Tag: Law

Obama’s Never Ending War

The Authorization to Use Military Force is a joint resolution passed by the United States Congress on September 14, 2001, authorizing the use of United States Armed Forces against those responsible for the attacks on September 11, 2001. During a hearing before the Senate Armed Services Committee, Pentagon officials testified that the authorization would be needed for another 10 to 20 years and could be used anywhere from “Boston to FATA (Pakistan’s federally administered tribal areas).” According to the interpretation of these officials this could be done under the current AUMF without any further authorization from Congress. Those claims elicited disbelief, even from war hawk Sen. John McCain (R-AZ) who said, “For you to come here and say we don’t need to change it or revise or update it, I think is, well, disturbing.”

Indeed, but disturbing is an understatement, but none of the Senators suggested that the powers under the AUMF be dialed back.

Testifying before the committee on May 16 were Assistant Defense Secretary Michael Sheehan; Robert Taylor, the acting general counsel for the Department of Defense; Brig. Gen. Richard Gross, Legal Counsel, Chairman of the Joint Chiefs of Staff; and Gen. Michael Nagata, Deputy Director for Special Operations/Counterterrorism, J-37, Joint Staff

This excerpt of the hearing from Democracy Now includes Sen. Lindsey Graham (R-SC); Robert Taylor, acting general counsel, Department of Defense; Michael Sheehan, assistant secretary of defense for special operations/low-intensity conflict, Department of Defense; and Sen. Angus King (I-Maine).



Transcript is here

From Glenn Greenwald at the Guardian on Pres. Obama’s permanent war on terror:

That the Obama administration is now repeatedly declaring that the “war on terror” will last at least another decade (or two) is vastly more significant than all three of this week’s big media controversies (Benghazi, IRS, and AP/DOJ) combined. The military historian Andrew Bacevich has spent years warning that US policy planners have adopted an explicit doctrine of “endless war”. Obama officials, despite repeatedly boasting that they have delivered permanently crippling blows to al-Qaida, are now, as clearly as the English language permits, openly declaring this to be so.

It is hard to resist the conclusion that this war has no purpose other than its own eternal perpetuation. This war is not a means to any end but rather is the end in itself. Not only is it the end itself, but it is also its own fuel: it is precisely this endless war – justified in the name of stopping the threat of terrorism – that is the single greatest cause of that threat. [..]

The genius of America’s endless war machine is that, learning from the unplesantness of the Vietnam war protests, it has rendered the costs of war largely invisible. That is accomplished by heaping all of the fighting burden on a tiny and mostly economically marginalized faction of the population, by using sterile, mechanized instruments to deliver the violence, and by suppressing any real discussion in establishment media circles of America’s innocent victims and the worldwide anti-American rage that generates.

Though rarely visible, the costs are nonetheless gargantuan. Just in financial terms, as Americans are told they must sacrifice Social Security and Medicare benefits and place their children in a crumbling educational system, the Pentagon remains the world’s largest employer and continues to militarily outspend the rest of the world by a significant margin. The mythology of the Reagan presidency is that he induced the collapse of the Soviet Union by luring it into unsustainable military spending and wars: should there come a point when we think about applying that lesson to ourselves?

Then there are the threats to Americans’ security. Having their government spend decades proudly touting itself as “A Nation at War” and bringing horrific violence to the world is certain to prompt more and more people to want to attack Americans, as the US government itself claims took place just recently in Boston (and as clearly took place multiple other times over the last several years). [..]

The Obama administration already claims the power to wage endless and boundless war, in virtually total secrecy, and without a single meaningful check or constraint. No institution with any power disputes this. To the contrary, the only ones which exert real influence – Congress, the courts, the establishment media, the plutocratic class – clearly favor its continuation and only think about how further to enable it. That will continue unless and until Americans begin to realize just what a mammoth price they’re paying for this ongoing splurge of war spending and endless aggression.

Harvard Law professor and former Bush DOJ official Jack Goldsmith, who also testified, wrote this at the end of his brief summery of the hearing:

My general impression of the hearing was that (1) DOD officials were very uncomfortable talking about how they interpret the AUMF and what groups are covered by it, (2) those officials interpret the AUMF very broadly, and (3) several members of the Committee were surprised by the breadth of DOD’s interpretation of the AUMF.  I came away thinking that Congress cannot address the problem of extra-AUMF threats until it gets a handle on how the AUMF is being interpreted and deployed.  I also came away thinking more than ever that Congress needs to re-engage in a serious way about the nature and scope of the conflict against al Qaeda and affiliates.  Amazingly, there is a very large question even in the Armed Services Committee about who the United States is at war against and where, and how those determinations are made.

The solutions are for Congress to repeal the AUMF or for the Supreme Court to declare it unconstitutional. Don’t hold your breath for either of those things happening.

AP-Gate Just Got Worse

Regardless of the left’s opinion of Fox News, the Obama administration has gone way over the constitutional line and this is adds to the serious threat to freedom of the press. The idea that the government. on its unconstrained wild hunt for whistle blowers, can issue secret subpoenas for telephone records just got worse this morning. The case is being made against Fox News reporter James Rosen for his reporting on the possibility that North Korea would respond to additional UN sanctions with more nuclear tests back in 2009. The Department of Justice is prosecuting State Department adviser and arms expert Stephen Jin-Woo Kim for “leaking” the information to James Rosen of Fox News. To makes the case against Rosen this is what the DOJ did:

They used security badge access records to track the reporter’s comings and goings from the State Department, according to a newly obtained court affidavit. They traced the timing of his calls with a State Department security adviser suspected of sharing the classified report. They obtained a search warrant for the reporter’s personal e-mails. [..]

Court documents in the Kim case reveal how deeply investigators explored the private communications of a working journalist – and raise the question of how often journalists have been investigated as closely as Rosen was in 2010. The case also raises new concerns among critics of government secrecy about the possible stifling effect of these investigations on a critical element of press freedom: the exchange of information between reporters and their sources.

First, Kim did not obtain these documents illegally, he had access to them, He did not steal or sell the documents, or pass them to an enemy agent of the US. He gave, what is for all intents and purposes, innocuous information to a news reporter. For that Kim is being prosecuted under the Espionage Act. Now the DOJ is seeking to prosecute Rosen for revealing the information.

Glenn Greenwald reiterated that it is not against US law to to publish classified information and is far worse than the secret subpoena of the phone records of the Associated Press:

The focus of the Post’s report yesterday is that the DOJ’s surveillance of Rosen, the reporter, extended far beyond even what they did to AP reporters. The FBI tracked Rosen’s movements in and out of the State Department, traced the timing of his calls, and – most amazingly – obtained a search warrant to read two days worth of his emails, as well as all of his emails with Kim. In this case, said the Post, “investigators did more than obtain telephone records of a working journalist suspected of receiving the secret material.” It added that “court documents in the Kim case reveal how deeply investigators explored the private communications of a working journalist”.

But what makes this revelation particularly disturbing is that the DOJ, in order to get this search warrant, insisted that not only Kim, but also Rosen – the journalist – committed serious crimes. The DOJ specifically argued that by encouraging his source to disclose classified information – something investigative journalists do every day – Rosen himself broke the law.

In an affidavit (pdf) from the FBI by Agent Reginald B. Reyes in the application for the search warrant, Reyes alleged that because Rosen and Kim used aliases to protect their communications and sought ways to maintain confidentiality, all completely legal for journalists to do, Rosen was acting “much like an intelligence officer would run an [sic] clandestine intelligence source, the Reporter instructed Mr. Kim on a covert communications plan… to facilitate communication with Mr. Kim and perhaps other sources of information.”

In her comparison of this case with the Associated Press, and cases against James Risen of The New York Times and Bradley Manning, Marcy Wheeler notes that Agent Reyes used the strategy of painting Rosen as criminal to circumvent the “Privacy Protection Act protections for media work product” in order to obtain the warrant for Rosen’s e-mails and other records:

In other words, during a period from May 2010 through January 2011, Eric Holder’s DOJ was developing this theory under which journalists were criminals, though it’s just now that we’re all noticing this May 2010 affidavit that lays the groundwork for that theory.

Maybe that development was predictable, given that during precisely that time period, the lawyer who fucked up the Ted Stevens prosecution, William Welch, was in charge of prosecuting leaks (though it’s not clear he had a role in Kim’s prosecution before he left in 2011).

But it’s worth noting the strategy – and the purpose it serves – because it is almost certainly still in effect. FBI Special Agent Reginald Reyes accused Rosen of being a criminal so he could get around the Privacy Protection Act protections for media work product (See pages 4 and following), which specifically exempts “fruits of a crime” or “property … used [] as a means of committing a criminal offense.” Then he further used it to argue against giving notice to Fox or Rosen.

   Because of the Reporter’s own potential criminal liability in this matter, we believe that requesting the voluntary production of the materials from Reporter would be futile and would pose a substantial threat to the integrity of the investigation and of the evidence we seek to obtain by the warrant. (29)

While the AP’s phone records weren’t taken via a warrant, it would be unsurprising if the government is still using this formula – journalists = criminals and therefore cannot have notice – to collect evidence. Indeed, that may be one reason why we haven’t seen the subpoena to the AP.

It is very clear that this is an unprecedented threat to freedom of the press and the Obama administration has escalated this war since Obama took office in 2009.

In an interview last week with Amy Goodman and Nermeen Shaikh, senior fellow at The Nation Institute Chis Hedges, called the monitoring of the AP phone records “one more assault in a long series of assault against freedom of information and freedom of the press.”

“Talk to any investigative journalist who must investigate the government, and they will tell you that there is a deep freeze. People are terrified of speaking, because they’re terrified of going to jail.”

~Chris Hedges~

Here is Mr. Hedges piece from Truthdig documenting The Death of Truth

Other related articles from Glenn Greenwald at The Guardian:

Justice Department’s pursuit of AP’s phone records is both extreme and dangerous

The major sea change in media discussions of Obama and civil liberties

Are We Really the Reality Based Community? We Don’t Act Like It.

This is not directed at the reality based The Stars Hollow Gazette community.

And by “we” I don’t mean me or I, because I make a good effort to at least try. I’m talking about blogs like Daily Kos. I had always assumed, because of the many insightful writers on the site and on the front page that was the case. However, we are starting to see some of what we see with corporate control of all airwaves in how site moderation is run.

For instance, whether on Fox News, CNN or MSNBC there is always a fake debate when it comes to climate change which is undeniably happening since we have hit 400 ppm of CO2 in our atmosphere for the first time in 3 million years. When this spectacle that pretends to be a live debate on TV happens, there are always two guys picked by the network to come on TV to debate the issue; one a NASA scientist like say James Hansen and one fringe dwelling Koch funded climate changed denier to debate as if there is something to debate as if both sides have an equal argument to make. WRONG. The science is in.

I always thought we in the progressive blogosphere prided ourselves on not accepting that dynamic, but now I am starting to wonder. On the issues I go to great lengths to cover when it comes to the economy, there are certain undeniable facts that have to be acknowledged whether you are a Post Keynesian MMT proponent like me or not. I mean, if we are any different than debates on red state or the corporate owned media, that is. I have to wonder about that now, because it now appears from what went on in my last diary in the comment section that a moderator here stepped in and made an effort to portray the troll like behavior and continual denial of established facts in every diary of mine as “just an honest disagreement.”

It was inferred that I was “out of line” for accurately describing a commentator while using a term that accurately describes his brand of troll like behavior. That’s not out of line. When people act like trolls in every diary of mine I can only ignore it for so long before calling it out directly. We can’t just ignore this kind of behavior forever in this community. I mean, not if we still consider ourselves part the reality based community. Do we?

CISPA IS Dead, For Now

CISPA Kitty photo blog_cispacat_zps96b502e5.jpgThe Senate will not vote on the Cyber Intelligence Sharing and Protection Act, CISPA, that was passed by the House last week.

Sen. Jay Rockefeller (D-W.V.), who is chairman of the Senate Commerce Committee, “believes that information sharing is a key component of cybersecurity legislation, but the Senate will not take up CISPA,” a committee staffer told HuffPost.

A staffer for the Senate Intelligence Committee said the committee also is working on an information-sharing bill and will not take up CISPA.

“We are currently drafting a bipartisan information sharing bill and will proceed as soon as we come to an agreement,” Sen. Dianne Feinstein (D-Calif.), chairwoman of the Senate Intelligence Committee, said in a statement Thursday.

CISPA Is ‘Dead for Now,’ Thanks to a Left-Right Coalition for Online Privacy

by John Nichols, The Nation

What brings the most seriously libertarian Republican in the US House, Michigan’s Justin Amash, together with Congressional Progressive Caucus co-chair Keith Ellison, D-Minnesota?

What unites long-time Ronald Reagan aide Dana Rohrabacher, R-California, with liberal firebrand Alan Grayson, D-Florida?

What gets steadily conservative former House Judiciary Committee chair James Sensenbrenner, R-Wisconsin, together with progressive former House Judiciary Committee chair John Conyers Jr., D-Michigan?

The Fourth Amendment to the Constitution, which has for 222 years promised that “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

That’s an old commitment that members of Congress swear an oath to uphold. [..]

CISPA actually won 288 “yes” votes in the House, but the 127 “no” votes-coming from principled members on both sides of the aisle-sent a strong message to the more deliberative Senate. In combination with a grassroots campaign spearheaded by tech-savvy privacy activists and a threatened veto by President Obama, the bipartisan House opposition appears to have convinced Senate leaders have signaled that they plan to put the legislation on hold. The American Civil Liberties Union on Thursday suggestion that CISPA looks to be “dead for now.”

ACLU: CISPA Is Dead (For Now)

By Jason Koebler, US News

The Senate will not take up the controversial cybersecurity bill, is drafting separate legislation

“I think it’s dead for now,” says Michelle Richardson, legislative council with the ACLU. “CISPA is too controversial, it’s too expansive, it’s just not the same sort of program contemplated by the Senate last year. We’re pleased to hear the Senate will probably pick up where it left off last year.”

That’s not to say Congress won’t pass any cybersecurity legislation this year. Both Rockefeller and President Obama want to give American companies additional tools to fight back against cyberattacks from domestic and foreign hackers.

But cybersecurity legislation in the Senate, such as the Cybersecurity and American Cyber Competitiveness Act of 2013, has greater privacy protections than CISPA does. Richardson says that bill makes it clear that companies would have to “pull out sensitive data [about citizens]” before companies send it to the government and also puts the program under “unequivocal civilian control,” something CISPA author Rep. Mike Rogers, R-Mich., was unwilling to do.

Even if the Senate gets something done, Rogers and other CISPA supporters will likely have to compromise more than they’ve been willing to over the past year as Obama has made it clear he will veto legislation that doesn’t have more privacy protections.

CISPA Is Dead. Now Let’s Do a Cybersecurity Bill Right

by Julian Sanchez, Wired

Americans have grown so accustomed to hearing about the problem of “balancing privacy and security” that it sometimes feels as though the two are always and forever in conflict – that an initiative to improve security can’t possibly be very effective unless it’s invading privacy. Yet the conflict is often illusory: A cybersecurity law could easily be drafted that would accomplish all the goals of both tech companies and privacy groups without raising any serious civil liberties problems.

Few object to what technology companies and the government say they want to do in practice: pool data about the activity patterns of hacker-controlled “botnets,” or the digital signatures of new viruses and other malware. This information poses few risks to the privacy of ordinary users. Yet CISPA didn’t authorize only this kind of narrowly limited information sharing. Instead, it gave companies blanket immunity for feeding the government vaguely-defined “threat indicators” – anything from users’ online habits to the contents of private e-mails – creating a broad loophole in all federal and state privacy laws and even in private contracts and user agreements.

Given that recent experience has shown companies shielded by secrecy often err on the side of oversharing with the government, that loophole was a key concern. So why the gap between what the law permits and its supporters’ aims?

It’s a principle wonks call tech neutrality. Nobody wants to write a bill that refers too specifically to the information needed to protect current networks (like “Internet Protocol addresses” or “Netflow logs”) since technological evolution would render such language obsolete over time.

The World Is a Battlefield

Since after 9/11, the United States has been engaged in a global war on terror (GWOT). Even as the illegal was in Iraq has allegedly ended and the one in Afghanistan finally begins to wind down almost 2 years after Osama bin Laden’s assassination, the US has widened its war in East Asia to the Arabian Peninsula and Africa sending in military on the ground as “advidsors” and unmanned armed drones to carry out “targeted strikes.” The world is now the battlefield for the US military and its contractors who are bleeding the American tax payer under the guise os keeping us safe. But are they keeping us safe? The reality is starting to surface. According to news sources the alleged Boston Marathon bombing suspect told investigators that the attack was spurred by their anger at America’s continued wars and its assault in Islam.

Yemeni journalist Farea Al-Muslimi testified before the Senate Judiciary’s subcommittee on the Constitution, civil rights and human rights. He told the committee what American’s need to hear:

“Just six days ago, my village was struck by a drone, in an attack that terrified thousands of simple, poor farmers.

“The drone strike and its impact tore my heart, much as the tragic bombings in Boston last week tore your hearts and also mine.

“What radicals had previously failed to achieve in my village, one drone strike accomplished in an instant: there is now an intense anger and growing hatred of America.”

We needed to hear this a very long time ago, long before 9/11.

Jeremy Scahill, author and National Security Correspondent for The Nation magazine, joined Amy Goodman in an interview on Democracy Now to discuss the his project Dirty Wars which has produced a documentary and soon to be released book,“Dirty Wars: The World Is a Battlefield.”

The book is based on years of reporting on U.S. secret operations in Yemen, Somalia and Afghanistan. While the Obama administration has defended the killing of Anwar, it has never publicly explained why Abdulrahman was targeted in a separate drone strike two weeks later. Scahill reveals CIA Director John Brennan, Obama’s former senior adviser on counterterrorism and homeland security, suspected that the teenager had been killed “intentionally.” “The idea that you can simply have one branch of government unilaterally and in secret declare that an American citizen should be executed or assassinated without having to present any evidence whatsoever, to me, is a – we should view that with great sobriety about the implications for our country,” says Scahill, national security correspondent for The Nation magazine. Today the U.S. Senate is preparing to hold its first-ever hearing on the Obama administration’s drone and targeted killing program. However, the Obama administration is refusing to send a witness to answer questions about the program’s legality.

The Secret Story Behind Obama’s Assassination of Two Americans in Yemen

Bending to Paranoia and Fear

Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.

   Benjamin Franklin, Historical Review of Pennsylvania, 1759

Ben would not be pleased with the government he helped create. Since before 9/11/2001, our rights had been slowly eroding, since then the notion of the rule of law and the Constitution seems quaint. “American’s don’t believe in shredding the Constitution to fight terror,” that was the headline of an article written by Greg Sargeant in the Washington Post‘s Plum Line. he points out a poll done by the Post that asked respondents:

Q: Which worries you more: that the government will not go far enough to investigate terrorism because of concerns about constitutional rights, or that it will go too far in compromising constitutional rights in order to investigate terrorism?

48% were more concerned the government would go too far; while 41% said it would not go far enough. While not a majority, it is still encouraging that there is a plurality that would like to see our Constitutional rights protected. Yet there are still those who would throw those rights away for false feeling of security. Fueled by the rhetoric of a terrorist in every Muslim community, some of our elected representatives and voices in the mainstream media have called for stripping the Constitutional rights of Dzhokhar Tsarnaev, now charged with the bombings and deaths that resulted.

But the government and the media seem to be hung up on calling this incident, terrorism and labeling Tsarnaev a terrorist even before there was a motive or a connection to any terrorist organization. Writing at The Guardian, Glenn Greenwald wonders why Boston is ‘terrorism’ but not Aurora, Sandy Hook, Tucson and Columbine:

Over the last two years, the US has witnessed at least three other episodes of mass, indiscriminate violence that killed more people than the Boston bombings did: the Tucson shooting by Jared Loughner in which 19 people (including Rep. Gabrielle Giffords) were shot, six of whom died; the Aurora movie theater shooting by James Holmes in which 70 people were shot, 12 of whom died; and the Sandy Hook elementary school shooting by Adam Lanza in which 26 people (20 of whom were children) were shot and killed. The word “terrorism” was almost never used to describe that indiscriminate slaughter of innocent people, and none of the perpetrators of those attacks was charged with terrorism-related crimes. A decade earlier, two high school seniors in Colorado, Eric Harris and Dylan Klebold, used guns and bombs to murder 12 students and a teacher, and almost nobody called that “terrorism” either.

In the Boston case, however, exactly the opposite dynamic prevails. Particularly since the identity of the suspects was revealed, the word “terrorism” is being used by virtually everyone to describe what happened. After initially (and commendably) refraining from using the word, President Obama has since said that “we will investigate any associations that these terrorists may have had” and then said that “on Monday an act of terror wounded dozens and killed three people at the Boston Marathon”. But as (Ali) Abunimah notes, there is zero evidence that either of the two suspects had any connection to or involvement with any designated terrorist organization.

New York City Mayor Michael Bloomberg added his opinion that in light of the Boston bombing, the Constitution needs to be “reinterpreted”:

“The people who are worried about privacy have a legitimate worry,” Mr. Bloomberg said during a press conference in Midtown. “But we live in a complex word where you’re going to have to have a level of security greater than you did back in the olden days, if you will. And our laws and our interpretation of the Constitution, I think, have to change.” [..]

“Look, we live in a very dangerous world. We know there are people who want to take away our freedoms. New Yorkers probably know that as much if not more than anybody else after the terrible tragedy of 9/11,” he said.

“We have to understand that in the world going forward, we’re going to have more cameras and that kind of stuff. That’s good in some sense, but it’s different from what we are used to,” he said.

A noun, a verb and 9/11? Mr. Bloomberg wants us to fear those who would “take away our freedoms.” We should fear the Michael Bloombergs and Rudolph Guilianis of the world.

At a bedside hearing, Tsarnaev was advised of his rights and was appointed a lawyer. He freely answered questions in writing, denying that there was a connection with any terrorist organization and the idea was his brother’s. He also told the court that they were motivated by extremist Islamic beliefs. But does that justify calling this terrorist act and labeling the brothers terrorists? Even so, is there ever a justification for denying a person their Constitutional rights?

Glenn joined Amy Goodman on Monday’s Democracy Now to discuss the issues that surround this case.



Transcript can be read here.

Earth Day 2013: Bidder #70

Today is Earth Day and the fight to protect our environment continues with a focus on global climate change, stopping fracking and the KeystoneXL pipeline that will carry the dirtiest oil on earth across the US. One of the heroes of the fight against the oil industries’ zeal to drill for oil on public lands, is environmental activist Tim DeChristopher has been released from custody after serving 21 months in federal prison.

DeChristopher was arrested after an attempt to buy more than 22,000 acres of land in a 2008 oil and gas lease auction. His act of civil disobedience (done while he was still enrolled at the University of Utah) led to charges of making false statements and violating the Federal Onshore Oil and Gas Leasing Reform Act. He was sentenced to two years in prison and a $10,000 fine.

The auction was later negated and leases revoked after the Obama administration found that the land should have never even gone up for sale.

His trial lasted for over two years and his lawyers weren’t allowed to use a defense that his actions were a lesser evil than allowing for oil and gas development and environmental harm. [..]

A documentary about his trial, “Bidder 70,” will be screened around the country on Monday in celebration of Earth Day. DeChristopher will make his first public appearance at a screening and Q-and-A in Salt Lake City, which will be streamed over the Internet at 9 p.m. EDT on April 22.

Tim was interviewed today by Amy Goodman on Democracy Now

In a Democracy Now! exclusive on Earth Day, climate change activist Tim DeChristopher joins us for his first interview since being released from federal custody after serving 21 months in detention. DeChristopher was convicted of interfering with a 2008 public auction when he disrupted the Bush administration’s last-minute move to sell off oil and gas exploitation rights in Utah. He posed as a bidder and won drilling lease rights to 22,000 acres of land in an attempt to save the property from oil and gas extraction. The auction itself was later overturned and declared illegal, a fact that DeChristopher’s defense attorneys were prevented from telling the jury. His case is the subject of the documentary, “Bidder 70,” which will screen all over the country today to mark his release and Earth Day. The founder of the climate justice group Peaceful Uprising, Tim DeChristopher joins us to discuss his ordeal, his newfound freedom, and his plans to continue his activism in the climate justice movement.

Transcript can be read here.

Stop CISPA Moves to the Senate

Stop CISPA The controversial data sharing bill, Cyber Intelligence Sharing and Protection Act (CISPA) was passed by the House by a vote of 288 – 127, as 92 Democrats voted for the bill, while 29 Republicans voted against it. The bill passed without the privacy protections that civil liberties advocates felt were necessary, an objection that was echoed by the White House with a veto threat earlier this week. An attempt by the lead sponsors of the bill, Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.), offered an amendment to mollify the objections but privacy advocates stated that it fell short of what was needed to safeguard an individual’s right to privacy.

Amendments that were proposed to protect Fourth Amendment rights were not even allowed debate by the rules committee:

Rep. Alan Grayson, a Florida Democrat, proposed a one-sentence amendment (PDF) that would have required the National Security Agency, the FBI, Homeland Security, and other agencies to secure a “warrant obtained in accordance with the Fourth Amendment” before searching a database for evidence of criminal wrongdoing.

Grayson complained this morning on Twitter that House Republicans “wouldn’t even allow debate on requiring a warrant before a search.” [..]

CISPA is controversial because it overrules all existing federal and state laws by saying “notwithstanding any other provision of law,” including privacy policies and wiretap laws, companies may share cybersecurity-related information “with any other entity, including the federal government.” It would not, however, require them to do so. [..]

Because Grayson’s amendment was not permitted, CISPA will allow the federal government to compile a database of information shared by private companies and search that information for possible violations of hundreds, if not thousands, of criminal laws. [..]

“The government could use this information to investigate gun shows” and football games because of the threat of serious bodily harm if accidents occurred, Polis said. “What do these things even have to do with cybersecurity?… From football to gun show organizing, you’re really far afield.”

At the heart of CISPA is warrantless searches a clear violation of the Fourth Amendment which reads:

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

This has had a strange effect of uniting the left and right in the opposition to the bill. The Tea Party aligned group Freedom Works issued this statement:

CISPA would allow for more information sharing between the private sector and the federal government regarding cyber security. Although this year’s CISPA is a net improvement over last year’s bill, it still leaves open concerns about private information being shared in the name of national security.

There are grave Fourth Amendment concerns with CISPA. The bill would override existing privacy laws to allow companies to share “cyber threat information” with the federal government without making any reasonable effort to strip out any personal information from the file.

They even have a site to actively Stop CISPA along with the ACLU and the Electronic Freedom Foundation. Strange bedfellows, indeed.

Passage in the Senate without addition of privacy protections is doubtful but one never knows:

The discussion now shifts to the Democrat-controlled Senate, which appears unlikely to act on the legislation in the wake of a presidential veto threat earlier this week, and an executive order in January that may reduce the need for new legislation. Today’s House vote, on the other hand, could increase pressure on the Senate to enact some sort of legislation.

Sen. John Rockefeller, a West Virginia Democrat who was involved in last year’s cybersecurity debate, said after today’s vote that “CISPA’s privacy protections are insufficient.” Still, Rockefeller said, “I believe we can gain bipartisan agreement on bills that we can report out of our committees and allow [Majority Leader Harry Reid] to bring them to the Senate floor as early as possible.”

We urge everyone to keep the pressure on the Senate and the White House by calling and e-mailing your objections:

The White House switchboard is 202-456-1414.

The comments line is 202-456-1111.

The White House email address is here

Numbers for the Senate are here.

E-mail addresses for the Senate are here

Please be polite and on point.

The late internet activist Aaron Swartz called CISPA the “The Patriot Act of the Internet”.

Contact the White House and your Senators to protect your privacy rights.

They Did Torture and They Should Be Prosecuted

While we were mostly fixed on the aftermath of explosion at the Boston Marathon, a non-partisan 11-member panel, that had been convened by the  legal research and advocacy group, Constitution Project to look into the treatment of detainees after 9/11, released a 577 page report (pdf) on Tuesday.

The report relying solely on public records, interviews with detainees, military officers and interrogators, concluded that “it is indisputable that the United States engaged in the practice of torture” under the Bush administration:

The use of torture, the report concludes, has “no justification” and “damaged the standing of our nation, reduced our capacity to convey moral censure when necessary and potentially increased the danger to U.S. military personnel taken captive.” The task force found “no firm or persuasive evidence” that these interrogation methods produced valuable information that could not have been obtained by other means. While “a person subjected to torture might well divulge useful information,” much of the information obtained by force was not reliable, the report says.

At emptywheel, Marcy Wheeler points out the report contains a “number of errors, repetition of dangerous misinformation, and incomplete reporting” but it is still important and comprehensive and its conclusion valuable:

Because even this cautious, bipartisan, institutionalist report concludes the following (among other findings):

   Finding #1: U.S. forces, in many instances, used interrogation techniques on detainees that constitute torture. American personnel conducted an even larger number of interrogations that involved “cruel, inhuman, or degrading” treatment. Both categories of actions violate U.S. laws and international treaties. Such conduct was directly counter to values of the Constitution and our nation.

   Finding #2: The nation’s most senior officials, through some of their actions and failures to act in the months and years immediately following the September 11 attacks, bear ultimate responsibility for allowing and contributing to the spread of illegal and improper interrogation techniques used by some U.S. personnel on detainees in several theaters. Responsibility also falls on other government officials and certain military leaders.

   Finding #3: There is no firm or persuasive evidence that the widespread use of harsh interrogation techniques by U.S. forces produced significant information of value. There is substantial evidence that much of the information adduced from the use of such techniques was not useful or reliable.

   Finding #16: For detainee hunger strikers, DOD operating procedures called for practices and actions by medical professionals that were contrary to established medical and professional ethical standards, including improper coercive involuntary feedings early in the course of hunger strikes that, when resisted, were accomplished by physically forced nasogastric tube feedings of detainees who were completely restrained.

   Finding #19: The high level of secrecy surrounding the rendition and torture of detainees since September 11 cannot continue to be justified on the basis of national security.

   Finding #21: The Convention Against Torture requires each state party to “[c]riminalize all acts of torture, attempts to commit torture, or complicity or participation in torture,” and “proceed to a prompt and impartial investigation, wherever there is reasonable ground to believe that an act of torture has been committed in any territory under its jurisdiction.” The United States cannot be said to have complied with this requirement.

The panel was formed after Pres. Barack Obama decided in 2009 not to support a national commission to investigate the post-9/11 counterterrorism programs, as proposed by Senator Patrick J. Leahy (D-VT) and others. “Look forward, not backward”, the president said. included former Senator Asa Hutchinson (R-AL), who served in President George W. Bush’s administration from 2003-2005 as the Under Secretary for Border and Transportation Security in the Department of Homeland Security, and former Representative James Jones (D-OK) who served as the U.S. Ambassador to Mexico from 1993-1997.  Among the other members were a three-star general and former president of the American Bar Association.

Significantly the New York Times article notes this:

The United States is a signatory to the International Convention Against Torture, which requires the prompt investigation of allegations of torture and the compensation of its victims. [..]

While the Constitution Project report covers mainly the Bush years, it is critical of some Obama administration policies, especially what it calls excessive secrecy. It says that keeping the details of rendition and torture from the public “cannot continue to be justified on the basis of national security” and urges the administration to stop citing state secrets to block lawsuits by former detainees. [..]

The core of the report, however, may be an appendix: a detailed 22-page legal and historical analysis that explains why the task force concluded that what the United States did was torture. It offers dozens of legal cases in which similar treatment was prosecuted in the United States or denounced as torture by American officials when used by other countries.

The report compares the torture of detainees to the internment of Japanese Americans during World War II. “What was once generally taken to be understandable and justifiable behavior,” the report says, “can later become a case of historical regret.”

Laura Pitter, counterterrorism adviser at Human Rights Watch, joined Democracy Now‘s Amy Goodman and Nermeen Shaikh to discuss the report,s “indisputable” evidence that the Bush administration tortured.

What Marcy said:

In short: it was torture, it was illegal, it was not valuable, and it still needs to be prosecuted.

Instead, The Justice Department instead chose to prosecute Central Intelligence Agency (CIA) whistleblower John Kiriakou, who refused to participate in torture and helped exposed the torture program. Mr. Kiriakou was sentenced to prison while the torturers he exposed walk free. Nice job, Barack.

52 hours left to stop CISPA

Stop CISPATime to take action. As I reported last week the Cyber Intelligence Sharing and Protection Act(CISPA) was sent to the House for a vote.

From an e-mail that Joan McCarter at Daily Kos posted the e-mail from the White House issuing a veto threat of the bill as it currently stands:

The Administration recognizes and appreciates that the House Permanent Select Committee on Intelligence (HPSCI) adopted several amendments to H.R. 624 in an effort to incorporate the Administration’s important substantive concerns. However, the Administration still seeks additional improvements and if the bill, as currently crafted, were presented to the President, his senior advisors would recommend that he veto the bill. The Administration seeks to build upon the continuing dialogue with the HPSCI and stands ready to work with members of Congress to incorporate our core priorities to produce cybersecurity information sharing legislation that addresses these critical issues.

H.R. 624 appropriately requires the Federal Government to protect privacy when handling cybersecurity information. Importantly, the Committee removed the broad national security exemption, which significantly weakened the restrictions on how this information could be used by the government. The Administration, however, remains concerned that the bill does not require private entities to take reasonable steps to remove irrelevant personal information when sending cybersecurity data to the government or other private sector entities. Citizens have a right to know that corporations will be held accountable-and not granted immunity-for failing

to safeguard personal information adequately. [emphasis in original]

House Democrats are now rallying in opposition to the bill:

Four Democratic members say the Cyber Intelligence Sharing and Protection Act, or CISPA, as written “would undermine the interests of citizens and their privacy” despite the addition of five privacy-focused amendments adopted to the bill last week. They argue that the amendments do not go far enough to ease their concerns.

“Without further amendments to protect privacy and civil liberties, we cannot support the bill,” the House Democratic lawmakers write in the “Dear Colleague” letter.

“The bill has improved from earlier versions, but even with the amendments adopted, CISPA unacceptably and unnecessarily compromises the privacy interests of Americans online,” they add.

Reps. Adam Schiff (D-Calif.), Jan Schakowsky (D-Ill.), Anna Eshoo (D-Calif.) and Rush Holt (D-N.J.) signed the letter.

The House Rules Committee will meet on Tuesday afternoon to approve the rule for the bill, which will determine what amendments will be voted on in the House later this week. House members have until Tuesday morning to file their proposed amendments to the bill.

There are twelve Democratic co-sponsors to the bill. We need to send tell them to withdraw their support:

Ruppersberger, A. Dutch [D-MD2]

Costa, Jim [D-CA16]

Cuellar, Henry [D-TX28]

Enyart, William [D-IL12]

Gutierrez, Luis [D-IL4]

Hastings, Alcee [D-FL20]

Kilmer, Derek [D-WA6]

Lipinski, Daniel [D-IL3]

Peters, Scott [D-CA52]

Sewell, Terri [D-AL7]

Sinema, Kyrsten [D-AZ9]

Vargas, Juan [D-CA51]

The Electronic Freedom Foundation (EEF) is urging action:

The Cyber Intelligence Sharing and Protection Act (CISPA) is supposed to promote cybersecurity- a goal EFF wholeheartedly supports – but it doesn’t address common-sense network security issues. Instead, it creates a new, dangerous exception to existing privacy laws. That’s why hundreds of thousands of concerned Internet users have joined EFF and other civil liberties groups in opposing the bill. This is our last chance to stop it in the House.

Despite recent amendments, CISPA still features vague language that could put your personal information in the hands of military organizations like the National Security Agency.

Can you call your representative and tell him or her to oppose this bill?  We’ll give you the phone number for your representative and a very brief suggested script. Click here to call Congress now.

Not in the United States? Click here to sign our petition.

We want to generate thousands of calls between now and the vote-likely on Thursday.  Please call now and then tell your friends to speak out on this important issue. It’s as easy as posting this on your social networking accounts:

   Congress is about to vote on CISPA. If you care about online privacy, you’ve got to speak out now:  https://eff.org/r.5bPw

You can also use Twitter tool to tell key members of Congress to stand up for your privacy and vote NO on CISPA.

The White House switchboard is 202-456-1414.

The comments line is 202-456-1111.

Numbers for the Senate are here.

Numbers for the House are here.

The late internet activist Aaron Swartz called CISPA the “The Patriot Act of the Internet”.

Call the White House and your representatives to protect your privacy rights.

Load more