Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Google-Federal" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Obama administration opts not to force firms to decrypt data - for now - The Washington Post - 0 views

  • After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not — for now — call for legislation requiring companies to decode messages for law enforcement. Rather, the administration will continue trying to persuade companies that have moved to encrypt their customers’ data to create a way for the government to still peer into people’s data when needed for criminal or terrorism investigations. “The administration has decided not to seek a legislative remedy now, but it makes sense to continue the conversations with industry,” FBI Director James B. Comey said at a Senate hearing Thursday of the Homeland Security and Governmental Affairs Committee.
  • The decision, which essentially maintains the status quo, underscores the bind the administration is in — balancing competing pressures to help law enforcement and protect consumer privacy. The FBI says it is facing an increasing challenge posed by the encryption of communications of criminals, terrorists and spies. A growing number of companies have begun to offer encryption in which the only people who can read a message, for instance, are the person who sent it and the person who received it. Or, in the case of a device, only the device owner has access to the data. In such cases, the companies themselves lack “backdoors” or keys to decrypt the data for government investigators, even when served with search warrants or intercept orders.
  • The decision was made at a Cabinet meeting Oct. 1. “As the president has said, the United States will work to ensure that malicious actors can be held to account — without weakening our commitment to strong encryption,” National Security Council spokesman Mark Stroh said. “As part of those efforts, we are actively engaged with private companies to ensure they understand the public safety and national security risks that result from malicious actors’ use of their encrypted products and services.” But privacy advocates are concerned that the administration’s definition of strong encryption also could include a system in which a company holds a decryption key or can retrieve unencrypted communications from its servers for law enforcement. “The government should not erode the security of our devices or applications, pressure companies to keep and allow government access to our data, mandate implementation of vulnerabilities or backdoors into products, or have disproportionate access to the keys to private data,” said Savecrypto.org, a coalition of industry and privacy groups that has launched a campaign to petition the Obama administration.
  • ...3 more annotations...
  • To Amie Stepanovich, the U.S. policy manager for Access, one of the groups signing the petition, the status quo isn’t good enough. “It’s really crucial that even if the government is not pursuing legislation, it’s also not pursuing policies that will weaken security through other methods,” she said. The FBI and Justice Department have been talking with tech companies for months. On Thursday, Comey said the conversations have been “increasingly productive.” He added: “People have stripped out a lot of the venom.” He said the tech executives “are all people who care about the safety of America and also care about privacy and civil liberties.” Comey said the issue afflicts not just federal law enforcement but also state and local agencies investigating child kidnappings and car crashes — “cops and sheriffs . . . [who are] increasingly encountering devices they can’t open with a search warrant.”
  • One senior administration official said the administration thinks it’s making enough progress with companies that seeking legislation now is unnecessary. “We feel optimistic,” said the official, who spoke on the condition of anonymity to describe internal discussions. “We don’t think it’s a lost cause at this point.” Legislation, said Rep. Adam Schiff (D-Calif.), is not a realistic option given the current political climate. He said he made a recent trip to Silicon Valley to talk to Twitter, Facebook and Google. “They quite uniformly are opposed to any mandate or pressure — and more than that, they don’t want to be asked to come up with a solution,” Schiff said. Law enforcement officials know that legislation is a tough sell now. But, one senior official stressed, “it’s still going to be in the mix.” On the other side of the debate, technology, diplomatic and commerce agencies were pressing for an outright statement by Obama to disavow a legislative mandate on companies. But their position did not prevail.
  • Daniel Castro, vice president of the Information Technology & Innovation Foundation, said absent any new laws, either in the United States or abroad, “companies are in the driver’s seat.” He said that if another country tried to require companies to retain an ability to decrypt communications, “I suspect many tech companies would try to pull out.”
Paul Merrell

The Western Alliance Is Crumbling: EU Is Abandoning U.S. on Overthrowing Assad | Global Research - Centre for Research on Globalization - 0 views

  • Europe is being overrun by refugees from American bombing campaigns in Libya and Syria, which created a failed state in Libya, and which threaten to do the same in Syria. Europe is thus being forced to separate itself from endorsing the U.S. bombing campaign that focuses against the Syrian government forces of the secular Shiite Syrian President Bashar al-Assad, instead of against his fundamentalist Sunni Islamic opponents, the jihadist groups (all of which are Sunni), such as ISIS, and Al Qaeda in Syria (al-Nusra).
  • Russia announced on October 2nd that their bombing campaign against America’s allies in Syria — ISIS and Al Nusra (the latter being Al Qaeda in Syria) — will intensify and will last “three or four months.” U.S. President Barack Obama is insisting upon excluding Russia from any peace talks on Syria; the U.S. will not move forward with peace talks unless Syria’s President Bashar al-Assad first steps down. But Russia is the only serious military power against the jihadists who are trying to defeat Assad, and Russia is now committing itself also to providing Lebanon with weapons against the jihadists, who are America’s allies in Lebanon too.
  • That’s hardly the only ‘legacy’ issue for Obama — his war against Russia, via overthrowing Gaddafi, then Yanukovych, and his still trying to overthrow Assad — which is now forcing the break-up of the Western Alliance, over the resulting refugee-crisis. An even bigger such conflict within the Alliance concerns Obama’s proposed treaty with European states, the TTIP, which would give international corporations rights to sue national governments in non-appealable global private arbitration panels, the dictates from which will stand above any member-nation’s laws. Elected government officials will have no control over them. This supra-national mega-corporate effort by Obama is also part of his similar effort in his proposed TPP treaty with Asian nations, both of which are additionally aimed to isolate from international trade not just Russia, but China, so as to leave America’s large international corporations controlling virtually the entire world. As things now stand regarding these ‘trade’ deals, Obama will either need to eliminate some of his demands, or else the European Commission won’t be able to muster enough of its members to support Obama’s proposed treaty with the EU, the TTIP (Transatlantic Trade and Investment Partnership). Also, some key European nations might reject Obama’s proposed treaty on regulations regarding financial and other services: TISA (Trade In Services Agreement). All three of Obama’s proposed ‘trade’ deals, including the TPP (Trans-Pacific Partnership) between the U.S. and Asian countries, are the actual culmination of Obama’s Presidency, and they’re all about far more than just trade and economics. The main proposed deal with Europe might now be dead.
  • ...4 more annotations...
  • Thirdly, I am opposed to the signing of an agreement with a power that legalizes widespread and systematic spying on my fellow European citizens and European businesses. Edward Snowden’s revelations are instructive in this regard. As long as the agreement does not protect the personal data of European and US citizens, it cannot be signed. Fourth, the United States proposes a transatlantic common financial space, but they adamantly refuse a common regulation of finance, and they refuse to abolish systematic discrimination by the US financial markets against European financial services. They want to have their cake and eat it too: I object to the idea of a common area without common rules, and I reject commercial discrimination. Fifth, I object to the questioning of European health protections. Washington must understand once and for all that notwithstanding its insistence, we do not want our plates or animals treated with growth hormones nor products derived from GMOs, or chemical decontamination of meat, or of genetically modified seeds or non-therapeutic antibiotics in animal feed. Sixth, I object to the signing of an agreement if it does not include the end of the US monetary dumping. Since the abolition of the gold convertibility of the dollar and the transition to the system of floating exchange rates, the dollar is both American national currency and the main unit for exchange reserves in the world. The Federal Reserve then continually practices monetary dumping, by influencing the amount of dollars available to facilitate exports from the United States. China proposes to eliminate this unfair advantage by making “special drawing rights” of the IMF the new global reference currency. But as things now stand, America’s monetary weapon has the same effect as customs duties against every other nation. [And he will not sign unless it’s removed.]
  • On September 27th, France’s newspaper SouthWest featured an exclusive interview with Matthias Fekl, France’s Secretary of State for Foreign Trade, in which he said that “France is considering all options, including outright termination of negotiations” on the TTIP. He explained that, ever since the negotiations began in 2013, “These negotiations have been and are being conducted in a total lack of transparency,” and that France has, as of yet, received “no serious offer from the Americans.” The reasons for this stunning public rejection had probably already been accurately listed more than a year ago. After all, France has, throughout all of the negotiations, received “no serious offer from the Americans”; not now, and not back at the start of the negotiations in 2013. The U.S. has been steadfast. Jean Arthuis, a member of the European Parliament, and formerly France’s Minister of Economy and Finance, headlined in Le Figaro, on 10 April 2014, “7 good reasons to oppose the transatlantic treaty”. There is no indication that the situation has changed since then, as regards the basic demands that President Obama is making. Arthuis said at that time: First, I am opposed to private arbitration of disputes between States and businesses. [It would place corporate arbitrators above any nation’s laws and enable them to make unappealable decisions whenever a corporation sues a nation for alleged damages for alleged violations of its rights by that nation of the trade-treaty.] Such a procedure is strictly contrary to the idea that I have of the sovereignty of States. … Secondly, I am opposed to any questioning of the European system of appellations of origin. Tomorrow, according to the US proposal, there would be a non-binding register, and only for wines and spirits. Such a reform would kill many European local products, whose value is based on their certified origin.
  • Seventh, beyond the audiovisual sector alone, which is the current standard of government that serves as a loincloth to its cowardice on all other European interests in these negotiations, I want all the cultural exceptions prohibited. In particular, it is unacceptable to allow the emerging digital services in Europe to be swept up by US giants such as Google, Amazon or Netflix. They’re giant absolute masters in tax optimization, which make Europe a “digital colony.” President Obama’s negotiator is his close personal friend, Michael Froman, a man who is even trying to force Europe to reduce its fuel standards against global warming and whose back-room actions run exactly contrary to Obama’s public rhetoric. Froman and Obama have been buddies since they worked together as editors on Harvard Law Review. He knows what Obama’s real goals are. Also: “Froman introduced Mr. Obama to Robert E. Rubin, the former Treasury secretary,” who had brought into the Clinton Administration Timothy Geithner and Larry Summers, and had championed (along with them) the ending of the regulations on banks that the previous Democratic President, Franklin Delano Roosevelt, had put into place. (President Bill Clinton signed that legislation just as he left office, and this enabled the long process to occur with MBS securities and with financial derivatives, which culminated with the 2008 crash, and this same legislation also enabled the mega-banks to get bailed out by U.S. taxpayers for their crash — on exactly the basis that FDR had outlawed.)
  • Froman has always been a pro-mega-corporate, pro-mega-bank champion, who favors only regulations which benefit America’s super-rich, no regulations which benefit the public. Froman’s introducing the Wall Street king Robert Rubin to the then-Senator Obama was crucial to Obama’s becoming enabled to win the U.S. Presidency; Robert Rubin’s contacts among the super-rich were essential in order for that — Obama’s getting a real chance to win the Presidency — to happen. It enabled Obama to compete effectively against Hillary Clinton. Otherwise, he wouldn’t have been able to do that. His winning Robert Rubin’s support was crucial to his becoming President. The chances, that President Obama will now be able to get the support from any entity but the U.S. Congress for his proposed TTIP treaty with Europe, are reducing by the day. Europe seems to be less corrupt than is the United States, after all. The only independent economic analysis that has been done of the proposed TTIP finds that the only beneficiaries from it will be large international corporations, especially ones that are based in the United States. Workers, consumers, and everybody else, will lose from it, if it passes into law. Apparently, enough European officials care about that, so as to be able to block the deal. Or else: Obama will cede on all seven of the grounds for Europe’s saying no. At this late date, that seems extremely unlikely.
Paul Merrell

Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide - The Intercept - 0 views

  • When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept. We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”
  • The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software. Hacking Team’s efforts include a visible push into the U.S. Though Remote Control System is sold around the world — suspected clients include small governments in dozens of countries, from Ethiopia to Kazakhstan to Saudi Arabia to Mexico to Oman — the company keeps one of its three listed worldwide offices in Annapolis, Maryland, on the edge of the federal intelligence and law-enforcement cluster around the nation’s capital; has sent representatives to American homeland security trade shows and conferences, where it has led training seminars like “Cyber Intelligence Solutions to Data Encryption” for police; and has even taken an investment from a firm headed by America’s former ambassador to Italy. The United States is also, according to two separate research teams, far and away Hacking Team’s top nexus for servers, hosting upwards of 100 such systems, roughly a fifth of all its servers globally.
Paul Merrell

IGs form front line of war on waste and fraud, but weak links remain | WashingtonExaminer.com - 0 views

  • The ambassador to Belgium, a big campaign bundler for President Obama, was accused of soliciting sex in a park near the U.S. Embassy in Brussels. Members of then-Secretary of State Hillary Clinton’s security detail were accused of hiring prostitutes, and a State Department security official in Beirut “engaged in sexual assaults” on foreign nationals, according to the complaints. The Diplomatic Security Service, a law enforcement branch of the State Department, tried to investigate the underlying charges but was blocked by top agency managers including Kennedy and Cheryl Mills, chief of staff to Hillary Clinton, according to whistleblower allegations that surfaced later.
  • DSS agents reported the interference to the inspector general’s office, which confirmed the pressure from the top. A draft IG report written in November 2012 described the underlying cases of misconduct and the strong-arm tactics used by top managers to block the DSS investigations. But that draft report was not made public. Instead, it was shown to top State Department officials who wanted it scrubbed of damaging information. “This is going to kill us,” one top agency official reportedly said upon seeing the draft report, according to CBS News. When the final IG report was issued in February 2013, it made no mention of the individual cases or of management pressure to kill the DSS probes. Instead, the IG report blandly stated that DSS “lacks a firewall” to prevent management interference with DSS investigations.
  • The more candid draft report was leaked by an investigator inside the IG’s office to the House Oversight and Government Reform Committee and to CBS News. Rep. Ed Royce, the California Republican who is chairman of the House Foreign Affairs Committee, demanded copies of the draft report and details about the specific cases of misconduct. The IG’s office refused to provide the information. “There is every indication that critical information was missing from the IG report submitted to Congress,” Royce told the Washington Examiner in a recent interview. “And whether it was State’s pressure to remove it or Geisel’s unwillingness to include it, the result is the same. We are not, as required by law, kept fully and currently informed. The bottom line is when federal agencies lack a Senate-confirmed, independent inspector general, the potential for malfeasance really abounds,” he said.
  • ...1 more annotation...
  • Under pressure from Congress, and in the wake of revelations that agency management influenced the IG’s final report, Obama appointed Linick as the State Department’s permanent IG in June 2013, less than a month after CBS broke the news about the IG cover-up. Congress confirmed him three months later. Linick launched a new investigation, and in October 2014 the IG confirmed that at least three DSS investigations were blocked by top State Department officials, including the probe involving the ambassador. While the new IG’s report was critical of management’s efforts to block the DSS investigations, it was silent on whether its own office bowed to the pressure.
Paul Merrell

New FBI Tactic Hints at Big DC Cover-up of Saudi 9/11 Funding - WhoWhatWhy - 0 views

  • In the latest indication of a rolling government cover-up of the September 11, 2001, attacks, the Federal Bureau of Investigation (FBI) is disowning an explosive internal report that suggests high-level Saudi involvement. And Washington seems only too happy to accept this latest peculiar FBI apologia.The same FBI that attempted to hide its prior relationship with accused Boston Marathon bomber Tamerlan Tsarnaev—until that link was outed by the Russian FSB security service—is now rewriting its involvement in the worst terror attack on American soil.In this bizarre development, the Bureau claims that an internal FBI document indirectly tying the alleged Al Qaeda hijackers to a prominent Saudi prince was fabricated.If the FBI is telling the truth and its own agent simply made the whole thing up, that would in itself be a remarkable and essentially unprecedented development.But since we have reason to believe—as you shall see—that the FBI agent did not make it up, the Bureau’s claim is prima facie evidence of a cover-up: one that could only be authorized at the highest levels, for reasons which will become apparent.
Paul Merrell

Tsarnaev Guilty, but Who Made the Bombs? - WhoWhatWhy - 0 views

  • It took a jury just over 11 hours to find Boston Marathon bomber Dzhokhar Tsarnaev guilty of 30 counts in connection with the worst terrorist attack on American soil since 9/11. Federal prosecutors argued Tsarnaev, 21, deliberately “shredded the bodies” of his victims and waged violent jihad to “punish Americans.”Assistant US Attorney Aloke Chakravarty portrayed Tsarnaev as a heartless terrorist who, along with his  brother Tamerlan, carried out the April 2013 attacks that killed three and injured 264 others.But while evidence of Tsarnaev’s culpability—including an admission of guilt from his own defense team—virtually guaranteed a guilty verdict, that wasn’t enough to stop prosecutors from twisting important facts to suit their own agenda.Referencing “bomb-making” paraphernalia seized from Tamerlan Tsarnaev’s apartment, Chakravarty told the court that, “there is evidence, at least in part, that the bombs were built at 410 Norfolk Street.”
  • What the jury didn’t know is that in May 2014, prosecutors said they had no evidence the bombs were constructed at Norfolk Street, and in October 2014, a year-and-a-half after the bombings, the FBI said it still had no idea where the bombs were built, or who actually built them.
Paul Merrell

Distrust of US surveillance threatens data deal | TheHill - 0 views

  • European privacy regulators are putting U.S. surveillance practices under the microscope, this time with a crucial transatlantic data deal hanging in the balance.Legal and privacy advocates say European nations are poised to strike down the deal if they decide the U.S. hasn't done enough to reform its spying programs.The new test comes after the European Commission and the Commerce Department — after months of tense negotiations — reached a deal this week permitting Facebook, Google and thousands of other companies to continue legally handling Europeans’ personal data.ADVERTISEMENTCritics though have long warned that unless the U.S. overhauls its privacy and national security laws, there is no legal framework that can stand up in European court, where privacy is considered a fundamental right under the EU Charter.A working group of 28 EU nations’ data protection authorities — domestic entities separate from the Commission that will be in charge of enforcing the new agreement — may now cast the deciding vote.The group is spending the next few months picking through the so-called Privacy Shield agreement to determine if it adequately protects the personal data of European citizens.
  • “The Commission has said, ‘We’re satisfied. We believe them. We believe the U.S. has substantially changed its practices,’ and they are no longer going off the [Edward] Snowden revelations in the media,” said Susan Foster, a privacy attorney at Mintz Levin who works in both the EU and the U.S.“Whether the working group will go along with it is another question.”The privacy advocate whose complaint against Facebook brought down the Privacy Shield’s 15-year-old predecessor agreement is already questioning the new deal’s validity.“With all due respect ... a couple of letters by the outgoing Obama administration is by no means a legal basis to guarantee the fundamental rights of 500 million European users in the long run, when there is explicit U.S. law allowing mass surveillance,” Max Schrems of Austria said in a statement Tuesday.The United States has been fighting against the perception that it tramples on civil liberties after ex-National Security Agency contractor Edward Snowden revealed the breadth of the agency’s snooping.One sticking point in the Privacy Shield negotiations was over the scope of an exception allowing surveillance for national security purposes.
  • In announcing the deal, Commission officials insisted that the U.S. had provided “detailed written assurances” that surveillance of Europeans’ data by intelligence agencies would be subject to appropriate limitations.“The U.S. has clarified that they do not carry out indiscriminate surveillance of Europeans,” Andrus Ansip, Vice President for the Digital Single Market on the European Commission, said Tuesday.The U.S. has also agreed to create an office in the State Department, to address complaints from EU citizens who feel their data has been inappropriately accessed by intelligence authorities.Complicating the working group’s approval of the deal is the hodgepodge of competing regulators in Europe. Each nation has an agency in charge of its own country’s regulation. Some countries — such as Germany — are seen as tougher on privacy than others, like France or the U.K.While some countries consider U.S. privacy protections to be satisfactory, in others they are seen as woefully inadequate.
  • ...2 more annotations...
  • Defenders of U.S. intelligence practices often point to France and the U.K., arguing they are equally intrusive with their citizens' data.A recent public report “pretty clearly documented that the protections are patchy, vary hugely and are nonexistent in some of the countries,” Foster noted.Privacy advocates dismiss those arguments.“You cannot pick the worst member state, like the U.K., and claim you are ‘equivalent’ to that,” Schrems said Tuesday. “First, this is not a price [sic] you want to win, secondly you have to meet the standards of the European Court of Justice, EU law and the EU Charter of Fundamental Rights — not the standard of the worst member state.”The U.S. has made significant reforms to federal spying powers under the Obama administration.The Privacy and Civil Liberties Oversight Board — a small bipartisan watchdog — on Friday said the government has begun addressing each of the nearly two-dozen recommendations it made following Snowden's revelations.“[I]mportant measures have been taken to enhance the protection of Americans’ privacy and civil liberties and to strengthen the transparency of the government’s surveillance efforts, without jeopardizing our counterterrorism efforts,” the five-member board said.
  • But whether European countries believe those changes are sufficient to sign off on the Privacy Shield is uncertain. Each of the EU’s 28 member states must approve the deal before it can be finalized.“A lot of this is going to come down to whether the data protection authorities are persuaded by the U.S.’s portrayal of the cumulative protections given to European citizens and the cumulative carving back on the NSA surveillance programs,” Foster said.If the European working group is not satisfied with the assurances from the Commerce Department, the consequences could be dire. Businesses fear a chilling of transatlantic trade, valued at $1 trillion in 2014.The most likely outcome, experts say, would be a patchwork of country-to-country regulations that would make it extremely expensive for companies to comply.Legislative changes in the U.S. seem unlikely. Congress is close to passing a privacy law considered crucial to getting seeing the Privacy Shield approved. But the bill — which gives EU citizens the right to sue in U.S. courts over the misuse of personal data — has sparked controversy on Capitol Hill.Some lawmakers are expressing frustration that the EU has used the threat of enforcement action against U.S. companies to push Congress to make more concessions.“It’s been hard enough to get the Judicial Redress Act passed — if they’re going to make more demands on Congress, there won’t be a lot of willing listeners here,” Sen. Chris Murphy (D-Conn.) told The Hill on Thursday.
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance | Just Security - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Paul Merrell

Korematsu's Demise? | Just Security - 0 views

  • There’s a lot that’s remarkable about last Tuesday’s Third Circuit decision in Hassan v. City of New York, which Faiza Patel cogently summarized in her post last week. In a nutshell, Hassan involves a challenge to secret intelligence operations carried out by the New York Police Department (NYPD) over the years since September 11 that allegedly targets Muslim communities “based on the false and stigmatizing premise that Muslim religious identity ‘is a permissible proxy for criminality, and that Muslim individuals, businesses, and institutions can therefore be subject to pervasive surveillance not visited upon individuals, businesses, and institutions of any other religious faith or the public at large.'” The district court had tersely granted the City’s motion to dismiss both because it concluded the plaintiffs lacked standing and because, in the alternative, it held that the plaintiffs had failed to overcome the pleading burden articulated by the Supreme Court in Iqbal. But the Third Circuit reversed on both fronts, holding that the plaintiffs’ allegations, if true, were more than enough to establish both that they had suffered an injury in fact sufficient to satisfy Article III standing, and that their equal protection and First Amendment claims were sufficiently plausible to satisfy Iqbal. To be sure, the Third Circuit’s decision is interlocutory — coming at a very preliminary stage in the litigation. But what I want to suggest in the post that follows is that, as much as any other post-September 11 judicial decision, Hassan represents the full-throated repudiation of the Supreme Court’s infamous World War II-era ruling in Korematsu v. United States that has been so long in coming — and so thoroughly overdue.
  • As I’ve written about before, Korematsu reflects two separate — but equally important — constitutional failures. The first failure was the internment policy itself, which we now know (and which the US government knew at the time) to have been a completely unnecessary — if not hysterical — overreaction to hyperbolic and (after Midway, at least) categorically overstated fears of a Japanese invasion of the West Coast. By itself, the camps were a dark stain on the history of civil liberties in the United States — albeit one of many, alas. But the second failure was, historically, the far more significant and unique one — the Supreme Court’s conscious constitutional rationalization of the internment policy, based upon a combination of naïveté on the Justices’ part and the affirmatively misleading (if not downright disingenuous) briefing by the federal government. As Justice Robert H. Jackson understood — and forcefully articulated — in his Korematsu dissent, the real violence to the “rule of law” resulting from the camps was thus not the underlying policy, but rather its validation by the Supreme Court. In his words, “a military commander may overstep the bounds of constitutionality, and it is an incident. But if we review and approve, that passing incident becomes the doctrine of the Constitution.”
  • But we’ve struggled somewhat with the second constitutional failure. The courts have repudiated Korematsu’s conviction; the Office of the Solicitor General has confessed error for its role in perpetuating the government’s misleading case before the Supreme Court; and scholars have suggested that Korematsu itself has become part of the “anti-canon” — the class of Supreme Court decisions so reviled that they are cited, if at all, in support of the wrongness of their holdings. But Korematsu itself remains on the books, as do broader concerns that courts are still vulnerable to Korematsu — style reasoning, i.e., that the need to protect national security might provide legal justification for government conduct that would otherwise be unjustifiable. Indeed, one need look no further than the ongoing debate over the SSCI’s torture report for evidence of the Korematsu mentality being alive and well.
  • ...2 more annotations...
  • That’s why I find the Third Circuit’s analysis in Hassan so significant — not because it allows this particular civil suit to go forward, but because it does so based upon an explicit (and conscious) rejection of Korematsu — style legal reasoning. As Judge Ambro explains, “No matter how tempting it might be to do otherwise, we must apply the same rigorous standards even where national security is at stake. We have learned from experience that it is often where the asserted interest appears most compelling that we must be most vigilant in protecting constitutional rights.” And applying the strict judicial scrutiny that is triggered by government action deemed to be intentionally discriminatory on the basis of religious affiliation, the court proceeds to hold that the NYPD lacked a sufficiently compelling justification for such discriminatory treatment, because even if abstract claims of security necessity could be a compelling government interest, the NYPD’s alleged policy was far too overbroad to survive the narrow tailoring required by strict scrutiny. Thus, quoting directly from Justice Jackson’s Korematsu dissent, Judge Ambro closed his opinion by noting that “Our job is judicial. We ‘can apply only law, and must abide by the Constitution, or [we] cease to be civil courts and become instruments of [police] policy.'”
  • Faiza’s post provides far more detail on the specifics of the Third Circuit’s analysis, and the opinion itself is worth a read. For present purposes, though, it’s this mentality that I find so refreshing — that even when the government invokes the specter of September 11 and the need to prevent future acts of terrorism, courts will not abdicate their responsibility to scrutinize the government’s justifications with care, and to be especially wary of overbroad government programs carried out under the broad guise of “necessity.” Hassan certainly isn’t the first example of this kind of principled judicial decisionmaking in a post-September 11 counterterrorism suit, but it is the one that, at least in my view, most directly confronts — and rejects — the kind of deferential judicial review that was responsible for the second constitutional failure in Korematsu, and all of the pain that followed.
« First ‹ Previous 61 - 69 of 69
Showing 20 items per page