Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Court" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

Byron York: Justice Department demolishes case against Trump order | Washington Examiner - 1 views

  •  
    "James Robart, the U.S. district judge in Washington State, offered little explanation for his decision to stop President Trump's executive order temporarily suspending non-American entry from seven terror-plagued countries. Robart simply declared his belief that Washington State, which in its lawsuit against Trump argued that the order is both illegal and unconstitutional, would likely win the case when it is tried. Now the government has answered Robart, and unlike the judge, Justice Department lawyers have produced a point-by-point demolition of Washington State's claims. Indeed, for all except the most partisan, it is likely impossible to read the Washington State lawsuit, plus Robart's brief comments and writing on the matter, plus the Justice Department's response, and not come away with the conclusion that the Trump order is on sound legal and constitutional ground. Beginning with the big picture, the Justice Department argued that Robart's restraining order violates the separation of powers, encroaches on the president's constitutional and legal authority in the areas of foreign affairs, national security, and immigration, and "second-guesses the president's national security judgment" about risks faced by the United States. Indeed, in court last week, Robart suggested that he, Robart, knows as much, or perhaps more, than the president about the current state of the terrorist threat in Yemen, Somalia, Libya, and other violence-plagued countries. In an exchange with Justice Department lawyer Michelle Bennett, Robart asked, "How many arrests have there been of foreign nationals for those seven countries since 9/11?" "Your Honor, I don't have that information," said Bennett. "Let me tell you," said Robart. "The answer to that is none, as best I can tell. So, I mean, you're here arguing on behalf of someone [President Trump] that says: We have to protect the United States from these individuals coming from these countries, and there's no support for that."
Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis and Commentary from Justia - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower Courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the Court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the Court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the Court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the Court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower Courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Paul Merrell

Wikimedia v. NSA: Another Court Blinds Itself to Mass NSA Surveillance | Electronic Frontier Foundation - 0 views

  • We all know justice is blind. But that is supposed to mean that everyone before it is treated equally, not that the justice system must close its eyes and refuse to look at important legal issues facing Americans.  Yet the government continues to convince courts that they cannot consider the constitutionality of its behavior in national security cases and, last week, in an important case for anyone who has ever used Wikipedia, another judge agreed with that position.  A federal district judge in Maryland dismissed Wikimedia v. NSA, a case challenging the legality of the NSA’s “upstream” surveillance—mass surveillance of Internet communications as they flow through the Internet backbone. The case was brought by our friends at the ACLU on behalf of nine plaintiffs, including human rights organizations, members of the media, and the Wikimedia Foundation.1 We filed a brief in the case, too, in support of Wikimedia and the other plaintiffs. The judge dismissed the case based on a legal principle called standing. Standing is supposed to ensure, among other things, that the party bringing the lawsuit has suffered a concrete harm, caused by the party being sued, and that the court can resolve the harm with a favorable ruling.
  • But the U.S. government has taken this doctrine, which was intended to limit the cases federal courts hear to actual live controversies, and turned it into a perverse shell game in surveillance cases—essentially arguing that because aspects of the surveillance program are secret, plaintiffs cannot prove that their communications were actually, in fact, intercepted and surveilled. And without that proof, the government argues, there’s no standing, because plaintiffs can’t show that they’ve suffered harm. Sadly, like several other courts before it, the judge agreed to this shell game and decided that it couldn’t decide whether the constitutional rights of Wikimedia and the other plaintiffs were violated.  This game is mighty familiar to us at EFF, but that doesn’t make it any less troubling. In our system, the courts have a fundamental obligation to conclusively determine the legality of government action that affects individuals’ constitutional rights. For years now, plaintiffs have tried to get the courts to simply issue a ruling on the merits of NSA surveillance programs. And for years, the government has successfully persuaded the courts to rely on standing and related doctrines to avoid doing so. That is essentially what happened here. The court labeled as “speculative” Wikimedia’s claim that, at a minimum, even one of its approximately one trillion Internet communications had been swept up in the NSA’s upstream surveillance program. Remember, this is a program that, by the government’s own admission, involves the searching and scanning of vast amounts of Internet traffic at key Internet junctures on the Internet’s backbone. Yet in court’s view, Wikimedia’s allegations describing upstream—based on concrete facts, taken from government documents— coupled with a plaintiff that engages in a large volume of internet communications were not enough to state a “plausible” claim that Wikimedia had been surveilled.
  • On the way to reaching that conclusion, and putting on its blindfold, the court made a number of mistakes. The Government’s Automated Eyes Are Still Government Eyes First, it appears the court fundamentally misunderstood Wikimedia’s claim about upstream surveillance and, in particular, “about surveillance.” As Wikimedia alleged, “about surveillance” (a specific aspect of upstream surveillance that searches the content of communications for references to particular email addresses or other identifiers) amounts to “the digital analogue of having a government agent open every piece of mail that comes through the post to determine whether it mentions a particular word or phrase.” The court held, however, that this type of “about” surveillance was “targeted insofar as it makes use of only those communications that contain information matching the tasked selectors,” like email addresses. But what the government "makes use of" is entirely beside the point—it is the scanning of the communications for the tasked selectors in the first place that is the problem.  To put it into a different context, the government conducts a search when it enters into your house and starts rifling through your files—not just when it finds something it wants to keep. The government's ultimate decision to “make use of” the communications it finds interesting is irrelevant. It is the search of the communications that matters.
  • ...2 more annotations...
  • Back of the Envelope Gymnastics Another troubling aspect of the court’s decision was its attack on the probabilities Wikimedia assigned to the likelihood of its communications being intercepted. Given that Wikimedia engages in a large volume of Internet communications, Wikimedia alleged that—even assuming a .00000001% chance that any one particular communication is intercepted—it would still have a 99.9999999999% of having one of its communications intercepted. The statistic was used to illustrate that, even assuming very low probabilities for interception, there was still a near-certainty that Wikipedia’s traffic was collected. But the court attacked Wikimedia’s simple statistical analysis (and the attack tracked, to a great degree, arguments made in the government’s declarations that the court purportedly did not consider). The court seemed to believe it had seized upon a great flaw in Wikimedia’s case by observing that, if the probability of any given communication being intercepted were decreased 100% or 1000%, the probability of one of Wikimedia’s communications being intercepted would similarly drop. The “mathematical gymnastics” the court believed it had unearthed were nothing more than Wikimedia using an intentionally small (and admittedly arbitrary) probability to illustrate the high likelihood that its communications had been swept up. But even if the court disagreed with the probabilities Wikimedia relied on, it’s not at all clear why that would justify dismissing the case at the outset. If it turned out, after development of the record, that the probabilities were off, then dismissal might be appropriate. But the court cut the case off before Wikimedia had the opportunity to introduce evidence or other facts that might support the probability they assigned.
  • Someone Else Probably Has Standing, Right? Perhaps most troubling was the court’s mistaken belief that the legality of upstream surveillance could be challenged in other ways, beyond civil cases like Wikimedia or our ongoing case, Jewel v. NSA. The court asserted its decision would not insulate upstream from judicial review, which—according to the court—could still receive judicial scrutiny through (1) review from the Foreign Intelligence Surveillance court (FISC), (2) a challenge by a criminal defendant, or (3) a challenge from an electronic service provider. None of these options is truly a viable alternative, however. First, the FISC (until very recently) did not have adversarial proceedings—it only heard from the government, and its proceedings remain both far more limited and more secretive than a regular court’s. Second, a challenge from a criminal defendant won’t work either, because, to date, the government has explicitly refused to disclose—even where defendants are notified of the use of FISA surveillance—whether their communications were obtained using upstream surveillance. And, finally, in the nearly 15 years (or more) the government has conducted upstream surveillance, we’re not aware of any service provider that has challenged the legality of the practice. Indeed, given that upstream is done with the cooperation of telecoms like AT&T and Verizon—the same telcos that did not challenge the NSA’s bulk collection of Americans’ call records for over a decade—we're not holding our breath for a challenge anytime soon. Instead, we need the courts to tackle these cases. Upstream surveillance presents unique constitutional issues that no federal court has seriously addressed. It's time the federal courts stepped up to the challenge.
  •  
    The notion that the government can intentionally violate the privacy rights of its citizens yet a court find that those citizens have no right to seek redress announces a view that privacy rights are hollow --- that those wronged by government malfeasance have no remedy in the courts of our nation. That is a view that must be thrown in the dustbins of history if freedom is to be preserved. 
Paul Merrell

The Latest European Court of Human Rights Ruling on Accountability for Torture | Just Security - 0 views

  • In another important decision on European participation in the US war on terrorism, the European Court of Human Rights (ECtHR) issued a judgment late last month against Italy for its role in the extraordinary rendition of Egyptian cleric Osama Mustafa Hassan Nasr, better known as Abu Omar. (An English-language summary of ruling is here; the full decision, presently available only in French, is here.) The ruling not only represents a further contribution to the Strasbourg Court’s growing accountability jurisprudence, but also highlights the United States’ own failure to provide any redress to victims of the torture program that it primarily created and operated. The ECtHR’s decision in Nasr v. Italy concerns one of the most notorious instances of extraordinary rendition (i.e., the extrajudicial transfer of an individual to another country for purposes of abusive interrogation). In 2003, Nasr, who had been granted political asylum in Italy, was abducted in broad daylight from a street in Milan and taken to Aviano air base, which is operated by the US Air Force. Nasr was subsequently taken, by way of the US’s Ramstein air base in Germany, to Cairo where he was interrogated by Egyptian intelligence services. Egyptian authorities held Nasr in secret for more than a year and subjected him to repeated torture before releasing him in April 2004. Approximately 20 days after his release — and after submitting a statement to Milan’s public prosecutor describing his abuse — Nasr was rearrested and detained without charges. He was released in 2007, but prohibited from leaving Egypt.
  • The ECtHR ruling centers on Italy’s role in Nasr’s abduction in Milan, his rendition to Egypt where he faced a real risk of abuse, and its subsequent failure to conduct an effective domestic investigation or to provide any redress. The ECtHR found Italy liable for multiple violations of the European Convention on Human Rights (ECHR), including article 3 (the prohibition on inhuman or degrading treatment), article 5 (the right to liberty and security), and article 13 (the right to an adequate remedy). It ordered Italy to pay €70,000 to Nasr and €15,000 to his wife, Nabila Ghali, for the suffering and anguish caused by her husband’s enforced disappearance. The Milan public prosecutor had previously investigated and prosecuted 25 CIA officers, including the agency’s Milan station chief, Robert Seldon Lady, and seven Italian military intelligence officers, for aiding and abetting in Nasr’s abduction and rendition. The United States strenuously opposed the prosecution, warning that it would harm US-Italian relations, and the Italian government successfully challenged much of the evidence on the grounds it could jeopardize national security. The trial court convicted 22 CIA agents in absentia and gave them prison sentences of between six to nine years; a Milan appeals court upheld the convictions and overturned the acquittals of the other three US defendants. Italy’s highest court, however, overturned the conviction of five of the Italian military intelligence agents based on state secrecy grounds. The Italian government has refused to seek the extradition of the convicted US nationals. (For more details, Human Rights Watch has an excellent summary of the proceedings in Italy here.)
  • The ECtHR’s ruling in Nasr strengthens accountability by reinforcing state responsibility for participation in abuses committed during the war on terrorism. It builds on the Strasbourg Court’s prior decisions in El-Masri v. Macedonia and Al-Nashiri v. Poland/Husayn (Abu Zubaydah) v. Poland, which held Macedonia and Poland, respectively, liable for their role in CIA torture and rendition, including (in the case of Poland) for hosting a CIA black site. Nasr, together with El-Masri and al-Nashiri/Husayn, should help discourage a state’s future participation in cross-border counterterrorism operations conducted in flagrant violation of human rights guarantees. While the deterrent value of legal judgments may be uncertain, the recent line of Strasbourg Court decisions raises the costs of aiding and abetting illegal operations, even in the national security context.
  • ...2 more annotations...
  • Nasr also advances the jurisprudence surrounding a state’s duty to conduct an effective domestic investigation into torture. The Strasbourg Court noted that Italian Courts had conducted a detailed investigation and that the evidence disregarded by Italy’s highest Court on grounds of state secrecy had been sufficient to convict the five Italian military intelligence defendants. It further observed that because the evidence inculpating those defendants had been widely available in the press and on the Internet, the Court’s invocation of state secrecy doctrine was not only unpersuasive, but designed to grant impunity to the defendants. Further, the Strasbourg Court noted that the Italian government had never sought the extradition of the convicted CIA agents. As result, the Court ruled that despite the efforts of Italian investigators and judges, which had identified the responsible individuals and secured their convictions, the domestic proceedings failed to satisfy the procedural requirements of article 3 of the European Convention (prohibiting torture and other ill-treatment), due to the actions of the executive. This ruling is important because it imposes liability not only where a state takes no steps towards a genuine domestic investigation and prosecution (as in El-Masri and Al-Nashiri/Husayn), but also where efforts by a state’s judges and prosecutors are thwarted in the name of state secrecy.
  • The ECtHR’s rulings on the CIA torture program also highlight the continued absence of accountability in the United States. The US has failed both to conduct an effective criminal investigation of those most responsible for CIA torture and to provide any remedies to victims. In fact, the Obama administration has vigorously opposed the latter at every turn, invoking the same sweeping state secrecy doctrines the ECtHR rejected in El-Masri and Nasr. These rulings will likely catalyze future litigation before the Strasbourg Court and in European domestic Courts as well. (Recent actions filed against Germany for its participation in US targeted killings through use of the Ramstein Air Base provide one example of such litigation.) While the ECtHR’s rulings may not spur further efforts in the United States, they reinforce the perception of the United States as an outlier on the important question of accountability for human rights violations.
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance | Just Security - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the Court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each Court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Paul Merrell

Belhaj v. Straw: UK Supreme Court Hearing Case on UK Complicity in US Rendition and Torture | Just Security - 0 views

  • The United Kingdom Supreme Court heard arguments this week in two critical cases concerning the UK’s role in the United States’ rendition, detention, and interrogation efforts in the years after 9/11. In both cases, the UK government is arguing that the claims cannot be considered by English Courts. If the government succeeds, one potential practical implication would be to limit the extent to which individuals could seek redress for wrongs done against them, including torture, where the alleged wrongs involve other States. The first case, Belhaj & another v. Straw & others, involves one of the most controversial claims of rendition involving the UK. The government has appealed against the lower Court’s ruling, which found against the government for its alleged role in the 2004 abduction of Libyan national, Abdul-Hakim Belhaj, and his wife, and their subsequent rendition to Libya and mistreatment at the hands of US and other foreign officials. In December 2013, the High Court dismissed a civil suit brought by Belhaj on the basis that it lacked jurisdiction because of the act of state doctrine (a rule of English law which prevents Courts from considering claims where the Court would have to examine the acts of a foreign state). But in October 2014, the UK Court of Appeal ruled that the act of state doctrine did not preclude Belhaj’s claim against the British government, citing, among other reasons, the universal condemnation of torture and the “stark reality” that these allegations would escape judicial investigation unless the English Courts were able to exercise jurisdiction over the case.
  • Specifically, the Court found that: [T]he present case falls within the established limitation on the act of state doctrine imposed by considerations of public policy on grounds of violations of human rights and international law and that there are compelling reasons requiring the exercise of jurisdiction. The Court of Appeal also rejected the government’s controversial attempt to invoke the domestic law on immunity of foreign states from domestic proceedings as a bar to any claim against the UK government whenever the conduct of foreign states may be called into question, a concept known as the doctrine of indirect impleader in state immunity.
  • The government’s appeal against the Court of Appeal’s decision in Belhaj is being heard jointly with the appeal in another case, Ministry of Defense and the Foreign and Commonwealth Office v. Yunus Rahmatullah, involving a Pakistani citizen captured by British forces in Iraq. In 2004, Rahmatullah was transferred from UK to US custody in Iraq and thereafter rendered to Bagram air base in Afghanistan, with UK knowledge and in breach of Article 45 and Article 49 of the Fourth Geneva Convention. Held by the US without trial for more than a decade, Rahmatullah was denied access to a lawyer and subjected to numerous acts of torture and mistreatment before being repatriated to Pakistan and released without charge in May 2014. He now seeks to sue the British government for damages. The main thrust of the UK government’s argument, in both cases, is that the litigation will most likely damage the UK’s relationship with the United States. If accepted by the Supreme Court, this argument may lead the Court to find that it lacks jurisdiction to hear the claims. The far-reaching implications of such a ruling would be to protect individual states and their institutions from the scrutiny of British Courts in cases where it is alleged that they acted in concert with other states, even if their actions were unlawful. Such an expansive interpretation of a “but they did it too” excuse would constitute a notable limitation on British Courts’ jurisdiction in the context of events arising from the so-called global war on terror. Since Belhaj and Rahmatullah, and others like them, are unlikely to secure redress directly in a US Court, a ruling in favor of the government would essentially preclude them from securing redress in any forum. You can find the full Court of Appeal judgment here and below.   Belhaj v. Straw – Court of Appeal Judgment (30 Oct 2014) by Just Security
  •  
    Hopefully, the "we can't be held liable because it would upset the U.S." defense won't be sustained by the Supreme Court. What a brazen assertion of UK subservience to the U.S.!
Paul Merrell

Fisa court oversight: a look inside a secret and empty process | Glenn Greenwald | Comment is free | guardian.co.uk - 0 views

  • Since we began began publishing stories about the NSA's massive domestic spying apparatus, various NSA defenders – beginning with President Obama - have sought to assure the public that this is all done under robust judicial oversight. "When it comes to telephone calls, nobody is listening to your telephone calls," he proclaimed on June 7 when responding to our story about the bulk collection of telephone records, adding that the program is "fully overseen" by "the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them". Obama told Charlie Rose last night:"What I can say unequivocally is that if you are a US person, the NSA cannot listen to your telephone calls … by law and by rule, and unless they … go to a court, and obtain a warrant, and seek probable cause, the same way it's always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause."The GOP chairman of the House Intelligence Committee, Mike Rogers, told CNN that the NSA "is not listening to Americans' phone calls. If it did, it is illegal. It is breaking the law." Talking points issued by the House GOP in defense of the NSA claimed that surveillance law only "allows the Government to acquire foreign intelligence information concerning non-U.S.-persons (foreign, non-Americans) located outside the United States."
  • The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.
  • The NSA's media defenders have similarly stressed that the NSA's eavesdropping and internet snooping requires warrants when it involves Americans. The Washington Post's Charles Lane told his readers: "the government needs a court-issued warrant, based on probable cause, to listen in on phone calls." The Post's David Ignatius told Post readers that NSA internet surveillance "is overseen by judges who sit on the Foreign Intelligence Surveillance court" and is "lawful and controlled". Tom Friedman told New York Times readers that before NSA analysts can invade the content of calls and emails, they "have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress."This has become the most common theme for those defending NSA surveillance. But these claim are highly misleading, and in some cases outright false.
  • ...1 more annotation...
  • What is vital to recognize is that the NSA is collecting and storing staggering sums of communications every day. Back in 2010, the Washington Post reported that "every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." Documents published by the Guardian last week detail that, in March 2013, the NSA collected three billions of pieces of intelligence just from US communications networks alone.In sum, the NSA is vacuuming up enormous amounts of communications involving ordinary Americans and people around the world who are guilty of nothing. There are some legal constraints governing their power to examine the content of those communications, but there are no technical limits on the ability either of the agency or its analysts to do so. The fact that there is so little external oversight is what makes this sweeping, suspicion-less surveillance system so dangerous. It's also what makes the assurances from government officials and their media allies so dubious.
  •  
    Glenn Greenwald strikes again with hard proof from NSA documents, dissecting procedures used throughout the intelligence establishment from the NSA to the President to Congress, casting severe doubt on what we have been told by those defending the NSA surveillance program. I have highlighted only a few points from this lengthy article. As to Greenwald's discussion of the FISA Court's weaknesses, he omitted one that I believe is incredibly, the lack of an adversarial system with a lawyer opposing what the government asks the Court to authorize. True, search warrants are normally issued in the U.S. with only the government represented in the process. But there is a crucial difference: once someone is charged with a crime, the warrant must be disclosed to the defendant who can ask the Court to suppress all evidence unlawfully obtained not only through the warrant but also the fruits of any unlawfully obtained evidence, meaning subsequently discovered evidence that would not have been found absent the unlawfully obtained evidence. The same result can happen if the warrant is found to be invalid for any of a variety of reasons, or the officers exceeded the scope of the search authorized.  So in the normal search warrant process, the participation of an adversary attorney is only delayed; it is not virtually eliminated as it is in the FISA Court. Thus far, only those ordered to disclose records to the NSA have been granted standing to oppose disclosure, not those who have been surveilled. The entire U.S. judicial system is built around the principle of an adversarial process. Judges are expected to be neutral arbiters between two or more sides to a dispute. We do not have an inquisitorial system, as is used for example in some European nations, where the judge is also the investigator. The FISA Court is presently composed of 11 federal district Court judges who also preside over normal cases in their individual districts. Steeped in the adversarial system and th
Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit 2010 - Google Scholar - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower Courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor Court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal Court of appeals (as many judges as most other federal appellate Courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Paul Merrell

Victory! Federal Court Recognizes Constitutional Rights of Americans on the No-Fly List | American Civil Liberties Union - 0 views

  • A federal court took a critically important step late yesterday towards placing a check on the government's secretive No-Fly List. In a 38-page ruling in Latif v. Holder, the ACLU's challenge to the No-Fly List, U.S. District court Judge Anna Brown recognized that the Constitution applies when the government bans Americans from the skies. She also asked for more information about the current process for getting off the list, to inform her decision on whether that procedure violates the Fifth Amendment guarantee of due process. We represent 13 Americans, including four military veterans, who are blacklisted from flying. At oral argument in June on motions for partial summary judgment, we asked the court to find that the government violated our clients' Fifth Amendment right to due process by barring them from flying over U.S. airspace – and smearing them as suspected terrorists – without giving them any after-the-fact explanation or a hearing at which to clear their names. The court's opinion recognizes – for the first time – that inclusion on the No-Fly List is a draconian sanction that severely impacts peoples' constitutionally-protected liberties. It rejected the government's argument that No-Fly list placement was merely a restriction on the most "convenient" means of international travel.
  • Such an argument ignores the numerous reasons an individual may have for wanting or needing to travel overseas quickly such as for the birth of a child, the death of a loved one, a business opportunity, or a religious obligation. According to the court, placement on the No-Fly List is like the revocation of a passport because both actions severely burden the right to international travel and give rise to a constitutional right to procedural due process: Here it is undisputed that inclusion on the No-Fly List completely bans listed persons from boarding commercial flights to or from the United States or over United States air space.  Thus, Plaintiffs have shown their placement on the No-Fly List has in the past and will in the future severely restrict Plaintiffs' ability to travel internationally. Moreover, the realistic implications of being on the No-Fly List are potentially far-reaching. For example, TSC [the Terrorist Screening Center] shares watchlist information with 22 foreign governments and United States Customs and Boarder [sic] Protection makes recommendations to ship captains as to whether a passenger poses a risk to transportation security, which can result in further interference with an individual's ability to travel as evidenced by some Plaintiffs' experiences as they attempted to travel abroad by boat and land and were either turned away or completed their journey only after an extraordinary amount of time, expense, and difficulty. Accordingly, the court concludes on this record that Plaintiffs have a constitutionally-protected liberty interest in traveling internationally by air, which is affected by being placed on the list. The court also found that the government's inclusion of our clients on the No-Fly List smeared them as suspected terrorists and altered their ability to lawfully board planes, resulting in injury to another constitutionally-protected right: freedom from reputational harm.
  • The importance of these rulings is clear. Because inclusion on the No-Fly List harms our clients' liberty interests in travel and reputation, due process requires the government to provide them an explanation and a hearing to correct the mistakes that led to their inclusion. But under the government's "Glomar" policy, it refuses to provide any information confirming or denying that our clients are on the list, let alone an after-the-fact explanation and hearing. The court has asked the ACLU and the government for more information about the No-Fly List redress procedure to help it decide the ultimate question of whether that system violates the Fifth Amendment right to due process. We are confident the court will recognize that the government's "Glomar" policy of refusing even to confirm or deny our clients' No-Fly List status (much less actually providing the reasons for their inclusion in the list) is fundamentally unfair and unconstitutional.
  •  
    A case decision in August that I had missed, right here in Oregon. One of our Oregon federal judges gets it right after being reversed the first time by the 9th U.S. Circuit Court of Appeals. I've read the opinion. Looks quite solid. Plaintiffs were carefully chosen for this test case, 13 citizens placed on the no-fly list, all with compelling stories of winding up stranded, some overseas. Several are U.S. military veterans. All were told by government officials that the reason they could not board was because they were on the TSA no-fly list. At issue is whether they have a right to be informed of the information that resulted in them being placed on the no-fly list and a right to a hearing to seek correction of the information. Their constitutional interest in their reputations is also in play, since they have been classified by their government as too dangerous to allow to travel by commercial airline.   The district Court case is not done; the judge has ordered further briefing on some issues. But the government is trying to defend a process in which no one is ever formally notified that they are on the no-fly list and is never advised of the reasons they are on the no-fly list. The number of Americans on the no-fly list is now over 700,000. But the judge has recognized that there is a constitutional right to travel and that it extends to international travel. From the opinion: "Plaintiffs contend the government has deprived them of their protected liberty interest in travel. In Kent v. Dulles, 357 U.S. 116 (1958), the Supreme Court held "[t]he right to travel is part of the 'liberty' of which the citizen cannot be deprived without due process of law under the Fifth Amendment."  Id. at 125. As noted by the Ninth Circuit, "the [Supreme] Court has consistently treated the right to international travel as a liberty interest that is protected by the Due Process Clause of the Fifth Amendment." DeNieva v. Reyes, 966 F.2d 480, 485 (9th Cir. 1992)(emp
Paul Merrell

Court Requires Review of State Secrets Documents - 0 views

  • Over the objections of government attorneys, a federal judge said yesterday that he would require in camera review of documents that the government says are protected by the state secrets privilege. The issue arose in the case of Gulet Mohamed v. Eric Holder, challenging the constitutionality of the “no fly” list. The government had argued that it is “inappropriate” for a court to review such records to verify that they are validly privileged, and that instead the court should grant dismissal of case on the basis of official declarations. (Gov’t Resists court Review of State Secrets, Secrecy News, August 27). The government moved for reconsideration of an August 6 order to produce the records for in camera review. Yesterday, Judge Anthony J. Trenga of the Eastern District of Virginia granted the government’s motion for reconsideration, but he said that having reconsidered the matter, he determined that he had been right the first time around. “Upon reconsideration of its Order, however, the court finds that none of [the] objections justifies vacating the Order, as the defendants request. The court therefore affirms its Order.” “This case involves complex and unsettled issues pertaining to the respective roles of the legislative, executive and judicial branches,” Judge Trenga wrote. “One central issue is the extent to which the War on Terrorism may expand the ability of the executive branch to act in ways that cannot otherwise be justified.”
  • Over the objections of government attorneys, a federal judge said yesterday that he would require in camera review of documents that the government says are protected by the state secrets privilege. The issue arose in the case of Gulet Mohamed v. Eric Holder, challenging the constitutionality of the “no fly” list. The government had argued that it is “inappropriate” for a court to review such records to verify that they are validly privileged, and that instead the court should grant dismissal of case on the basis of official declarations. (Gov’t Resists court Review of State Secrets, Secrecy News, August 27). The government moved for reconsideration of an August 6 order to produce the records for in camera review. Yesterday, Judge Anthony J. Trenga of the Eastern District of Virginia granted the government’s motion for reconsideration, but he said that having reconsidered the matter, he determined that he had been right the first time around. “Upon reconsideration of its Order, however, the court finds that none of [the] objections justifies vacating the Order, as the defendants request. The court therefore affirms its Order.”
  • “This case involves complex and unsettled issues pertaining to the respective roles of the legislative, executive and judicial branches,” Judge Trenga wrote. “One central issue is the extent to which the War on Terrorism may expand the ability of the executive branch to act in ways that cannot otherwise be justified.” The Court “understands its limited institutional competence to assess claims of national security and its obligation not to extend its review of claims of state secrets beyond what is necessary for the Court to perform its institutional role,” Judge Trenga wrote. Nevertheless, under current circumstances “the Court concludes that it is necessary for the Court to review at this stage certain of the underlying documents as to which the state secrets privilege is asserted.” “This case involves the extraordinary exercise of executive branch authority to operate a program [the "no fly" procedure] that results in the deprivation of basic liberties according to secret executive branch decision making, without pre-deprivation judicial review…. [Therefore,] the Court has a particularly strong and heightened institutional responsibility in these circumstances to review and assess the propriety of such executive branch activity since to dismiss this case as the defendants request would, in essence, judicially sanction conduct that has far-reaching implications.”
  • ...1 more annotation...
  • Merely relying on government assertions of privilege without independent review of their basis and validity is inadequate since “In many instances, the privilege claims are conclusory, and it is difficult, if not impossible, to assess the merits of those claims….” “The Court therefore cannot accept, without further inquiry and review, that all of the documents as to which the state secrets privilege has been invoked in fact contain state secrets, or that any state secrets that might be contained in the listed documents would preclude the litigation of the plaintiff’s claims…,” Judge Trenga wrote. He ordered the government to produce the relevant documents for in camera review on or before October 15, 2014. In a footnote, Judge Trenga’s Order contains a rare judicial acknowledgment that “The government’s assertion of the state secrets privilege in certain cases has been less than reassuring. See Reynolds v. United States, 345 U.S. 1 (1953), in which it became apparent years later, after the claimed state secrets document was declassified, that it did not implicate state secrets….”
  •  
    The DoJ is likely to take an immediate appeal from this order. But federal judges are showing increasing hostility to the secrecy around the government's designation of people on the no-fly list. Whether the Supreme Court would support the government in a Due Process challenge to the secrecy of the no-fly list and its procedures is an open question.  
Gary Edwards

Congressional Power - 1 views

  •  
    Legal Brief on Congressional Power, Court Rulings, & the Constitution: The expressed powers of Congress are listed in the Constitution. Congress also has implied powers, which are based on the Constitution's right to make any laws that are "necessary and proper" to carry out those expressed powers. Congress has exercised its implied powers thousands of times over the years. Here are but a few major illustrations of that fact. 1780 1789 The Constitution gives expressed powers to Congress in Article 1, Section 8. 1800 1810 1819 In McCulloch v. Maryland, the Supreme Court holds that the powers to tax, borrow, and regulate commerce give Congress the implied power to establish a national bank. 1820 1824 Gibbons v. Ogden is the first commerce clause case to reach the Supreme Court. The broad definition of commerce the Court lays out in its ruling extends federal authority. 1830 1840 1850 1860 1862 The U.S. government issues its first legal tender notes, which are popularly called greenbacks. 1870 1870 In Hepburn v. Griswold the Supreme Court rules that the Constitution does not authorize the printing of paper money. 1870 The Court reverses its position on the printing of paper money and holds that issuing paper money is a proper use of the currency power in the Legal Tender cases. The decision in Juliard v. Greenman (1884) reaffirms this holding. 1880 1890 1890 The Sherman Antitrust Act, based on the commerce power, regulates monopolies and other practices that limit competition. 1900 1910 1920 1930 1935 The Wagner Act, based on the commerce power, recognizes labor's right to bargain collectively. 1935 The Social Security Act is passed. 1937 The Supreme Court upholds the Social Security Act of 1935 as a proper exercise of the powers to tax and provide for the general welfare in Steward Machine Co. v. Davis and Helvering v. Davis. 1940 1950 1956 The Interstate and National Highway Act, based on the commerce and war powers, provides for a national interstate highway system.
Paul Merrell

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the Court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another Court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
Paul Merrell

Obama lawyers asked secret court to ignore public court's decision on spying | US news | The Guardian - 0 views

  • The Obama administration has asked a secret surveillance court to ignore a federal court that found bulk surveillance illegal and to once again grant the National Security Agency the power to collect the phone records of millions of Americans for six months. The legal request, filed nearly four hours after Barack Obama vowed to sign a new law banning precisely the bulk collection he asks the secret court to approve, also suggests that the administration may not necessarily comply with any potential court order demanding that the collection stop.
  • But Carlin asked the Fisa court to set aside a landmark declaration by the second circuit court of appeals. Decided on 7 May, the appeals court ruled that the government had erroneously interpreted the Patriot Act’s authorization of data collection as “relevant” to an ongoing investigation to permit bulk collection. Carlin, in his filing, wrote that the Patriot Act provision remained “in effect” during the transition period. “This court may certainly consider ACLU v Clapper as part of its evaluation of the government’s application, but second circuit rulings do not constitute controlling precedent for this court,” Carlin wrote in the 2 June application. Instead, the government asked the court to rely on its own body of once-secret precedent stretching back to 2006, which Carlin called “the better interpretation of the statute”.
  • But the Fisa court must first decide whether the new bulk-surveillance request is lawful. On Friday, the conservative group FreedomWorks filed a rare motion before the Fisa court, asking it to reject the government’s surveillance request as a violation of the fourth amendment’s prohibition on unreasonable searches and seizures. Fisa court judge Michael Moseman gave the justice department until this coming Friday to respond – and explicitly barred the government from arguing that FreedomWorks lacks the standing to petition the secret court.
Paul Merrell

NSA grapples with huge increase in records requests - 0 views

  • Fueled by the Edward Snowden scandal, more Americans than ever are asking the National Security Agency if their personal life is being spied on.And the NSA has a very direct answer for them: Tough luck, we're not telling you.Americans are inundating the NSA with open-records requests, leading to an 888% increase in such inquiries in the past fiscal year. Anyone asking is getting a standard pre-written letter saying the NSA can neither confirm nor deny that any information has been gathered."This was the largest spike we've ever had," said Pamela Phillips, the chief of the NSA Freedom of Information Act and Privacy Act Office, which handles all records requests to the agency. "We've had requests from individuals who want any records we have on their phone calls, their phone numbers, their e-mail addresses, their IP addresses, anything like that."
  • News reports of the NSA's surveillance program motivates most inquirers, she said.During the first quarter of the NSA's last fiscal year, which went from October to December 2012, it received 257 open-records requests. The next quarter, it received 241. However, on June 6, at the end of NSA's third fiscal quarter, news of Snowden's leaks hit the press, and the agency got 1,302 requests.In the next three months, the NSA received 2,538 requests. The spike has continued into the fall months and has overwhelmed her staff, Phillips said
  • The first court challenge to the federal government's mass surveillance of Americans' phone and Internet records opened Monday with two potential strikes against it, but the judge predicted it could go all the way to the Supreme court.Federal District court Judge Richard Leon expressed concern that conservative activist Larry Klayman and others lacked standing to bring the case and that his court lacked jurisdiction -- factors that could further insulate the spy programs from public oversight."To me, this is the overarching question," Leon said, referring to "this court's authority or lack thereof to inject itself into this situation."
  • ...3 more annotations...
  • The two programs, made public earlier this year by Edward Snowden, a former National Security Agency contractor now living in Russia, are reviewed by a top-secret court under the Foreign Intelligence Surveillance Act. But challengers from the political right and left are trying to have that court's periodic approvals circumvented.From the right on Monday came Klayman, a former Reagan administration lawyer who leads the advocacy group Freedom Watch. In an hour-long hearing, he called Leon "the last guard ... the last sentry to the tyranny in this country."But Justice Department lawyer James Gilligan said Klayman lacked standing to bring the case because he cannot prove the NSA examined his phone or Internet records. Gilligan also said Leon cannot review the statutory authority granted by Congress under FISA -- only the secret courts and the Supreme court have that power.
  • Coincidentally, the Supreme Court on Monday turned down a chance to review the NSA's harvesting of Verizon phone records in a case brought by the watchdog group Electronic Privacy Information Center. The justices offered no reason for their decision.The law "makes it very difficult to challenge these determinations,' said Marc Rotenberg, president of the privacy group.Another challenge, brought by the American Civil Liberties Union, will be heard by U.S. District Court Judge William Pauley in Manhattan on Friday. Those two cases are likely to be appealed "upstairs," Leon said -- to appeals Courts and possibly the Supreme Court.Both Klayman and the ACLU are seeking preliminary injunctions that would put a halt to the NSA surveillance. Both have targeted a program that sweeps up domestic telephone records, even though the targets are foreign terrorists. Klayman also is challenging a separate program that goes after cellphone and computer data from major wireless companies and Internet service providers.
  • Amnesty International and a coalition of lawyers, journalists and others brought the last Supreme Court challenge to government surveillance programs in 2012. But in February, the justices ruled 5-4 that the challengers lacked standing because they could not prove they had been wiretapped.Even if judges rule against Klayman and the ACLU, the controversial programs may get a full Court test because the Justice Department has begun notifying criminal defendants whose arrests were based on warrantless surveillance. That makes the prospect of a future Supreme Court case more likely.
Paul Merrell

CSIS asked foreign agencies to spy on Canadians, kept court in dark, judge says - 0 views

  • OTTAWA — Canada’s foremost jurist on national security law has slammed CSIS for deliberately keeping the Federal Court of Canada “in the dark” about outsourcing its spying on Canadians abroad to foreign agencies, according to a redacted version of a classified Court decision made public Friday.In a thundering rebuke, Federal Court Judge Richard Mosley said the Canadian Security Intelligence Service (CSIS) purposely misled him when he granted it numerous warrants beginning in 2009 to intercept the electronic communications of unidentified Canadians abroad suspected as domestic security threats.“This was a breach of the duty of candour owed by the service and their legal advisers to the Court,” Mosley said in his Further Reasons for Order.CSIS also mistakenly assigned powers to the warrants that the Court never authorized and which do not exist in law, he said.“It is clear that the exercise of the Court’s warrant issuing authority has been used as protective cover for activities that it has not authorized,” Mosley wrote.Furthermore, tasking foreign security intelligence services to spy on Canadians overseas “carries the risk of the detention of or other harm to a Canadian person based on that information.“Given the unfortunate history of information sharing with foreign agencies over the past decade and the reviews conducted by several royal commissions, there can be no question that the Canadian agencies are aware of those hazards. It appears to me that they are using the warrants as authorization to assume those risks.”
  • Legal observers say this case and Mosley’s scolding will harm CSIS’s credibility and raise questions about whether the service has broken Criminal Code provisions dealing with the invasion of privacy.“When a judge says the government breached its duty of candour that is a very big ‘ouch’ moment,” Craig Forcese, a national security law scholar at the University of Ottawa, wrote in a recent blog posting.At the time the first warrants were issued, CSIS told the court “on clearly stated grounds” that the electronic intercepts would be carried out from within Canada by the Communications Security Establishment Canada (CSEC), the country’s foreign signals intelligence spy service.CSIS is largely restricted to domestic spying operations. If an investigation involves the use of intrusive techniques, such as electronic intercepts, Section 21 of the CSIS Act requires it to obtain a warrant approved by a Federal court judge to guard the Charter right to a reasonable expectation of privacy.CSEC, meanwhile, is not allowed to spy on Canadians anywhere unless it is to provide technical and operational assistance to federal law enforcement and security agencies such as CSIS.And the federal court only has jurisdiction to authorize warrants under the CSIS Act as long as the communications in question are intercepted within Canada.
  • Yet once the so-called 30-08 warrants were approved by the court, CSEC, on behalf of CSIS, turned around and handed the jobs to one or more of its partners in the “Five Eyes” intelligence-gathering alliance between Canada, the United States, Great Britain, Australia and New Zealand.Mosley found out about the situation late this summer and summoned CSIS, CSEC and government officials and lawyers to court to explain themselves. The public version of his reasons for order was released Friday.
  • ...2 more annotations...
  • Some excerpts:• “I am satisfied that a decision was made by CSIS officials in consultation with their legal advisers to strategically omit information in applications for 30-08 warrants about their intention to seek the assistance of the foreign partners. As a result, the court was led to believe that all of the interception activity would take place in or under the control of Canada.”• “The principle of comity between nations that implies the acceptance of foreign laws and procedures when Canadian officials are operating abroad ends where clear violations of international law and human rights begin. In tasking the other members of the Five Eyes to intercept the communications of the Canadian targets, CSIS and CSEC officials knew ... this would involve the breach of international law by the requested second parties.”• “There is nothing in any of the material that I have read ... that persuades me that it was the intent of Parliament to give the service authority to engage the collection resources of the second party allies to intercept the private communications of Canadians.”• “It must be made clear, in any grant of a 30-08 warrant, that the warrant does not authorize the interception of the communications of a Canadian person by any foreign service on behalf of the service either directly or through the assistance of CSEC.”• “There must be no further suggestion in any reference to the use of second party assets by CSIS and CSEC, or their legal advisers, that it is being done under the authority of a (section) 21 warrant issued by this court.”
  • Forcese, meanwhile, raises some intriguing questions:• If Five Eyes assistance was not authorized, and CSEC and CSIS nevertheless sought it, are they still protected from Criminal Code, Part VI (invasion of privacy) culpability? Culpability, he writes, is only avoided where the intercept is lawfully authorized. If the parameters of the warrant were disregarded, does that vitiate the lawful access?• If CSEC and CSIS called on Five Eyes agencies to intercept communications, was the intercept still territorial, thus satisfying the international law concerns raised in the two warrant applications?“Outsourcing an international violation does not diminish state responsibility for that international violation. In a different context, that would be like asking bounty hunters to do your kidnapping of fugitives on the territory of a foreign state. Still a violation of international law.”CSIS has a choice, Forcese concludes: “Conduct extraterritorial spying without recourse to the courts, at risk of ultimately being called to account under domestic law, or honour the federal court’s construal of international law — and CSIS’s jurisdiction — and pull in its truly international surveillance operations, potentially blinding the country’s chief security intelligence agency.
  •  
    Canadian Security Intelligence Service is in politically explosive deep doo-doo. 
Gary Edwards

Seven Things You Should Know about the IRS Rule Challenged in King v. Burwell | Cato Institute - 0 views

  •  
    "By Michael F. Cannon and Jonathan H. Adler This article appeared on National Review (Online) on March 4, 2015. This week, the Supreme Court considers King v. Burwell. At issue is whether the IRS exceeded its authority under the Patient Protection and Affordable Care Act by issuing a final IRS rule that expanded the application of the Act's subsidies and mandates beyond the limits imposed by the statute. King v. Burwell is not a constitutional challenge. It challenges an IRS rule as being inconsistent with the Act it purports to implement. The case is a straightforward question of statutory interpretation. Here are seven things everyone needs to know about how the IRS developed the rule at issue in King v. Burwell. But first, a little background. If you're familiar with the case, you can skip to number one. Background Section 1311 of the Act directs states to establish health-insurance "Exchanges." Section 1321 directs the Secretary of Health and Human Services to establish Exchanges in states that "fail[]" to establish Exchanges. Confounding expectations, 38 states failed to establish Exchanges, in almost every case due to opposition to the Act. Section 1401 (creating I.R.C. § 36B) authorizes health-insurance subsidies (nominally, tax credits) "through an Exchange established by the State." The availability of those subsidies triggers tax penalties under the law's individual and employer mandates. In January 2014, the IRS began issuing those subsidies and imposing the resulting penalties through not only state-established Exchanges but also Exchanges established by the federal government as well (i.e., HealthCare.gov). In King v. Burwell, the plaintiffs allege that the IRS exceeded its powers under the Act by issuing a so-called final rule that purports to authorize subsidies in states with Exchanges established by the federal government. The plaintiffs claim that the rule and the subsidies being issued in such states are unlawful, because
Paul Merrell

Court Accepts DOJ's 'State Secrets' Claim to Protect Shadowy Neocons: a New Low - The Intercept - 0 views

  • A truly stunning debasement of the U.S. justice system just occurred through the joint efforts of the Obama Justice Department and a meek and frightened Obama-appointed federal judge, Edgardo Ramos, all in order to protect an extremist neocon front group from scrutiny and accountability. The details are crucial for understanding the magnitude of the abuse here. At the center of it is an anti-Iranian group calling itself “United Against Nuclear Iran” (UANI), which is very likely a front for some combination of the Israeli and U.S. intelligence services. When launched, NBC described its mission as waging “economic and psychological warfare” against Iran. The group was founded and is run and guided by a roster of U.S., Israeli and British neocon extremists such as Joe Lieberman, former Bush Homeland Security adviser (and current CNN “analyst”) Fran Townsend, former CIA Director James Woolsey, and former Mossad Director Meir Dagan. One of its key advisers is Olli Heinonen, who just co-authored a Washington Post Op-Ed with former Bush CIA/NSA Director Michael Hayden arguing that Washington is being too soft on Tehran.
  • This group of neocon extremists was literally just immunized by a federal court from the rule of law. That was based on the claim — advocated by the Obama DOJ and accepted by Judge Ramos — that subjecting them to litigation for their actions would risk disclosure of vital “state secrets.” The court’s ruling was based on assertions made through completely secret proceedings between the court and the U.S. government, with everyone else — including the lawyers for the parties — kept in the dark. In May 2013, UANI launched a “name and shame” campaign designed to publicly identify — and malign — any individuals or entities enabling trade with Iran. One of the accused was the shipping company of Greek billionaire Victor Restis, who vehemently denies the accusation. He hired an American law firm and sued UANI for defamation in a New York federal court, claiming the “name and shame” campaign destroyed his reputation.
  • Up until that point, there was nothing unusual about any of this: just a garden-variety defamation case brought in court by someone who claims that public statements made about him are damaging and false. That happens every day. But then something quite extraordinary happened: In September of last year, the U.S. government, which was not a party, formally intervened in the lawsuit, and demanded that the court refuse to hear Restis’s claims and instead dismiss the lawsuit against UANI before it could even start, on the ground that allowing the case to proceed would damage national security. When the DOJ intervened in this case and asserted the “state secrets privilege,” it confounded almost everyone. The New York Times’s Matt Apuzzo noted at the time that “the group is not affiliated with the government, and lists no government contracts on its tax forms. The government has cited no precedent for using the so­-called state­ secrets privilege to quash a private lawsuit that does not focus on government activity.” He quoted the ACLU’s Ben Wizner as saying: “I have never seen anything like this.” Reuters’s Allison Frankel labeled the DOJ’s involvement a “mystery” and said “the government’s brief is maddeningly opaque about its interest in a private libel case.”
  • ...2 more annotations...
  • But in this case, there is no apparent U.S. government conduct at issue in the lawsuit. At least based on what they claim about themselves, UANI is just “a not-for-profit, non-partisan, advocacy group” that seeks to “educate” the public about the dangers of Iran’s nuclear program. Why would such a group like this even possess “state secrets”? It would be illegal to give them such material. Or could it be that the CIA or some other U.S. government agency has created and controls the group, which would be a form of government-disseminated propaganda, which happens to be illegal? What else could explain the basis for the U.S. government’s argument that allowing UANI to be sued would risk the disclosure of vital “state secrets” besides a desire to cover up something quite untoward if not illegal? What “state secrets” could possibly be disclosed by suing a nice, little “not-for-profit, non-partisan, advocacy group”?
  • This sham worked. This week, Judge Ramos issued his ruling dismissing the entire lawsuit (see below). As a result of the DOJ’s protection, UANI cannot be sued. Among other things, it means this group of neocon extremists now has a license to defame anyone they want. They can destroy your reputation with false accusations in a highly public campaign, and when you sue them for it, the DOJ will come in and whisper in the judge’s ear that national security will be damaged if — like everyone else in the world — UANI must answer in a court of law for their conduct. And subservient judicial officials like Judge Ramos will obey the U.S. government’s dictates and dismiss your lawsuit before it begins, without your having any idea why that even happened. Worse, in his written ruling, the judge expressly acknowledges that dismissal of the entire lawsuit at the start on secrecy grounds is what he calls a “harsh sanction,” and also acknowledges that “it is particularly so in this case because Plaintiffs not only do not get their day in court, but cannot be told why” (emphasis added). But he does it anyway, in a perfunctory 18-page opinion that does little other than re-state some basic legal principles, and then just concludes that everything the government whispered in his ear should be accepted.
  •  
    Unless the district court decision is overturned by a higher court, the Restis case looks to be over. The secrecy concerns of the Dark State trump justice, again. It should be noted that the Constitution is silent on the issue of state secrets (the so-called "state secrets privilege" was manufactured from whole cloth by the Supreme court in the early 1950s). On the other hand, several provisions of the Constitution expressly require that justice be done, not the least of which is the Due Process clause.  
Paul Merrell

Fisa court documents reveal extent of NSA disregard for privacy restrictions | World news | theguardian.com - 0 views

  • Newly declassified court documents indicate that the National Security Agency shared its trove of American bulk email and internet data with other government agencies in violation of specific court-ordered procedures to protect Americans’ privacy. The dissemination of the sensitive data transgressed both the NSA’s affirmations to the secret surveillance court about the extent of the access it provided, and prompted incensed Fisa court judges to question both the NSA’s truthfulness and the value of the now-cancelled program to counter-terrorism. While the NSA over the past several months has portrayed its previous violations of Fisa court orders as “technical” violations or inadvertent errors, the oversharing of internet data is described in the documents as apparent widespread and unexplained procedural violations. “NSA’s record of compliance with these rules has been poor,” wrote judge John Bates in an opinion released on Monday night in which the date is redacted.
  • “Most notably, NSA generally disregarded the special rules for disseminating United States person information outside of NSA until it was ordered to report such disseminations and to certify to the [Fisa court] that the required approval had been obtained.” In addition to improperly permitting access to the email and internet data – intended to include information such as the “to” “from” and “BCC” lines of an email – Bates found that the NSA engaged in “systemic overcollection”, suggesting that content of Americans’ communications was collected as well.
  • The court had required the NSA to comply with a longstanding internal procedure for protecting Americans’ sensitive information prior to sharing the data internally within NSA, known as United States Signals Intelligence Directive 18 (USSID 18) and also declassified on Monday night; and additionally required a senior NSA official to determine that any material shared outside the powerful surveillance agency was related to counter-terrorism. Yet in a separate Fisa court document, the current presiding judge, Reggie Walton, blasted the government’s secret declaration that it followed USSID 18 “rather than specifically requiring that the narrower dissemination provision set forth in the court’s orders in this matter be strictly adhered to”. Walton wrote: “The court understands this to mean that the NSA likely has disseminated US person information derived from the [email and internet bulk] metadata outside NSA without a prior determination from the NSA official designated in the court’s orders that the information is related to counter-terrorism information and is necessary to understand the counter-terrorism information or assess its importance.”
  • ...3 more annotations...
  • In an opinion apparently written in June 2009, Walton said the court was “gravely concerned” that “NSA analysts, cleared and otherwise, have generally not adhered to the dissemination restrictions proposed by the government, repeatedly relied on by the court in authorizing the [email and internet bulk] metadata, and incorporated into the court’s orders in this matter [redacted] as binding on NSA.” Walton said the NSA’s legal team had failed to satisfy the training requirements that NSA frequently points to in congressional testimony as demonstrating its scrupulousness. Walton added that he was “seriously concerned” by the placement of Americans’ email and internet metadata into “databases accessible by outside agencies, which, as the government has acknowledged, violates not only the court’s orders, but also NSA’s minimization and dissemination procedures as set forth in USSID 18.”
  • In 2011, Bates wrote that the “volume and nature” of the NSA’s bulk collection on foreign internet content was “fundamentally different from what the court had been led to believe”. Yet the documents disclosed Monday night, thanks to a transparency lawsuit, show that Bates and Walton permitted the surveillance of Americans’ bulk email and internet metadata to continue under additional restrictions, out of concern for the ongoing terrorism threat.
  • Elizabeth Goitien of the Brennan Center for Justice at New York University said that the declassified opinions raise disturbing questions about the NSA’s truthfulness. “Either the NSA is really trying to comply with the court’s orders and is absolutely incapable of doing so, in which case it’s terrifying that they’re performing this surveillance, or they’re not really trying to comply,” Goitien said. “Neither of those explanations is particularly comforting.”
Paul Merrell

Polish Outrage to Paying Victims of CIA Black Sites-and What the Eur Court Said | Just Security - 0 views

  • Poland will be paying a quarter of a million dollars to two Guantánamo detainees, Abu Zubaydah and Abd al-Rahim al-Nashiri. The payment arises in the context of the torture of the terror suspects at a CIA “black site” operating on Polish territory. Last July, the European Court of Human Rights handed down its much-awaited judgments in the cases of Abd al-Rahim al-Nashiri v. Poland and Husayn (Abu Zubaydah) v. Poland in relation to Poland’s involvement in the CIA rendition, detention and interrogation program. The Court ruled that Poland violated the substantive and procedural aspects of the detainees’ right to be free from torture or inhuman or degrading treatment or punishment (Article 3, European Convention on Human Rights). The Court also found violations of, among other rights, Articles 5 (liberty and security), 8 (private and family life), and 13 (effective remedy) of the ECHR. The Court ordered the Polish government to pay €130,000 to Zubaydah and €100,000 to al-Nashiri, within three months from when the judgments become final. Poland appealed the ruling, but the request was rejected by a Grand Chamber panel on February 16, making last weekend the deadline for the payments. The Polish Foreign Ministry said on Friday that it was processing the payments, AP’s Vanessa Gera reported.
  • Poland will be paying a quarter of a million dollars to two Guantánamo detainees, Abu Zubaydah and Abd al-Rahim al-Nashiri. The payment arises in the context of the torture of the terror suspects at a CIA “black site” operating on Polish territory. Last July, the European Court of Human Rights handed down its much-awaited judgments in the cases of Abd al-Rahim al-Nashiri v. Poland and Husayn (Abu Zubaydah) v. Poland in relation to Poland’s involvement in the CIA rendition, detention and interrogation program. The Court ruled that Poland violated the substantive and procedural aspects of the detainees’ right to be free from torture or inhuman or degrading treatment or punishment (Article 3, European Convention on Human Rights). The Court also found violations of, among other rights, Articles 5 (liberty and security), 8 (private and family life), and 13 (effective remedy) of the ECHR. The Court ordered the Polish government to pay €130,000 to Zubaydah and €100,000 to al-Nashiri, within three months from when the judgments become final. Poland appealed the ruling, but the request was rejected by a Grand Chamber panel on February 16, making last weekend the deadline for the payments. The Polish Foreign Ministry said on Friday that it was processing the payments, AP’s Vanessa Gera reported.
  • But the Court took a different, more robust view and found significant responsibility on part of the Polish government. The Court held (my emphasis added): “517. … Notwithstanding the [Article 3] Convention obligation, Poland, for all practical purposes, facilitated the whole process, created the conditions for it to happen and made no attempt to prevent it from occurring. As the Court has already held above, on the basis of their own knowledge of the CIA activities deriving from Poland’s complicity in the [High-Value Detainees Program] Programme and from publicly accessible information on treatment applied in the context of the “war on terror” to terrorist suspects in US custody the authorities – even if they did not witness or participate in the specific acts of ill-treatment and abuse endured by the applicant – must have been aware of the serious risk of treatment contrary to Article 3 occurring on Polish territory.”
  • ...3 more annotations...
  • The ruling, which predated the publication of the redacted version of the Senate Intelligence Committee report on the CIA program, brought important judicial scrutiny to the agency’s post-9/11 practices, including the controversial role played by U.S. allies. The Senate report has since provided some further details about Poland’s involvement, although the country is not identified by name. The AP report notes the frustration of those in Poland who view the ruling as unjustifiably punishing the country for CIA actions. An opposition Polish lawmaker has recorded his discontent, stating that the terror suspects remained in the sole custody of U.S. officials throughout their detention. Former Foreign Minister Radoslaw Sikorski has similarly been quoted by the LA Times’ Carol Williams as saying:  “We might have to pay compensation even though our personnel did nothing wrong. You can imagine how Polish people feel about it … We just wish that intelligence matters were kept confidential.”
  • While some in Poland are expressing their exasperation with the Court’s ruling, the issue of compensation has sparked equal outrage among some in the United States who do not believe that suspects of terrorist attacks should receive payments, as noted by the AP. The controversy over compensation comes just as the U.S. faces renewed calls from some European and other countries to compensate victims of CIA torture. At the UN Human Rights Council last week, the Universal Periodic Review report on the United States documented other UN member states’ objections to U.S. practices.
  • Meanwhile, in Europe, more judgments are pending on this subject, including two involving the same detainees (see: Abu Zubaydah v. Lithuania and Al Nashiri v. Romania). While accountability within the U.S. still seems like a pipe dream, the European Court of Human Right’s more robust approach perhaps offers the only means of securing reparation for human rights abuses committed as part of the “war on terror.” The Court’s approach may also help to educate European citizens on the nature of complicity in grave human rights abuses. By calling for compensation, the Court has also served to weaken the forms of international cooperation that foster such violations in the first place.
Paul Merrell

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
1 - 20 of 995 Next › Last »
Showing 20 items per page