 17 opinion. “The Court finds equally troubling the government’s complementary suggestion that ‘effective’ governance requires that a President’s substantive and non-classified directives to Executive Branch agencies remain concealed from public scrutiny,” she wrote.
  •  
    Outrageous. I read the court's opinion. This happened only because: [i] federal judges are reluctant to impose sanctions on government attorneys; and [ii] government attorneys know that. In all my years of legal practice, I read only one court opinion where an assistant U.S. attorney was sanctioned and instead of the normal sanction of paying the other side's attorney fees and expenses of litigation, the judge just awarded a $500 sanction. That is also why litigating against the Feds is such a chore; you spend half your time shooting down blatantly implausible arguments. That's far less of a problem when facing attorneys who are in private practice. But so much for Obama's "transparency" platform; this was the result of the Obama Administration itself asserting a preposterous privilege claim supported only by ridiculous arguments, no more than a delaying action.  
Paul Merrell

Court Views State Secrets Too Narrowly, Govt Says - 0 views

  • The scope of the state secrets privilege is again a matter of contention, as government attorneys in an ongoing lawsuit told a judge last week that he had construed the privilege too narrowly. Is the state secrets privilege applicable only to discrete items of evidence whose disclosure can be shown to harm the Nation? Or can the privilege be invoked more broadly based on the “context” in which litigation occurs? The proper parameters of the state secrets privilege have never been defined in statute, and so these questions recur. In a pending lawsuit concerning the constitutionality of the “no fly” list (Gulet Mohamed v. Eric Holder), the presiding judge has taken a distinctly skeptical view of the government’s use of the state secrets privilege. Judge Anthony J. Trenga of the Eastern District of Virginia last fall denied a government motion to dismiss the case on state secrets grounds (Secrecy News,10/31/14), and he concluded that the government’s claim of privilege to withhold 28 specified documents was inadequately justified.
  • In other words, the government seems to say here, the state secrets privilege has no limiting principle by which it can be circumscribed and objectively constrained. The State Secrets Protection Act, a bill repeatedly introduced in Congress but never enacted into law, would have made clear that “the state secrets privilege is an evidentiary rule, not a justiciability rule, and can only be asserted with respect to items of evidence that plaintiffs seek in discovery or intend to disclose in litigation.” It would also have set “a standard of review designed to give appropriate respect to the executive branch’s institutional expertise and constitutional role, without undermining the judge’s duty to make an independent determination on each privilege claim.” Essentially, according to a 2008 Senate report, “the bill rejects the  expansion of the state secrets privilege into any manner of justiciability doctrine, and demands that it be applied as a purely evidentiary privilege.” But in the absence of legislative action, the asserted scope of the privilege continues to drift.
Paul Merrell

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
Paul Merrell

NSA 'secret backdoor' paved way to U.S. phone, e-mail snooping | Politics and Law - CNE... - 0 views

  • The National Security Agency created a "secret backdoor" so its massive databases could be searched for the contents of U.S. citizens' confidential phone calls and e-mail messages without a warrant, according to the latest classified documents leaked by Edward Snowden. A report in the Guardian on Friday quoted Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence Committee, as saying the secret rule offers a loophole allowing "warrantless searches for the phone calls or emails of law-abiding Americans." That appears to confirm what Rep. Jerrold Nadler, a New York Democrat, said in June after receiving a classified briefing from administration officials a few days earlier on the extent of the NSA's domestic surveillance operations. If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he had been told during the briefing. "I was rather startled," said Nadler, an attorney who serves on the House Judiciary Committee.
  • FBI Director Robert Mueller responded by assuring Nadler, according to a transcript of the hearing, that to "listen to the phone," the government would need "a particularized order" from the Foreign Intelligence Surveillance Court -- a claim that is contradicted by today's Guardian report and other documents. Mueller has been succeeded by James Comey, who was confirmed last month by the Senate. In response to a CNET article at the time, Director of National Intelligence James Clapper released a statement saying: "The statement that a single analyst can eavesdrop on domestic communications without proper legal authorization is incorrect and was not briefed to Congress." Clapper never elaborated, however, on what "proper" authorization would be. Today's top-secret document leaked by Snowden reveals that "procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data."
  • FAA 702 is a reference to section 702 of a 2008 law that amended the Foreign Intelligence Surveillance Act. Those amendments created a warrantless surveillance process that could be employed by NSA analysts, but Congress never intended it to be used domestically against American citizens: A congressional report accompanying the law claimed it allows electronic surveillance only of "persons located outside the United States in order to acquire foreign intelligence information." In reality, though, the Obama Justice Department has devised secret interpretations of FAA 702 carving out loopholes in what were intended to be strict privacy safeguards. One loophole revealed in June shows that NSA, CIA, and FBI analysts are granted broad access to data vacuumed up by the world's most powerful intelligence agency -- but are supposed to follow certain "targeting" and "minimization" procedures to limit the number of Americans who become individual targets of warrantless surveillance.
  • ...2 more annotations...
  • Today's disclosures appear to be at odds with what President Obama has said over the last two months in defense of NSA surveillance. "What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails," Obama has said. Earlier reports have indicated that the NSA has the ability to record nearly all domestic and international phone calls -- in case an analyst needed to access the recordings in the future. A Wired magazine article last year disclosed that the NSA has established "listening posts" that allow the agency to collect and sift through billions of phone calls through a massive new data center in Utah, "whether they originate within the country or overseas." That includes not just metadata, but also the contents of the communications.
  • AT&T and other telecommunications companies that allow the NSA to tap into their fiber links receive absolute immunity from civil liability or criminal prosecution, thanks to Section 702 of the FISA Amendments Act, which Congress renewed in 2012. It says that any civil lawsuit "against any person for providing assistance to an element of the intelligence community...shall be promptly dismissed." Section 702 of the law says surveillance may be authorized by the attorney general and director of national intelligence without prior approval by the secret Foreign Intelligence Surveillance Court -- in practice, this means analysts at the NSA and other agencies with intelligence functions -- as long as minimization requirements and general procedures blessed by the court are followed. It's unclear whether the court has approved the "secret backdoor" allowing Americans' e-mail and phone messages to be targeted for domestic surveillance.
Paul Merrell

Inside the Battle Over the CIA Torture Report - Bloomberg View - 0 views

  • After months of internal wrangling, the Senate Intelligence Committee is finally set to release its report on President George W. Bush-era CIA practices, which among other details will contain information about foreign countries that aided in the secret detention and interrogation of suspected terrorists. Several U.S. officials told us that the negotiations are nearly complete between the Central Intelligence Agency and the committee's Democratic staff, which prepared the classified 6,300-page report and its 600-page, soon-to-be-released declassified executive summary. Dianne Feinstein, the committee's chairman, is set to release the summary early next week. Her staff members had objected vigorously to hundreds of redactions the CIA had proposed in the executive summary. After an often-contentious process to resolve the disputes, managed by top White House officials, Feinstein was able to roll back the majority of the disputed CIA redactions.
  • Among the most significant of Feinstein’s victories, the report will retain information on countries that aided the CIA program by hosting black sites or otherwise participating in the secret rendition of suspected terrorists. The countries will not be identified by name, but in other ways, such as code names like “Country A.” This falls short of Feinstein’s original desire, which was to name the countries explicitly, but represents a big victory for the committee nonetheless. In a victory for the CIA, Feinstein reluctantly agreed to allow the redactions of the pseudonyms of agency personnel mentioned in the report. The CIA maintained that any reference to individuals working under cover that offered clues to their identities could place them in harm’s way. “We need to understand the role that particular countries played across time. Even having pseudonyms for countries in the report is important for a full accounting,” said Raha Wala, senior counsel at Human Rights First, which advocated on behalf of the report’s declassification.
  • The CIA and some Republican senators had argued that even such masked identifications could be deciphered, leading to compromised relationships with those countries’ governments. In June 2013, the top intelligence official at the State Department, Philip Goldberg, wrote a classified letter to Congress warning against the disclosure of the names of countries who had participated in the program.
  • ...4 more annotations...
  • John Rizzo, who served as the CIA's acting general counsel during the black-site program and later wrote a memoir, "Company Man," said the agency has long fought against declassifying any information on the locations of the secret prisons overseas. "That was something we had fought for years and years," Rizzo told us. "Up to now one of the only remaining classified facts about the program was the names of countries where there were black sites." Rizzo said the concern about even referencing the locations of the black sites is that one could piece together the locations with other information that is likely to be in the final public report. One Republican Senate staffer familiar with the negotiations over the report said Feinstein's office relented on some concerns about redacting information that could identify countries hosting the black sites. "Do you scrub enough information to prevent that information from being released?" the staffer said. "It ended up as a half-step in-between, some of the stuff she wanted released and some of the information identifying the countries has been redacted."
  • There is also a risk that any information about foreign countries that aided the CIA programs, even using code names,  could be matched against public reporting that already exists to make them more identifiable. There have been news reports about cooperation by the governments of Poland,  Lithuania, Romania, Thailand and others. "Just because something is leaked doesn’t mean it’s still not secret," Rizzo said. "A national security secret is still a national security secret until the government says otherwise."
  • Originally there had been bipartisan support for the majority staff’s investigation, and the committee’s Republican staff was initially part of the investigation -- but it withdrew early in the process. Even after the Republican staff disowned the investigation, some Republican senators continued to support declassification, including John McCain and Lindsey Graham.
  • The release will not include internal CIA documents that the agency accused Feinstein’s staff of improperly removing from a CIA facility that had been set up for the investigators to work at. Feinstein said that her staff had removed the documents, including a review by Panetta, only after CIA officials tried to surreptitiously remove them from computers being used by the committee’s staff. “What was unique and interesting about the internal documents was not their classification level, but rather their analysis and acknowledgement of significant CIA wrongdoing,” Feinstein said on the Senate floor in July. “The interrogations and the conditions of confinement at the CIA detention sites were far different and far more harsh than the way the CIA had described them to us.”
  •  
    Nations that knowingly hosted the CIA "black sites" won't be named, as though their own citizens should be deprived of that information. I still maintain that there would be no need for redacting CIA agents' names who participated in the torture if they were named in criminal complaints as they are required to be by the Convention Against Torture, which -- through the Constitution's Treaty Clause, is "the law of this land." 
1 - 20 of 378 Next › Last »
Showing 20 items per page