Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged test-case

Rss Feed Group items tagged

Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit ... - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Gary Edwards

The obscure legal system that lets corporations sue countries | Claire Provost and Matt... - 0 views

  • Every year on 15 September, thousands of Salvadorans celebrate the date when much of Central America gained independence from Spain. Fireworks are set off and marching bands parade through villages across the country. But, last year, in the town of San Isidro, in Cabañas, the festivities had a markedly different tone. Hundreds had gathered to protest against the mine. Gold mines often use cyanide to separate gold from ore, and widespread concern over already severe water contamination in El Salvador has helped fuel a powerful movement determined to keep the country’s minerals in the ground. In the central square, colourful banners were strung up, calling on OceanaGold to drop its case against the country and leave the area. Many were adorned with the slogan, “No a la mineria, Si a la vida” (No to mining, Yes to life). On the same day, in Washington DC, Parada gathered his notes and shuffled into a suite of nondescript meeting rooms in the World Bank’s J building, across the street from its main headquarters on Pennsylvania Avenue. This is the International Centre for the Settlement of Investment Disputes (ICSID): the primary institution for handling the cases that companies file against sovereign states. (The ICSID is not the sole venue for such cases; there are similar forums in London, Paris, Hong Kong and the Hague, among others.) The date of the hearing was not a coincidence, Parada said. The case has been framed in El Salvador as a test of the country’s sovereignty in the 21st century, and he suggested that it should be heard on Independence Day. “The ultimate question in this case,” he said, “is whether a foreign investor can force a government to change its laws to please the investor as opposed to the investor complying with the laws they find in the country.”
  • Most international investment treaties and free-trade deals grant foreign investors the right to activate this system, known as investor-state dispute settlement (ISDS), if they want to challenge government decisions affecting their investments. In Europe, this system has become a sticking point in negotiations over the controversial Transatlantic Trade and Investment Partnership (TTIP) deal proposed between the European Union and the US, which would massively extend its scope and power and make it harder to challenge in the future. Both France and Germany have said that they want access to investor-state dispute settlement removed from the TTIP treaty currently under discussion. Investors have used this system not only to sue for compensation for alleged expropriation of land and factories, but also over a huge range of government measures, including environmental and social regulations, which they say infringe on their rights. Multinationals have sued to recover money they have already invested, but also for alleged lost profits and “expected future profits”. The number of suits filed against countries at the ICSID is now around 500 – and that figure is growing at an average rate of one case a week. The sums awarded in damages are so vast that investment funds have taken notice: corporations’ claims against states are now seen as assets that can be invested in or used as leverage to secure multimillion-dollar loans. Increasingly, companies are using the threat of a lawsuit at the ICSID to exert pressure on governments not to challenge investors’ actions.
  • “I had absolutely no idea this was coming,” Parada said. Sitting in a glass-walled meeting room in his offices, at the law firm Foley Hoag, he paused, searching for the right word to describe what has happened in his field. “Rogue,” he decided, finally. “I think the investor-state arbitration system was created with good intentions, but in practice it has gone completely rogue.”
  • ...13 more annotations...
  • The quiet village of Moorburg in Germany lies just across the river from Hamburg. Past the 16th-century church and meadows rich with wildflowers, two huge chimneys spew a steady stream of thick, grey smoke into the sky. This is Kraftwerk Moorburg, a new coal-fired power plant – the village’s controversial next-door neighbour. In 2009, it was the subject of a €1.4bn investor-state case filed by Vattenfall, the Swedish energy giant, against the Federal Republic of Germany. It is a prime example of how this powerful international legal system, built to protect foreign investors in developing countries, is now being used to challenge the actions of European governments as well. Since the 1980s, German investors have sued dozens of countries, including Ghana, Ukraine and the Philippines, at the World Bank’s Centre in Washington DC. But with the Vattenfall case, Germany found itself in the dock for the first time. The irony was not lost on those who considered Germany to be the grandfather of investor-state arbitration: it was a group of German businessmen, in the late 1950s, who first conceived of a way to protect their overseas investments as a wave of developing countries gained independence from European colonial powers. Led by Deutsche Bank chairman Hermann Abs, they called their proposal an “international magna carta” for private investors.
  • In the 1960s, the idea was taken up by the World Bank, which said that such a system could help the world’s poorer countries attract foreign capital. “I am convinced,” the World Bank president George Woods said at the time, “that those … who adopt as their national policy a welcome [environment] for international investment – and that means, to mince no words about it, giving foreign investors a fair opportunity to make attractive profits – will achieve their development objectives more rapidly than those who do not.” At the World Bank’s 1964 annual meeting in Tokyo, it approved a resolution to set up a mechanism for handling investor-state cases. The first line of the ICSID Convention’s preamble sets out its goal as “international cooperation for economic development”. There was sharp opposition to this system from its inception, with a bloc of developing countries warning that it would undermine their sovereignty. A group of 21 countries – almost every Latin American country, plus Iraq and the Philippines – voted against the proposal in Tokyo. But the World Bank moved ahead regardless. Andreas Lowenfeld, an American legal academic who was involved in some of these early discussions, later remarked: “I believe this was the first time that a major resolution of the World Bank had been pressed forward with so much opposition.”
  • now governments are discovering, too late, the true price of that confidence. The Kraftwerk Moorburg plant was controversial long before the case was filed. For years, local residents and environmental groups objected to its construction, amid growing concern over climate change and the impact the project would have on the Elbe river. In 2008, Vattenfall was granted a water permit for its Moorburg project, but, in response to local pressure, local authorities imposed strict environmental conditions to limit the utility’s water usage and its impact on fish. Vattenfall sued Hamburg in the local courts. But, as a foreign investor, it was also able to file a case at the ICSID. These environmental measures, it said, were so strict that they constituted a violation of its rights as guaranteed by the Energy Charter Treaty, a multilateral investment agreement signed by more than 50 countries, including Sweden and Germany. It claimed that the environmental conditions placed on its permit were so severe that they made the plant uneconomical and constituted acts of indirect expropriation.
  • With the rapid growth in these treaties – today there are more than 3,000 in force – a specialist industry has developed in advising companies how best to exploit treaties that give investors access to the dispute resolution system, and how to structure their businesses to benefit from the different protections on offer. It is a lucrative sector: legal fees alone average $8m per case, but they have exceeded $30m in some disputes; arbitrators’ fees at start at $3,000 per day, plus expenses.
  • Vattenfall v Germany ended in a settlement in 2011, after the company won its case in the local court and received a new water permit for its Moorburg plant – which significantly lowered the environmental standards that had originally been imposed, according to legal experts, allowing the plant to use more water from the river and weakening measures to protect fish. The European Commission has now stepped in, taking Germany to the EU Court of Justice, saying its authorisation of the Moorburg coal plant violated EU environmental law by not doing more to reduce the risk to protected fish species, including salmon, which pass near the plant while migrating from the North Sea. A year after the Moorburg case closed, Vattenfall filed another claim against Germany, this time over the federal government’s decision to phase out nuclear power. This second suit – for which very little information is available in the public domain, despite reports that the company is seeking €4.7bn from German taxpayers – is still ongoing. Roughly one third of all concluded cases filed at the ICSID are recorded as ending in “settlements”, which – as the Moorburg dispute shows – can be very profitable for investors, though their terms are rarely fully disclosed.
  • “It was a total surprise for us,” the local Green party leader Jens Kerstan laughed, in a meeting at his sunny office in Hamburg last year. “As far as I knew, there were some [treaties] to protect German companies in the [developing] world or in dictatorships, but that a European company can sue Germany, that was totally a surprise to me.”
  • While a tribunal cannot force a country to change its laws, or give a company a permit, the risk of massive damages may in some cases be enough to persuade a government to reconsider its actions. The possibility of arbitration proceedings can be used to encourage states to enter into meaningful settlement negotiations.
  • A small number of countries are now attempting to extricate themselves from the bonds of the investor-state dispute system. One of these is Bolivia, where thousands of people took to the streets of the country’s third-largest city, Cochabamba, in 2000, to protest against a dramatic hike in water rates by a private company owned by Bechtel, the US civil engineering firm. During the demonstrations, the Bolivian government stepped in and terminated the company’s concession. The company then filed a $50m suit against Bolivia at the ICSID. In 2006, following a campaign calling for the case to be thrown out, the company agreed to accept a token payment of less than $1. After this expensive case, Bolivia cancelled the international agreements it had signed with other states giving their investors access to these tribunals. But getting out of this system is not easily done. Most of these international agreements have sunset clauses, under which their provisions remain in force for a further 10 or even 20 years, even if the treaties themselves are cancelled.
  • There are now thousands of international investment agreements and free-trade acts, signed by states, which give foreign companies access to the investor-state dispute system, if they decide to challenge government decisions. Disputes are typically heard by panels of three arbitrators; one selected by each side, and the third agreed upon by both parties. Rulings are made by majority vote, and decisions are final and binding. There is no appeals process – only an annulment option that can be used on very limited grounds. If states do not pay up after the decision, their assets are subject to seizure in almost every country in the world (the company can apply to local courts for an enforcement order).
  • While there is no equivalent of legal aid for states trying to defend themselves against these suits, corporations have access to a growing group of third-party financiers who are willing to fund their cases against states, usually in exchange for a cut of any eventual award.
  • Increasingly, these suits are becoming valuable even before claims are settled. After Rurelec filed suit against Bolivia, it took its case to the market and secured a multimillion-dollar corporate loan, using its dispute with Bolivia as collateral, so that it could expand its business. Over the last 10 years, and particularly since the global financial crisis, a growing number of specialised investment funds have moved to raise money through these cases, treating companies’ multimillion-dollar claims against states as a new “asset class”.
  • El Salvador has already spent more than $12m defending itself against Pacific Rim, but even if it succeeds in beating the company’s $284m claim, it may never recover these costs. For years Salvadoran protest groups have been calling on the World Bank to initiate an open and public review of ICSID. To date, no such study has been carried out. In recent years, a number of ideas have been mooted to reform the international investor-state dispute system – to adopt a “loser pays” approach to costs, for example, or to increase transparency. The solution may lie in creating an appeals system, so that controversial judgments can be revisited.
  • Brazil has never signed up to this system – it has not entered into a single treaty with these investor-state dispute provisions – and yet it has had no trouble attracting foreign investment.
  •  
    "Luis Parada's office is just four blocks from the White House, in the heart of K Street, Washington's lobbying row - a stretch of steel and glass buildings once dubbed the "road to riches", when influence-peddling became an American growth industry. Parada, a soft-spoken 55-year-old from El Salvador, is one of a handful of lawyers in the world who specialise in defending sovereign states against lawsuits lodged by multinational corporations. He is the lawyer for the defence in an obscure but increasingly powerful field of international law - where foreign investors can sue governments in a network of tribunals for billions of dollars. Fifteen years ago, Parada's work was a minor niche even within the legal business. But since 2000, hundreds of foreign investors have sued more than half of the world's countries, claiming damages for a wide range of government actions that they say have threatened their profits. In 2006, Ecuador cancelled an oil-exploration contract with Houston-based Occidental Petroleum; in 2012, after Occidental filed a suit before an international investment tribunal, Ecuador was ordered to pay a record $1.8bn - roughly equal to the country's health budget for a year. (Ecuador has logged a request for the decision to be annulled.) Parada's first case was defending Argentina in the late 1990s against the French conglomerate Vivendi, which sued after the Argentine province of Tucuman stepped in to limit the price it charged people for water and wastewater services. Argentina eventually lost, and was ordered to pay the company more than $100m. Now, in his most high-profile case yet, Parada is part of the team defending El Salvador as it tries to fend off a multimillion-dollar suit lodged by a multinational mining company after the tiny Central American country refused to allow it to dig for gold."
Paul Merrell

Ebola? How Do You Know, WHO and CDC? | nsnbc international - 0 views

  • There is something perversely strange about the entire hoopla around the so-called Ebola outbreaks. An African man is admitted to a Dallas hospital with symptoms, treated, released and re-admitted, the “first” case of Ebola in the USA. What the guardians of truth in the mainstream media never ask is how reliable is the test that determines if someone has Ebola.
  • One courageous scientist who did question the Gallo HIV-AIDS hypothesis was Kary Mullis, who in 1996 wrote, “The HIV/AIDS hypothesis is one hell of a mistake.” Mullis won the Nobel Prize in chemistry in 1993. His devastating comments were ignored by the ever-vigilant mainstream media and medical profession. In 1983 Gallo arbitrarily transformed correlation into causality and said he had discovered the “virus” causing acquired immunodeficiency or AID, which was then named a “syndrome,” or AIDS. Gallo had just before that announcement won a patent for the only known test to determine of someone had AIDS. An habitual user of certain drugs like amyl nitrite or poppers, or even a pregnant woman would show HIV-positive with the Gallo test. Fears of a new global plague were stoked in the media by irresponsible scientists. Gallo sold his AIDS test to five pharmaceutical companies and sat back to reap the royalties. The Ebola Test
  • Can the PCR blood test tell how much Ebola virus is in a person’s body? The same Kary Mullis cited above regarding the HIV/AIDS hypothesis invented the PCR test in 1983, the basis on which his Nobel Prize was awarded. He told journalist John Lauritsen years back of his test and warned against its misuse. Lauritsen reported: With regard to the viral-load tests, which attempt to use PCR for counting viruses, Mullis has stated: “Quantitative PCR is an oxymoron.” PCR is intended to identify substances qualitatively, but by its very nature is unsuited for estimating numbers. Although there is a common misimpression that the viral-load tests actually count the number of viruses in the blood, these tests cannot detect free, infectious viruses at all; they can only detect proteins that are believed, in some cases wrongly, to be unique to HIV. The tests can detect genetic sequences of viruses, but not viruses themselves.
  • ...2 more annotations...
  • Now we are again reading similar terrorizing stories in the mass media, this time about Ebola–fears stoked by the pharma-industry-controlled WHO in Geneva under Director General Margaret Chan’s Scientific Advisory Group of Experts and their ties to Big Pharma giants, and the US Government Centers for Disease Control in Atlanta. What exactly is the Ebola test that is being used by doctors or health workers in Sierre Leone or Liberia to “prove” Ebola in a sick person? When the African man was re-hospitalized in Dallas, the head of the CDC, Tom Frieden, declared the patient was diagnosed with Ebola based on a test that is “highly accurate. It’s a PCR test of blood.” But that PCR test of blood is not highly accurate. Rather it is highly flawed. As Jon Rappoport points out, “Among the problems of the PCR test is that it is open to errors. Is the sample taken from the patient actually a virus or a piece of a virus? Or is just an irrelevant piece of debris? Another problem is inherent in the method of the PCR itself. The test is based on the amplification of a tiny, tiny speck of genetic material taken from a patient—blowing it up millions of times until it can be observed and analyzed. Researchers who employ the test claim that, as a result of the procedure, they can also infer the quantity of virus that is present in the patient. This is crucial, because unless a patient has millions and millions of Ebola virus in his body, there is absolutely no reason to think he is sick or will become sick.”
  • Nor can the Mullis PCR test count the number of Ebola viruses in a person’s blood. Yet the CDC claims, wrongly according to Mullis, that it can. Can it be that the entire Ebola fear campaign launched by Chan’s WHO and the CDC is based on fiction and a pharmaceutical industry ready to jab millions with their untested “Ebola vaccines”?
Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Paul Merrell

Spies and internet giants are in the same business: surveillance. But we can stop them ... - 0 views

  • On Tuesday, the European court of justice, Europe’s supreme court, lobbed a grenade into the cosy, quasi-monopolistic world of the giant American internet companies. It did so by declaring invalid a decision made by the European commission in 2000 that US companies complying with its “safe harbour privacy principles” would be allowed to transfer personal data from the EU to the US. This judgment may not strike you as a big deal. You may also think that it has nothing to do with you. Wrong on both counts, but to see why, some background might be useful. The key thing to understand is that European and American views about the protection of personal data are radically different. We Europeans are very hot on it, whereas our American friends are – how shall I put it? – more relaxed.
  • Given that personal data constitutes the fuel on which internet companies such as Google and Facebook run, this meant that their exponential growth in the US market was greatly facilitated by that country’s tolerant data-protection laws. Once these companies embarked on global expansion, however, things got stickier. It was clear that the exploitation of personal data that is the core business of these outfits would be more difficult in Europe, especially given that their cloud-computing architectures involved constantly shuttling their users’ data between server farms in different parts of the world. Since Europe is a big market and millions of its citizens wished to use Facebook et al, the European commission obligingly came up with the “safe harbour” idea, which allowed companies complying with its seven principles to process the personal data of European citizens. The circle having been thus neatly squared, Facebook and friends continued merrily on their progress towards world domination. But then in the summer of 2013, Edward Snowden broke cover and revealed what really goes on in the mysterious world of cloud computing. At which point, an Austrian Facebook user, one Maximilian Schrems, realising that some or all of the data he had entrusted to Facebook was being transferred from its Irish subsidiary to servers in the United States, lodged a complaint with the Irish data protection commissioner. Schrems argued that, in the light of the Snowden revelations, the law and practice of the United States did not offer sufficient protection against surveillance of the data transferred to that country by the government.
  • The Irish data commissioner rejected the complaint on the grounds that the European commission’s safe harbour decision meant that the US ensured an adequate level of protection of Schrems’s personal data. Schrems disagreed, the case went to the Irish high court and thence to the European court of justice. On Tuesday, the court decided that the safe harbour agreement was invalid. At which point the balloon went up. “This is,” writes Professor Lorna Woods, an expert on these matters, “a judgment with very far-reaching implications, not just for governments but for companies the business model of which is based on data flows. It reiterates the significance of data protection as a human right and underlines that protection must be at a high level.”
  • ...2 more annotations...
  • This is classic lawyerly understatement. My hunch is that if you were to visit the legal departments of many internet companies today you would find people changing their underpants at regular intervals. For the big names of the search and social media worlds this is a nightmare scenario. For those of us who take a more detached view of their activities, however, it is an encouraging development. For one thing, it provides yet another confirmation of the sterling service that Snowden has rendered to civil society. His revelations have prompted a wide-ranging reassessment of where our dependence on networking technology has taken us and stimulated some long-overdue thinking about how we might reassert some measure of democratic control over that technology. Snowden has forced us into having conversations that we needed to have. Although his revelations are primarily about government surveillance, they also indirectly highlight the symbiotic relationship between the US National Security Agency and Britain’s GCHQ on the one hand and the giant internet companies on the other. For, in the end, both the intelligence agencies and the tech companies are in the same business, namely surveillance.
  • And both groups, oddly enough, provide the same kind of justification for what they do: that their surveillance is both necessary (for national security in the case of governments, for economic viability in the case of the companies) and conducted within the law. We need to test both justifications and the great thing about the European court of justice judgment is that it starts us off on that conversation.
Paul Merrell

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
Paul Merrell

Victory! Federal Court Recognizes Constitutional Rights of Americans on the No-Fly List... - 0 views

  • A federal court took a critically important step late yesterday towards placing a check on the government's secretive No-Fly List. In a 38-page ruling in Latif v. Holder, the ACLU's challenge to the No-Fly List, U.S. District Court Judge Anna Brown recognized that the Constitution applies when the government bans Americans from the skies. She also asked for more information about the current process for getting off the list, to inform her decision on whether that procedure violates the Fifth Amendment guarantee of due process. We represent 13 Americans, including four military veterans, who are blacklisted from flying. At oral argument in June on motions for partial summary judgment, we asked the court to find that the government violated our clients' Fifth Amendment right to due process by barring them from flying over U.S. airspace – and smearing them as suspected terrorists – without giving them any after-the-fact explanation or a hearing at which to clear their names. The court's opinion recognizes – for the first time – that inclusion on the No-Fly List is a draconian sanction that severely impacts peoples' constitutionally-protected liberties. It rejected the government's argument that No-Fly list placement was merely a restriction on the most "convenient" means of international travel.
  • Such an argument ignores the numerous reasons an individual may have for wanting or needing to travel overseas quickly such as for the birth of a child, the death of a loved one, a business opportunity, or a religious obligation. According to the court, placement on the No-Fly List is like the revocation of a passport because both actions severely burden the right to international travel and give rise to a constitutional right to procedural due process: Here it is undisputed that inclusion on the No-Fly List completely bans listed persons from boarding commercial flights to or from the United States or over United States air space.  Thus, Plaintiffs have shown their placement on the No-Fly List has in the past and will in the future severely restrict Plaintiffs' ability to travel internationally. Moreover, the realistic implications of being on the No-Fly List are potentially far-reaching. For example, TSC [the Terrorist Screening Center] shares watchlist information with 22 foreign governments and United States Customs and Boarder [sic] Protection makes recommendations to ship captains as to whether a passenger poses a risk to transportation security, which can result in further interference with an individual's ability to travel as evidenced by some Plaintiffs' experiences as they attempted to travel abroad by boat and land and were either turned away or completed their journey only after an extraordinary amount of time, expense, and difficulty. Accordingly, the Court concludes on this record that Plaintiffs have a constitutionally-protected liberty interest in traveling internationally by air, which is affected by being placed on the list. The court also found that the government's inclusion of our clients on the No-Fly List smeared them as suspected terrorists and altered their ability to lawfully board planes, resulting in injury to another constitutionally-protected right: freedom from reputational harm.
  • The importance of these rulings is clear. Because inclusion on the No-Fly List harms our clients' liberty interests in travel and reputation, due process requires the government to provide them an explanation and a hearing to correct the mistakes that led to their inclusion. But under the government's "Glomar" policy, it refuses to provide any information confirming or denying that our clients are on the list, let alone an after-the-fact explanation and hearing. The court has asked the ACLU and the government for more information about the No-Fly List redress procedure to help it decide the ultimate question of whether that system violates the Fifth Amendment right to due process. We are confident the court will recognize that the government's "Glomar" policy of refusing even to confirm or deny our clients' No-Fly List status (much less actually providing the reasons for their inclusion in the list) is fundamentally unfair and unconstitutional.
  •  
    A case decision in August that I had missed, right here in Oregon. One of our Oregon federal judges gets it right after being reversed the first time by the 9th U.S. Circuit Court of Appeals. I've read the opinion. Looks quite solid. Plaintiffs were carefully chosen for this test case, 13 citizens placed on the no-fly list, all with compelling stories of winding up stranded, some overseas. Several are U.S. military veterans. All were told by government officials that the reason they could not board was because they were on the TSA no-fly list. At issue is whether they have a right to be informed of the information that resulted in them being placed on the no-fly list and a right to a hearing to seek correction of the information. Their constitutional interest in their reputations is also in play, since they have been classified by their government as too dangerous to allow to travel by commercial airline.   The district court case is not done; the judge has ordered further briefing on some issues. But the government is trying to defend a process in which no one is ever formally notified that they are on the no-fly list and is never advised of the reasons they are on the no-fly list. The number of Americans on the no-fly list is now over 700,000. But the judge has recognized that there is a constitutional right to travel and that it extends to international travel. From the opinion: "Plaintiffs contend the government has deprived them of their protected liberty interest in travel. In Kent v. Dulles, 357 U.S. 116 (1958), the Supreme Court held "[t]he right to travel is part of the 'liberty' of which the citizen cannot be deprived without due process of law under the Fifth Amendment."  Id. at 125. As noted by the Ninth Circuit, "the [Supreme] Court has consistently treated the right to international travel as a liberty interest that is protected by the Due Process Clause of the Fifth Amendment." DeNieva v. Reyes, 966 F.2d 480, 485 (9th Cir. 1992)(emp
Paul Merrell

Branstad Announces New Division Designed to Help Wrongly Convicted People | whotv.com - 0 views

  • “One of the things that is exciting about this is, if we are able to identify any cases in which those mistakes were made, that hair should be under glass somewhere,” said Iowa State Public Defender Adam Gregg. "We could be able to use DNA technology in order to test those hairs and find out whether they got the right person, and if they didn’t, then we will have the post-conviction relief process in order to correct that mistake." About 100 cases involving hair comparison have been flagged for review. The Wrongful Conviction Division is part of the Office of the State Public Defender's Office. It will work with the Division of Criminal Investigation, the Iowa Innocence Project and the Midwest Innocence Project.
  • Governor Branstad announced he's launching a new division designed to help people who are wrongly convicted of crimes. “We also know in a system operated by humans, mistakes can be made including wrongful convictions,” Branstad said. The Wrongful Conviction Division will focus on hair comparison analysis. The FBI recently admitted to serious errors in testimony on those tests, many times overstating how close hair from a crime scene matched a defendant. The FBI trains the Iowa Division of Criminal Investigation on hair analysis methods, so the Public Defender's Office wants to review cases where hair comparison analysis was used. They’re looking at cases from 1980-2000, which was a time when DNA analysis wasn't widely used.
  • “One of the things that is exciting about this is, if we are able to identify any cases in which those mistakes were made, that hair should be under glass somewhere,” said Iowa State Public Defender Adam Gregg. "We could be able to use DNA technology in order to test those hairs and find out whether they got the right person, and if they didn’t, then we will have the post-conviction relief process in order to correct that mistake."
  • ...1 more annotation...
  • “One of the things that is exciting about this is, if we are able to identify any cases in which those mistakes were made, that hair should be under glass somewhere,” said Iowa State Public Defender Adam Gregg. "We could be able to use DNA technology in order to test those hairs and find out whether they got the right person, and if they didn’t, then we will have the post-conviction relief process in order to correct that mistake."
  •  
    This should be happening in evry state and court in which the FBI lab's false hair sample testing results may have been used to convict anyone. And it should have happened in all those jurisdictions as soon as the FBI lab scandal was discovered. See https://www.washingtonpost.com/local/crime/fbi-overstated-forensic-hair-matches-in-nearly-all-criminal-trials-for-decades/2015/04/18/39c8d8c6-e515-11e4-b510-962fcfabc310_story.html
Paul Merrell

Obama's "War on Ebola" or War for Oil? Sending 3000 Troops to African "Ebola" Areas tha... - 0 views

  • For a Nobel Peace Prize President, Barack Obama seems destined to go down in history books as the President who presided over one of the most aggressive series of wars ever waged by a bellicose Washington Administration. Not even George Bush and Dick Cheney came close.
  • Now Obama’s advisers, no doubt led by the blood-thirsty National Security Adviser, Susan Rice, have come up with a new war. This is the War Against Ebola. On September 16, President Obama solemnly declared the war. He announced, to the surprise of most sane citizens, that he had ordered 3,000 American troops, the so-called “boots on the ground” that the Pentagon refuses to agree to in Syria, to wage a war against….a virus? In a carefully stage-managed appearance at the US Centers for Disease Control (CDC), Obama read a bone-chilling speech. He called the alleged Ebola outbreaks in west Africa, “a global threat, and it demands a truly global response. This is an epidemic that is not just a threat to regional security. It’s a potential threat to global security, if these countries break down, if their economies break down, if people panic,” Obama continued, conjuring images that would have made Andromeda Strain novelist Michael Chrichton drool with envy. Obama added, “That has profound effects on all of us, even if we are not directly contracting the disease. This outbreak is already spiraling out of control.”
  • With that hair-raising introduction, the President of the world’s greatest Superpower announced his response. In his role as Commander-in-Chief of the United States of America announced he has ordered 3,000 US troops to west Africa in what he called, “the largest international response in the history of the CDC.” He didn’t make clear if their job would be to shoot the virus wherever it reared its ugly head, or to shoot any poor hapless African suspected of having Ebola. Little does it matter that the US military doesn’t have anywhere near 3,000 troops with the slightest training in public health. Before we all panic and line up to receive the millions of doses of untested and reportedly highly dangerous “Ebola vaccines” the major drug-makers are preparing to dump on the market, some peculiarities of this Ebola outbreak in Africa are worth noting.
  • ...6 more annotations...
  • A major problem for Chan and her backers, however, is that her Ebola statistics are very, very dubious. For those whose memory is short, this is the same Dr Margaret Chan at WHO in Geneva who was guilty in 2009 of trying to panic the world into taking unproven vaccines for “Swine Flu” influenza, by declaring a Global Pandemic with statistics calling every case of symptoms that of the common cold to be “Swine Flu,” whether it was runny nose, coughing, sneezing, sore throat. That changed WHO definition of Swine Flu allowed the statistics of the disease to be declared Pandemic. It was an utter fraud, a criminal fraud Chan carried out, wittingly or unwittingly (she could be simply stupid but evidence suggests otherwise), on behalf of the major US and EU pharmaceutical cartel. In a recent Washington Post article it was admitted that sixty-nine percent of all the Ebola cases in Liberia registered by WHO have not been laboratory confirmed through blood tests. Liberia is the epicenter of the Ebola alarm in west Africa. More than half of the alleged Ebola deaths, 1,224, and nearly half of all cases, 2,046, have been in Liberia says WHO. And the US FDA diagnostic test used for the lab confirmation of Ebola is so flawed that the FDA has prohibited anyone from claiming they are safe or effective. That means, a significant proportion of the remaining 31 % of the Ebola cases lab confirmed through blood tests could be false cases.
  • Then the official WHO Ebola Fact Sheet dated September, 2014, states, “It can be difficult to distinguish EVD from other infectious diseases such as malaria, typhoid fever and meningitis.” Excuse me, Dr Margaret Chan, can you say that slowly? It can be difficult to distinguish EVD from other infectious diseases such as malaria, typhoid fever and meningitis? And you admit that 69% of the declared cases have never been adequately tested? And you state that the Ebola symptoms include “sudden onset of fever fatigue, muscle pain, headache and sore throat. This is followed by vomiting, diarrhea, rash, symptoms of impaired kidney and liver function, and in some cases, both internal and external bleeding”? In short it is all the most vague and unsubstantiated basis that lies behind President Obama’s new War on Ebola.
  • One striking aspect of this new concern of the US President for the situation in Liberia and other west African states where alleged surges of Ebola are being claimed is the presence of oil, huge volumes of untapped oil. The offshore coast of Liberia and east African ‘Ebola zones’ conveniently map with the presence of vast untapped oil and gas resources shown here The issue of oil in west Africa, notably in the waters of the Gulf of Guinea have become increasingly strategic both to China who is roaming the world in search of future secure oil import sources, and the United States, whose oil geo-politics was summed up in a quip by then Secretary of State Henry Kissinger in the 1970’s: ‘If you control the oil, you control entire nations.’
  • The Obama Administration and Pentagon policy has continued that of George W. Bush who in 2008 created the US military Africa Command or AFRICOM, to battle the rapidly-growing Chinese economic presence in Africa’s potential oil-rich countries. West Africa is a rapidly-emerging oil treasure, barely tapped to date. A US Department of Energy study projected that African oil production would rise 91 percent between 2002 and 2025, much from the region of the present Ebola alarm. Chinese oil companies are all over Africa and increasingly active in west Africa, especially Angola, Sudan and Guinea, the later in the epicenter of Obama’s new War on Ebola troop deployment.
  • If the US President were genuine about his concern to contain a public health emergency, he could look at the example of that US-declared pariah Caribbean nation, Cuba. Reuters reports that the Cuban government, a small financially distressed, economically sanctioned island nation of 11 million people, with a national budget of $50 billion, Gross Domestic Product of 121 billion and per capita GDP of just over $10,000, is dispatching 165 medical personnel to Africa to regions where there are Ebola outbreaks. Washington sends 3,000 combat troops. Something smells very rotten around the entire Ebola scare.
  • F. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine “New Eastern Outlook”
Paul Merrell

Veterans Used In Secret Experiments Sue Military For Answers : NPR - 0 views

  • American service members used in chemical and biological testing have some questions: What exactly were they exposed to? And how is it affecting their health? Tens of thousands of troops were used in testing conducted by the U.S. military between 1922 and 1975. As one Army scientist explained, the military wanted to learn how to induce symptoms such as "fear, panic, hysteria, and hallucinations" in enemy soldiers. Recruitment was done on a volunteer basis, but the details of the testing and associated risks were often withheld from those who signed up. Many of the veterans who served as test subjects have since died. But today, those who are still alive are part of a class action lawsuit against the Army. If they're successful, the Army will have to explain to anyone who was used in testing exactly what substances they were given and any known risks. The Army would also have to provide those veterans with health care for any illnesses that result, in whole or in part, from the testing.
  • The law firm representing the veterans estimates at least 70,000 troops were used in the testing, including World War II veterans exposed to mustard gas, whom NPR reported on earlier this summer.
  • The Department of Justice is representing the Army in the case and declined to comment for this story. In June, an appeals court ruled in favor of the veterans. On Friday, the Army filed for a rehearing.
Paul Merrell

Poland asks European court to hide CIA secret torture prison case from public - RT News - 0 views

  • Poland has asked the European Court of Human Rights to bar media and public presence during an upcoming hearing on Poland’s complicity with the CIA’s “extraordinary rendition” program that delivered terror suspects to secret prisons around the world. The public hearing in Strasbourg, France, scheduled for Dec. 3, will be the first arguments testing allegations that the Polish government allowed the CIA to operate a jail for supposed Al-Qaeda fighters in Poland. The request for a private hearing “will be examined by the court shortly,” a court spokesperson told Reuters. Poland cited national security concerns as to why it wants the hearing to remain confidential.
  • "We should have the right to review this case in public," said Adam Bodnar, vice president of the Warsaw-based Helsinki Foundation for Human Rights. "I do not see a reason for confidentiality of proceedings." Bodnar added that most of the evidence about the alleged CIA jail is already public, and keeping it secret is pointless now. His organization was instrumental in uncovering evidence of Poland’s cooperation with the agency.
  • The European Court of Human Rights (ECHR) case was brought by lawyers for Abu Zubaydah and Abd al-Rahim al-Nashiri, both now detainees waiting for charges at Guantanamo Bay.
  • ...2 more annotations...
  • The men allege they were kidnapped and held by the CIA at an intelligence training facility near Stare Kiejkuty, in northeast Poland. There, suspects “were subjected to enforced disappearance and tortured between 2002 and 2005,” Amnesty International said. Nashiri claims that while at the Polish site, he was subjected to torture, or “enhanced interrogation techniques,” and other harsh treatments, “such as ‘mock execution’ with a gun and threats of sexual assault against his family members,” Amnesty reported. Zubaydah was waterboarded 83 times in one month while in secret CIA detention.
  • Hosting such a secret prison violates the European Convention on Human Rights and the UN Convention Against Torture, both of which all European Union member states are bound to follow.
  •  
    I'll be surprised if the gag order is granted. The European Court of Human Rights has already handled a prior case involving CIA extraordinary rendition of a German citizen, holding the former Yugoslavian Republic of Macedonia liable for collaboration. That case was handled publicly and its public decision stands as a milestone indictment of the CIA's methods of waging War on Terror. http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-115621  
Paul Merrell

Civil Rights Coalition files FCC Complaint Against Baltimore Police Department for Ille... - 0 views

  • This week the Center for Media Justice, ColorOfChange.org, and New America’s Open Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network—and are doing so in a way that has a disproportionate impact on communities of color. Stingrays operate by mimicking a cell tower and directing all cellphones in a given area to route communications through the Stingray instead of the nearby tower. They are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship. Stingrays can also be configured to capture the content of communications. Because Stingrays operate on the same spectrum as cellular networks but are not actually transmitting communications the way a cell tower would, they interfere with cell phone communications within as much as a 500 meter radius of the device (Baltimore’s devices may be limited to 200 meters). This means that any important phone call placed or text message sent within that radius may not get through. As the complaint notes, “[d]epending on the nature of an emergency, it may be urgently necessary for a caller to reach, for example, a parent or child, doctor, psychiatrist, school, hospital, poison control center, or suicide prevention hotline.” But these and even 911 calls could be blocked.
  • The Baltimore Police Department could be among the most prolific users of cell site simulator technology in the country. A Baltimore detective testified last year that the BPD used Stingrays 4,300 times between 2007 and 2015. Like other law enforcement agencies, Baltimore has used its devices for major and minor crimes—everything from trying to locate a man who had kidnapped two small children to trying to find another man who took his wife’s cellphone during an argument (and later returned it). According to logs obtained by USA Today, the Baltimore PD also used its Stingrays to locate witnesses, to investigate unarmed robberies, and for mysterious “other” purposes. And like other law enforcement agencies, the Baltimore PD has regularly withheld information about Stingrays from defense attorneys, judges, and the public. Moreover, according to the FCC complaint, the Baltimore PD’s use of Stingrays disproportionately impacts African American communities. Coming on the heels of a scathing Department of Justice report finding “BPD engages in a pattern or practice of conduct that violates the Constitution or federal law,” this may not be surprising, but it still should be shocking. The DOJ’s investigation found that BPD not only regularly makes unconstitutional stops and arrests and uses excessive force within African-American communities but also retaliates against people for constitutionally protected expression, and uses enforcement strategies that produce “severe and unjustified disparities in the rates of stops, searches and arrests of African Americans.”
  • Adding Stingrays to this mix means that these same communities are subject to more surveillance that chills speech and are less able to make 911 and other emergency calls than communities where the police aren’t regularly using Stingrays. A map included in the FCC complaint shows exactly how this is impacting Baltimore’s African-American communities. It plots hundreds of addresses where USA Today discovered BPD was using Stingrays over a map of Baltimore’s black population based on 2010 Census data included in the DOJ’s recent report:
  • ...2 more annotations...
  • The Communications Act gives the FCC the authority to regulate radio, television, wire, satellite, and cable communications in all 50 states, the District of Columbia and U.S. territories. This includes being responsible for protecting cellphone networks from disruption and ensuring that emergency calls can be completed under any circumstances. And it requires the FCC to ensure that access to networks is available “to all people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.” Considering that the spectrum law enforcement is utilizing without permission is public property leased to private companies for the purpose of providing them next generation wireless communications, it goes without saying that the FCC has a duty to act.
  • But we should not assume that the Baltimore Police Department is an outlier—EFF has found that law enforcement has been secretly using stingrays for years and across the country. No community should have to speculate as to whether such a powerful surveillance technology is being used on its residents. Thus, we also ask the FCC to engage in a rule-making proceeding that addresses not only the problem of harmful interference but also the duty of every police department to use Stingrays in a constitutional way, and to publicly disclose—not hide—the facts around acquisition and use of this powerful wireless surveillance technology.  Anyone can support the complaint by tweeting at FCC Commissioners or by signing the petitions hosted by Color of Change or MAG-Net.
  •  
    An important test case on the constitutionality of stingray mobile device surveillance.
clausonlaw22

How Much Does Mental Health Disability Pay In 2023 - 0 views

  •  
    How Much Does Mental Health Disability Pay In 2023 Social Security Disability Insurance (SSDI or SSD) is the sole source of income for millions of Americans who are unable to work due to a non-work-related injury or illness. SSDI benefits are available only to workers and former workers with a substantial employment history. Both physical and mental disabilities are covered under the Social Security Act. While SSDI pays the same benefits for qualifying mental impairments as it does for physical impairments, the amount each individual receives in benefits depends on their history of earnings. This blog post will explain how Social Security defines qualifying disabilities, including mental impairments, and determines each individual's benefit payment. At The Clauson Law Firm, we know how important it is for every disability applicant and benefit recipient to understand how their benefits are arrived at, what affects their continued benefits, and how their benefits can change over time. Contact Clauson Law today if you have questions about qualifying for SSDI benefits or need help filing a claim or appealing a denial. We've helped thousands of disabled people across the U.S. with their disability claims. Mental Impairments And Social Security Disability More than 40% of SSD cases in the United States have some mental health or intellectual impairment as a component in the claim. Mental health impairments can result from an almost unlimited array of circumstances, including traumatic stress; depression; genetic predisposition to depression, bipolar disorder, or schizophrenia; or traumatic brain injury (TBI); one of the many forms of dementia; and others. The ways in which mental impairments affect the person suffering can often interfere with their ability to perform work on a regular basis. These are discussed in detail in the section "Common Mental Disabilities that May Qualify for SSDI" below. But first, let's look at how you qualify for SSD benefits and how you
  •  
    How Much Does Mental Health Disability Pay In 2023
Paul Merrell

NSA grapples with huge increase in records requests - 0 views

  • Fueled by the Edward Snowden scandal, more Americans than ever are asking the National Security Agency if their personal life is being spied on.And the NSA has a very direct answer for them: Tough luck, we're not telling you.Americans are inundating the NSA with open-records requests, leading to an 888% increase in such inquiries in the past fiscal year. Anyone asking is getting a standard pre-written letter saying the NSA can neither confirm nor deny that any information has been gathered."This was the largest spike we've ever had," said Pamela Phillips, the chief of the NSA Freedom of Information Act and Privacy Act Office, which handles all records requests to the agency. "We've had requests from individuals who want any records we have on their phone calls, their phone numbers, their e-mail addresses, their IP addresses, anything like that."
  • News reports of the NSA's surveillance program motivates most inquirers, she said.During the first quarter of the NSA's last fiscal year, which went from October to December 2012, it received 257 open-records requests. The next quarter, it received 241. However, on June 6, at the end of NSA's third fiscal quarter, news of Snowden's leaks hit the press, and the agency got 1,302 requests.In the next three months, the NSA received 2,538 requests. The spike has continued into the fall months and has overwhelmed her staff, Phillips said
  • The first court challenge to the federal government's mass surveillance of Americans' phone and Internet records opened Monday with two potential strikes against it, but the judge predicted it could go all the way to the Supreme Court.Federal District Court Judge Richard Leon expressed concern that conservative activist Larry Klayman and others lacked standing to bring the case and that his court lacked jurisdiction -- factors that could further insulate the spy programs from public oversight."To me, this is the overarching question," Leon said, referring to "this court's authority or lack thereof to inject itself into this situation."
  • ...3 more annotations...
  • The two programs, made public earlier this year by Edward Snowden, a former National Security Agency contractor now living in Russia, are reviewed by a top-secret court under the Foreign Intelligence Surveillance Act. But challengers from the political right and left are trying to have that court's periodic approvals circumvented.From the right on Monday came Klayman, a former Reagan administration lawyer who leads the advocacy group Freedom Watch. In an hour-long hearing, he called Leon "the last guard ... the last sentry to the tyranny in this country."But Justice Department lawyer James Gilligan said Klayman lacked standing to bring the case because he cannot prove the NSA examined his phone or Internet records. Gilligan also said Leon cannot review the statutory authority granted by Congress under FISA -- only the secret courts and the Supreme Court have that power.
  • Coincidentally, the Supreme Court on Monday turned down a chance to review the NSA's harvesting of Verizon phone records in a case brought by the watchdog group Electronic Privacy Information Center. The justices offered no reason for their decision.The law "makes it very difficult to challenge these determinations,' said Marc Rotenberg, president of the privacy group.Another challenge, brought by the American Civil Liberties Union, will be heard by U.S. District Court Judge William Pauley in Manhattan on Friday. Those two cases are likely to be appealed "upstairs," Leon said -- to appeals courts and possibly the Supreme Court.Both Klayman and the ACLU are seeking preliminary injunctions that would put a halt to the NSA surveillance. Both have targeted a program that sweeps up domestic telephone records, even though the targets are foreign terrorists. Klayman also is challenging a separate program that goes after cellphone and computer data from major wireless companies and Internet service providers.
  • Amnesty International and a coalition of lawyers, journalists and others brought the last Supreme Court challenge to government surveillance programs in 2012. But in February, the justices ruled 5-4 that the challengers lacked standing because they could not prove they had been wiretapped.Even if judges rule against Klayman and the ACLU, the controversial programs may get a full court test because the Justice Department has begun notifying criminal defendants whose arrests were based on warrantless surveillance. That makes the prospect of a future Supreme Court case more likely.
Paul Merrell

Israel Sued in US over Flotilla Attacks. Civil Law Suit against the State of Israel | G... - 0 views

  • Four people, including three Americans, have filed a civil suit against the state of Israel, seeking compensatory damages for injuries suffered during an attack aboard a U.S. ship in international waters during the year 2010. At a Washington press conference, Tuesday, the plaintiffs said they wanted compensation for “the harm and distress, injuries and losses caused by the attack”. Israel has refused to acknowledge responsibility and liability for the attack and is yet to pay compensation to victims aboard the Challenger I, which was part of a Freedom Flotilla set to deliver humanitarian aid and medical supplies to the Gaza Strip, which was and still remains under an Israeli blockade. According to the complaint, the U.S. ship has never been returned by Israel and is still being held there. Israeli special forces stormed the ships and killed nine civilians aboard another ship in the flotilla, the Turkish Mavi Marmara. That event has since frozen relations between Israel and Turkey. That case was referred to the International Criminal Court by the Union of the Comoros because the Turkish vessel was sailing under its flag.
  • The family of a 19-year old American-Turkish national, Furkan Dogan, who was killed in the Mavi Marmara raid, last October, sued former Israeli Defense Minister Ehud Barak on war crimes charges. The latest lawsuit filed Monday is the first U.S. case brought against Israel relating to the Freedom Flotilla. The plaintiffs and their attorneys spoke to Anadolu Agency, following a press conference that announced the suit: “States are generally immune from suit in United States courts. But that immunity is waived in a number of circumstances. When agents of foreign governments commit wrongful acts in the United States that cause personal injury, and egregious acts against U.S. nationals anywhere in the world, they are not entitled to immunity,” said lawyer Steven Schneebaum. He noted that both exceptions apply to the facts of Challenger I case because a U.S. flagged ship falls under U.S. jurisdiction. The case is ground-breaking as it relies on an exception in American law that allows lawsuits to be brought against foreign states, in limited cases.
  • According to professor Ralph Steinhardt, a member of the plaintiffs’ legal team, Israel’s sovereignty does not allow it to attack American flagged civilian ships and attack those on it. “The attack on Challenger I was a patent violation of international law, including the laws of war, human rights, and the law of the sea,” according to the George Washington University international law professor. A UK-based international lawyer representing the plaintiffs, Sir Geoffrey Nice, described the case against Israel as “a real test” for the rule of international law. “This case, alongside the others, the one in the International Criminal Court and the one in California would have the following very clear political outcome: If Israel has enjoyed special privileged status of impunity because of protection by the United State of America, then that impunity is on the way out,” he said.
Paul Merrell

Microsoft to host data in Germany to evade US spying | Naked Security - 0 views

  • Microsoft's new plan to keep the US government's hands off its customers' data: Germany will be a safe harbor in the digital privacy storm. Microsoft on Wednesday announced that beginning in the second half of 2016, it will give foreign customers the option of keeping data in new European facilities that, at least in theory, should shield customers from US government surveillance. It will cost more, according to the Financial Times, though pricing details weren't forthcoming. Microsoft Cloud - including Azure, Office 365 and Dynamics CRM Online - will be hosted from new datacenters in the German regions of Magdeburg and Frankfurt am Main. Access to data will be controlled by what the company called a German data trustee: T-Systems, a subsidiary of the independent German company Deutsche Telekom. Without the permission of Deutsche Telekom or customers, Microsoft won't be able to get its hands on the data. If it does get permission, the trustee will still control and oversee Microsoft's access.
  • Microsoft CEO Satya Nadella dropped the word "trust" into the company's statement: Microsoft’s mission is to empower every person and every individual on the planet to achieve more. Our new datacenter regions in Germany, operated in partnership with Deutsche Telekom, will not only spur local innovation and growth, but offer customers choice and trust in how their data is handled and where it is stored.
  • On Tuesday, at the Future Decoded conference in London, Nadella also announced that Microsoft would, for the first time, be opening two UK datacenters next year. The company's also expanding its existing operations in Ireland and the Netherlands. Officially, none of this has anything to do with the long-drawn-out squabbling over the transatlantic Safe Harbor agreement, which the EU's highest court struck down last month, calling the agreement "invalid" because it didn't protect data from US surveillance. No, Nadella said, the new datacenters and expansions are all about giving local businesses and organizations "transformative technology they need to seize new global growth." But as Diginomica reports, Microsoft EVP of Cloud and Enterprise Scott Guthrie followed up his boss’s comments by saying that yes, the driver behind the new datacenters is to let customers keep data close: We can guarantee customers that their data will always stay in the UK. Being able to very concretely tell that story is something that I think will accelerate cloud adoption further in the UK.
  • ...2 more annotations...
  • Microsoft and T-Systems' lawyers may well think that storing customer data in a German trustee data center will protect it from the reach of US law, but for all we know, that could be wishful thinking. Forrester cloud computing analyst Paul Miller: To be sure, we must wait for the first legal challenge. And the appeal. And the counter-appeal. As with all new legal approaches, we don’t know it is watertight until it is challenged in court. Microsoft and T-Systems’ lawyers are very good and say it's watertight. But we can be sure opposition lawyers will look for all the holes. By keeping data offshore - particularly in Germany, which has strong data privacy laws - Microsoft could avoid the situation it's now facing with the US demanding access to customer emails stored on a Microsoft server in Dublin. The US has argued that Microsoft, as a US company, comes under US jurisdiction, regardless of where it keeps its data.
  • Running away to Germany isn't a groundbreaking move; other US cloud services providers have already pledged expansion of their EU presences, including Amazon's plan to open a UK datacenter in late 2016 that will offer what CTO Werner Vogels calls "strong data sovereignty to local users." Other big data operators that have followed suit: Salesforce, which has already opened datacenters in the UK and Germany and plans to open one in France next year, as well as new EU operations pledged for the new year by NetSuite and Box. Can Germany keep the US out of its datacenters? Can Ireland? Time, and court cases, will tell.
  •  
    The European Community's Court of Justice decision in the Safe Harbor case --- and Edward Snowden --- are now officially downgrading the U.S. as a cloud data center location. NSA is good business for Europeans looking to displace American cloud service providers, as evidenced by Microsoft's decision. The legal test is whether Microsoft has "possession, custody, or control" of the data. From the info given in the article, it seems that Microsoft has done its best to dodge that bullet by moving data centers to Germany and placing their data under the control of a European company. Do ownership of the hardware and profits from their rent mean that Microsoft still has "possession, custody, or control" of the data? The fine print of the agreement with Deutsche Telekom and the customer EULAs will get a thorough going over by the Dept. of Justice for evidence of Microsoft "control" of the data. That will be the crucial legal issue. The data centers in Germany may pass the test. But the notion that data centers in the UK can offer privacy is laughable; the UK's legal authority for GCHQ makes it even easier to get the data than the NSA can in the U.S.  It doesn't even require a court order. 
Paul Merrell

Trump's 'Wag the Dog' Moment - Consortiumnews - 0 views

  • Just two days after news broke of an alleged poison-gas attack in northern Syria, President Trump brushed aside advice from some U.S. intelligence analysts doubting the Syrian regime’s guilt and launched a lethal retaliatory missile strike against a Syrian airfield.
  • Trump immediately won plaudits from Official Washington, especially from neoconservatives who have been trying to wrestle control of his foreign policy away from his nationalist and personal advisers since the days after his surprise victory on Nov. 8. There is also an internal dispute over the intelligence. On Thursday night, Secretary of State Rex Tillerson said the U.S. intelligence community assessed with a “high degree of confidence” that the Syrian government had dropped a poison gas bomb on civilians in Idlib province. But a number of intelligence sources have made contradictory assessments, saying the preponderance of evidence suggests that Al Qaeda-affiliated rebels were at fault, either by orchestrating an intentional release of a chemical agent as a provocation or by possessing containers of poison gas that ruptured during a conventional bombing raid. One intelligence source told me that the most likely scenario was a staged event by the rebels intended to force Trump to reverse a policy, announced only days earlier, that the U.S. government would no longer seek “regime change” in Syria and would focus on attacking the common enemy, Islamic terror groups that represent the core of the rebel forces.
  • The source said the Trump national security team split between the President’s close personal advisers, such as nationalist firebrand Steve Bannon and son-in-law Jared Kushner, on one side and old-line neocons who have regrouped under National Security Adviser H.R. McMaster, an Army general who was a protégé of neocon favorite Gen. David Petraeus. White House Infighting In this telling, the earlier ouster of retired Gen. Michael Flynn as national security adviser and this week’s removal of Bannon from the National Security Council were key steps in the reassertion of neocon influence inside the Trump presidency. The strange personalities and ideological extremism of Flynn and Bannon made their ousters easier, but they were obstacles that the neocons wanted removed. Though Bannon and Kushner are often presented as rivals, the source said, they shared the belief that Trump should tell the truth about Syria, revealing the Obama administration’s CIA analysis that a fatal sarin gas attack in 2013 was a “false-flag” operation intended to sucker President Obama into fully joining the Syrian war on the side of the rebels — and the intelligence analysts’ similar beliefs about Tuesday’s incident. Instead, Trump went along with the idea of embracing the initial rush to judgment blaming Assad for the Idlib poison-gas event. The source added that Trump saw Thursday night’s missile assault as a way to change the conversation in Washington, where his administration has been under fierce attack from Democrats claiming that his election resulted from a Russian covert operation. If changing the narrative was Trump’s goal, it achieved some initial success with several of Trump’s fiercest neocon critics, such as neocon Senators John McCain and Lindsey Graham, praising the missile strike, as did Israeli Prime Minister Benjamin Netanyahu. The neocons and Israel have long sought “regime change” in Damascus even if the ouster of Assad might lead to a victory by Islamic extremists associated with Al Qaeda and/or the Islamic State.
  • ...6 more annotations...
  • Trump employing a “wag the dog” strategy, in which he highlights his leadership on an international crisis to divert attention from domestic political problems, is reminiscent of President Bill Clinton’s threats to attack Serbia in early 1999 as his impeachment trial was underway over his sexual relationship with intern Monica Lewinsky. (Clinton also was accused of a “wag-the-dog” strategy when he fired missiles at supposed Al Qaeda bases in Afghanistan and Sudan in 1998 in retaliation for the bombing of U.S. embassies in Kenya and Tanzania.)
  • Trump’s advisers, in briefing the press on Thursday night, went to great lengths to highlight Trump’s compassion toward the victims of the poison gas and his decisiveness in bombing Assad’s military in contrast to Obama’s willingness to allow the intelligence community to conduct a serious review of the evidence surrounding the 2013 sarin-gas case. Ultimately, Obama listened to his intelligence advisers who told him there was no “slam-dunk” evidence implicating Assad’s regime and he pulled back from a military strike at the last minute – while publicly maintaining the fiction that the U.S. government was certain of Assad’s guilt. In both cases – 2013 and 2017 – there were strong reasons to doubt Assad’s responsibility. In 2013, he had just invited United Nations inspectors into Syria to investigate cases of alleged rebel use of chemical weapons and thus it made no sense that he would launch a sarin attack in the Damascus suburbs, guaranteeing that the U.N. inspectors would be diverted to that case. Similarly, now, Assad’s military has gained a decisive advantage over the rebels and he had just scored a major diplomatic victory with the Trump administration’s announcement that the U.S. was no longer seeking “regime change” in Syria. The savvy Assad would know that a chemical weapon attack now would likely result in U.S. retaliation and jeopardize the gains that his military has achieved with Russian and Iranian help. The counter-argument to this logic – made by The New York Times and other neocon-oriented news outlets – essentially maintains that Assad is a crazed barbarian who was testing out his newfound position of strength by baiting President Trump. Of course, if that were the case, it would have made sense that Assad would have boasted of his act, rather than deny it.
  • Alarm within the U.S. intelligence community about Trump’s hasty decision to attack Syria reverberated from the Middle East back to Washington, where former CIA officer Philip Giraldi reported hearing from his intelligence contacts in the field that they were shocked at how the new poison-gas story was being distorted by Trump and the mainstream U.S. news media.
  • Giraldi told Scott Horton’s Webcast: “I’m hearing from sources on the ground in the Middle East, people who are intimately familiar with the intelligence that is available who are saying that the essential narrative that we’re all hearing about the Syrian government or the Russians using chemical weapons on innocent civilians is a sham.” Giraldi said his sources were more in line with an analysis postulating an accidental release of the poison gas after an Al Qaeda arms depot was hit by a Russian airstrike. “The intelligence confirms pretty much the account that the Russians have been giving … which is that they hit a warehouse where the rebels – now these are rebels that are, of course, connected with Al Qaeda – where the rebels were storing chemicals of their own and it basically caused an explosion that resulted in the casualties. Apparently the intelligence on this is very clear.” Giraldi said the anger within the intelligence community over the distortion of intelligence to justify Trump’s military retaliation was so great that some covert officers were considering going public. “People in both the agency [the CIA] and in the military who are aware of the intelligence are freaking out about this because essentially Trump completely misrepresented what he already should have known – but maybe he didn’t – and they’re afraid that this is moving toward a situation that could easily turn into an armed conflict,” Giraldi said before Thursday night’s missile strike. “They are astonished by how this is being played by the administration and by the U.S. media.”
  • Regarding this week’s events, Trump’s desperation to reverse his negative media coverage and the dubious evidence blaming Assad for the Idlib incident could fit with the “Wag the Dog” movie from 1997 in which an embattled president creates a phony foreign crisis in Albania.
  • In the movie, the White House operation is a cynical psychological operation to convince the American people that innocent Albanian children, including an attractive girl carrying a cat, are in danger when, In reality, the girl was an actor posing before a green screen that allowed scenes of fiery ruins to be inserted as background. Today, because Trump and his administration are now committed to convincing Americans that Assad really was responsible for Tuesday’s poison-gas tragedy, the prospects for a full and open investigation are effectively ended. We may never know if there is truth to those allegations or whether we are being manipulated by another “wag the dog” psyop.
Gary Edwards

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • “What constitutes due process in this case is a due process in war.”
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
Paul Merrell

FBI Flouts Obama Directive to Limit Gag Orders on National Security Letters - The Inter... - 0 views

  • Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run around the Fourth Amendment since 2001 has been something called a National Security Letter. FBI agents can demand that an Internet service provider, telephone company or financial institution turn over its records on any number of people — without any judicial review whatsoever — simply by writing a letter that says the information is needed for national security purposes. The FBI at one point was cranking out over 50,000 such letters a year; by the latest count, it still issues about 60 a day. The letters look like this:
  • Recipients are legally required to comply — but it doesn’t stop there. They also aren’t allowed to mention the order to anyone, least of all the person whose data is being searched. Ever. That’s because National Security Letters almost always come with eternal gag orders. Here’s that part:
  • That means the NSL process utterly disregards the First Amendment as well. More than a year ago, President Obama announced that he was ordering the Justice Department to terminate gag orders “within a fixed time unless the government demonstrates a real need for further secrecy.” And on Feb. 3, when the Office of the Director of National Intelligence announced a handful of baby steps resulting from its “comprehensive effort to examine and enhance [its] privacy and civil liberty protections” one of the most concrete was — finally — to cap the gag orders: In response to the President’s new direction, the FBI will now presumptively terminate National Security Letter nondisclosure orders at the earlier of three years after the opening of a fully predicated investigation or the investigation’s close. Continued nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the statutory standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why continued nondisclosure is appropriate.
  • ...6 more annotations...
  • Despite the use of the word “now” in that first sentence, however, the FBI has yet to do any such thing. It has not announced any such change, nor explained how it will implement it, or when. Media inquiries were greeted with stalling and, finally, a no comment — ostensibly on advice of legal counsel. “There is pending litigation that deals with a lot of the same questions you’re asking, out of the Ninth Circuit,” FBI spokesman Chris Allen told me. “So for now, we’ll just have to decline to comment.” FBI lawyers are working on a court filing for that case, and “it will address” the new policy, he said. He would not say when to expect it.
  • There is indeed a significant case currently before the federal appeals court in San Francisco. Oral arguments were in October. A decision could come any time. But in that case, the Electronic Frontier Foundation (EFF), which is representing two unnamed communications companies that received NSLs, is calling for the entire NSL statute to be thrown out as unconstitutional — not for a tweak to the gag. And it has a March 2013 district court ruling in its favor. “The gag is a prior restraint under the First Amendment, and prior restraints have to meet an extremely high burden,” said Andrew Crocker, a legal fellow at EFF. That means going to court and meeting the burden of proof — not just signing a letter. Or as the Cato Institute’s Julian Sanchez put it, “To have such a low bar for denying persons or companies the right to speak about government orders they have been served with is anathema. And it is not very good for accountability.”
  • In a separate case, a wide range of media companies (including First Look Media, the non-profit digital media venture that produces The Intercept) are supporting a lawsuit filed by Twitter, demanding the right to say specifically how many NSLs it has received. But simply releasing companies from a gag doesn’t assure the kind of accountability that privacy advocates are saying is required by the Constitution. “What the public has to remember is a NSL is asking for your information, but it’s not asking it from you,” said Michael German, a former FBI agent who is now a fellow with the Brennan Center for Justice. “The vast majority of these things go to the very large telecommunications and financial companies who have a large stake in maintaining a good relationship with the government because they’re heavily regulated entities.”
  • So, German said, “the number of NSLs that would be exposed as a result of the release of the gag order is probably very few. The person whose records are being obtained is the one who should receive some notification.” A time limit on gags going forward also raises the question of whether past gag orders will now be withdrawn. “Obviously there are at this point literally hundreds of thousands of National Security Letters that are more than three years old,” said Sanchez. Individual review is therefore unlikely, but there ought to be some recourse, he said. And the further back you go, “it becomes increasingly implausible that a significant percentage of those are going to entail some dire national security risk.” The NSL program has a troubled history. The absolute secrecy of the program and resulting lack of accountability led to systemic abuse as documented by repeated inspector-general investigations, including improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL statutes, requests for information based on First Amendment protected activity, “after-the-fact” blanket NSLs to “cover” illegal requests, and hundreds of NSLs for “community of interest” or “calling circle” information without any determination that the telephone numbers were relevant to authorized national security investigations.
  • Obama’s own hand-selected “Review Group on Intelligence and Communications Technologies” recommended in December 2013 that NSLs should only be issued after judicial review — just like warrants — and that any gag should end within 180 days barring judicial re-approval. But FBI director James Comey objected to the idea, calling NSLs “a very important tool that is essential to the work we do.” His argument evidently prevailed with Obama.
  • NSLs have managed to stay largely under the American public’s radar. But, Crocker says, “pretty much every time I bring it up and give the thumbnail, people are shocked. Then you go into how many are issued every year, and they go crazy.” Want to send me your old NSL and see if we can set a new precedent? Here’s how to reach me. And here’s how to leak to me.
1 - 20 of 88 Next › Last »
Showing 20 items per page