Tag: Law

The Nightmare on Wall Street

Attorney General Eric Holder claimed that the banks were too big and too hard to prosecute for the “massive criminal securities fraud” behind the high risk mortgage securities that led up to the 2008 financial collapse. Instead the Justice Department opted for civil settlements with large fines with no admission of any wrong doing.

Actually, it wasn’t. It appears that the Obama administration’s chief law enforcement officer chose not to prosecute despite all the evidence at his disposal. In his return to Rolling Stones, investigative journalist Matt Taibbi introduces Alayne Fleischmann, JPMorgan Chase’s $9 billion nightmare:

She tried to stay quiet, she really did. But after eight years of keeping a heavy secret, the day came when Alayne Fleischmann couldn’t take it anymore.

“It was like watching an old lady get mugged on the street,” she says. “I thought, ‘I can’t sit by any longer.'” [..]

Fleischmann is the central witness in one of the biggest cases of white-collar crime in American history, possessing secrets that JPMorgan Chase CEO Jamie Dimon late last year paid $9 billion (not $13 billion as regularly reported – more on that later) to keep the public from hearing.

Back in 2006, as a deal manager at the gigantic bank, Fleischmann first witnessed, then tried to stop, what she describes as “massive criminal securities fraud” in the bank’s mortgage operations.

Thanks to a confidentiality agreement, she’s kept her mouth shut since then. “My closest family and friends don’t know what I’ve been living with,” she says. “Even my brother will only find out for the first time when he sees this interview.”

Six years after the crisis that cratered the global economy, it’s not exactly news that the country’s biggest banks stole on a grand scale. That’s why the more important part of Fleischmann’s story is in the pains Chase and the Justice Department took to silence her.

She was blocked at every turn: by asleep-on-the-job regulators like the Securities and Exchange Commission, by a court system that allowed Chase to use its billions to bury her evidence, and, finally, by officials like outgoing Attorney General Eric Holder, the chief architect of the crazily elaborate government policy of surrender, secrecy and cover-up. “Every time I had a chance to talk, something always got in the way,” Fleischmann says.

This past year she watched as Holder’s Justice Department struck a series of historic settlement deals with Chase, Citigroup and Bank of America. The root bargain in these deals was cash for secrecy. The banks paid big fines, without trials or even judges – only secret negotiations that typically ended with the public shown nothing but vague, quasi-official papers called “statements of facts,” which were conveniently devoid of anything like actual facts.

Matt and Ms. Fleischmann joined Democracy Now‘s hosts Amy Goodman and Juan González to discuss ow JPMorgan wrecked the economy and avoided prosecution.

The full transcript can be read here

Your Privacy Matters

The NSA, FBI and DOJ are upset with the new Apple and Google encryption apps that they can’t hack. The poor Director of the FBI, James Comey is “concerned” so he plays the “fear card”

“I am a huge believer in the rule of law, but I also believe that no one in this country is beyond the law,” Comey told reporters at FBI headquarters in Washington. “What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law.”

Apple said last week that it would no longer be technically feasible to unlock encrypted iPhones and iPads for law enforcement because the devices would no longer allow user passcodes to be bypassed. The move comes as tech companies struggle to manage public concerns in the aftermath of last year’s leak of classified National Security Agency documents about government access to private user data. [..]

“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” the company said. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”

Comey said that while he understood the need for privacy, government access to mobile devices may be needed in extreme circumstances, such as in the event of a terror attack.

“I like and believe very much that we should have to obtain a warrant from an independent judge to be able to take the content of anyone’s closet or their smart phone,” he said. “The notion that someone would market a closet that could never be opened — even if it involves a case involving a child kidnapper and a court order — to me does not make any sense.”

Comey said FBI officials have had conversations with both Apple and Google about the marketing of their devices.

“Google is marketing their Android the same way: Buy our phone and law-enforcement, even with legal process, can never get access to it,” he said.

Why anyone would think that the guy who approved torture believes in the rule of law is beyond me. Trevor Timm at The Guardian dissects what Comey said:

Comey began:

  I am a huge believer in the rule of law, but I also believe that no one in this country is beyond the law. … What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law.

First of all, despite the FBI director’s implication, what Apple and Google have done is perfectly legal, and they are under no obligation under the “the rule of law” to decrypt users’ data if the company itself cannot access your stuff. From 47 U.S. Code § 1002 (emphasis mine):

   A telecommunications carrier shall not be responsible for decrypting, or ensuring the government’s ability to decrypt, any communication encrypted by a subscriber or customer, unless the encryption was provided by the carrier and the carrier possesses the information necessary to decrypt the communication.

Comey continued:

   I like and believe very much that we should have to obtain a warrant from an independent judge to be able to take the content of anyone’s closet or their smart phone.

That’s funny, because literally four months ago, the United States government was saying the exact opposite (pdf) before the US supreme court, arguing that, in fact, the feds shouldn’t need to get a warrant to get inside anyone’s smartphone after you’re arrested. In its landmark June ruling in the case, Riley v California, the court disagreed. So it’s great to see that Jim Comey, too, has come around to the common sense conclusion that cops need a warrant to search your cellphone data, but it would’ve been nice for him to express those sentiments when they actually mattered.

Comey doubled down in another statement with the absurd fear that criminals, like child kidnappers would be able to evade the law. On its face that’s insanely ridiculous since law enforcement has numerous ways tools to access your data. The Intercept‘s Micah Lee points out that Apple still has access to plenty of your data to feed to the Feds. He went on how bemoan the NSA leaks by Edward Snowden has caused the need to protect a person’s private information may have gone too far. How so, Mr. Comey? As Timm notes in his article

Congress has not changed surveillance law at all in the the nearly 16 months since Edward Snowden’s disclosures began, mostly because of the vociferous opposition from intelligence agencies and cops. The pendulum is still permanently lodged squarely on law enforcement’s side. If it has swung at all, it’s because of the aforementioned ruling by the supreme court of the United States, along with tech companies implementing more privacy protections unilaterally because US tech companies are losing billions of dollars because of the government’s spying scandals.

A week ago, The Intercept‘s Glenn Greenwald gave a Ted Talk in Rio de Janeiro on why your privacy matters

Crypto wars redux: why the FBI’s desire to unlock your private life must be resisted

In 1995, the US government tried – and failed – to categorise encryption as a weapon. Today, the same lines are being drawn and the same tactics repeated as the FBI wants to do the same. Here’s why they are wrong, and why they must fail again

Eric Holder, the outgoing US attorney general, has joined the FBI and other law enforcement agencies in calling for the security of all computer systems to be fatally weakened. This isn’t a new project – the idea has been around since the early 1990s, when the NSA classed all strong cryptography as a “munition” and regulated civilian use of it to ensure that they had the keys to unlock any technological countermeasures you put around your data.

In 1995, the Electronic Frontier Foundation won a landmark case establishing that code was a form of protected expression under the First Amendment to the US constitution, and since then, the whole world has enjoyed relatively unfettered access to strong crypto. [..]

The arguments then are the arguments now. Governments invoke the Four Horsemen of the Infocalypse (software pirates, organised crime, child pornographers, and terrorists) and say that unless they can decrypt bad guys’ hard drives and listen in on their conversations, law and order is a dead letter.

On the other side, virtually every security and cryptography expert tries patiently to explain that there’s no such thing as “a back door that only the good guys can walk through” (hat tip to Bruce Schneier). Designing a computer that bad guys can’t break into is impossible to reconcile with designing a computer that good guys can break into.

If you give the cops a secret key that opens the locks on your computerised storage and on your conversations, then one day, people who aren’t cops will get hold of that key, too. The same forces that led to bent cops selling out the public’s personal information to Glen Mulcaire and the tabloid press will cause those cops’ successors to sell out access to the world’s computer systems, too, only the numbers of people who are interested in these keys to the (United) Kingdom will be much larger, and they’ll have more money, and they’ll be able to do more damage.

Long live The Republic.

Former AIG CEO Wants More Tax Payer Money

Poor Hank Greenberg, the ultra wealthy former CEO of American International Group (AIG), has a sad. As the largest shareholder, he thinks that SIG shareholders got a raw deal when the government saved the company with more than $180 billion in cash. He believes the bailout cost shareholders, like himself, tens of billions of dollars. Unlike the banks, the government set down rules for the loan that forced the company to pay back Wall Street firms.

The trial has a cast of characters reminiscent of the congressional bailout hearings with testimony from former chair of the Federal Reserve, former Treasury Secretaries Timothy Geitner and Henry Paulson.

Secrets of the bailout, exposed: Why you should be watching the AIG trial

By David Dayen, Salon

To this day, information on the banks’ heist and how it went down is pathetically scant. That’s about to change now

The AIG bailout trial began in Washington last week. This is a case where one ruthless, reckless corporate CEO, AIG’s former chieftain Hank Greenberg, argues that his company wasn’t treated as well during the bailout as those of other ruthless, reckless corporate CEOs. So there’s no real rooting interest for anyone with at least one foot planted in reality.

But as I wrote recently, regardless of the outcome, this trial should matter to every American. In fact, just in its first week, we’ve learned a lot of new information about how the bailout architects- then-Treasury Secretary Henry Paulson, ex-Federal Reserve chair Ben Bernanke, and former president of the New York Fed Timothy Geithner – conducted themselves amid the chaos of the financial crisis. And it doesn’t reflect well on any of them, with concealed information, bait-and-switches, and favorites played among financial institutions. As these three prepare to take the stand this week in the case, we should be pleased to finally have this debate about the bailout in public. [..]

We all know the adage that history gets written by the winners. In this case, a very rigid narrative of the bailouts took hold, featuring the swashbuckling actions of governmental leaders who made the hard choices necessary to save the financial system. But because of one ornery ex-CEO, we’re getting another draft of that history, one that displays the bailout as chaotic, selective and in many cases one where laws got thrown out the window and raw power ruled.

As the taxpaying public who fronted the money for all this activity, we should get to know the truth. And the next time the country is faced with such a situation, policy-makers should think twice before heading down the same path, mindful that their dirty laundry will eventually get aired.

POSTSCRIPT: Henry Paulson testified Monday in the trial, confirming the disparate treatment of AIG relative to banks like Citigroup, but saying that circumstances warranted it because those banks were more essential to keeping the financial system afloat. He said that the government had to treat AIG harshly to win political support. (Of course, the government didn’t treat AIG that harshly, gifting them a carryover tax benefit worth $35 billion and letting their executives take bonuses in 2009.) Paulson also acknowledged the private bid for AIG from China Investment Corporation, but asserted that they wouldn’t have followed through on the bid without a government guarantee, even though, he admitted, he never talked to the Chinese.

The best is Jon Stewart’s chastizing Breenberg for being a cry baby.

It would be funny, if it weren’t so ridiculously pathetic.

Ferguson’s War on Freedom of the Press

Reporting the events by the news media in Ferguson, MO has become very problematic with the police limiting not only the press access to the demonstrations on the ground but the Federal Aviation Administration has created an unprecedented “no fly zone” over the town. The excuse is “to provide a safe environment for law enforcement operations.” The same reasoning was given repeatedly by Missouri Highway Patrol Captain Ron Johnson who has also threatened and ordered arrests of reporters.

The situation was so bad last week that on August 14 the ACLU sued the town and county and won a court order from a judge telling police that they cannot bar journalists from reporting which was promptly ignored.

Why is this happening? Of course the police excuse is that they are “protecting” the reporters and have also made the unsubstantiated accusation that the press is interfering with police operations. The real reason is they don’t want a free press to record any brutality on the part of the police in containing the demonstrators, peaceful or otherwise. Nor do they want the entrapment tactics, like blocking egress at both ends of the streets refusing to allow protestors to exit, then arresting them when they try to pass through to go home.

The bogus press conference that Capt. Johnson held in the wee hours of Tuesday morning, displaying a Molotov cocktail and other items confiscated from alleged “agitators,” was contrived to justify the use of tear gas, smoke bombs, rubber bullets and other military type weapons. It was fairly obvious from a trained observer that the way the “evidence” was handled – no gloves – and displayed – not bagged and tagged – that these were just props in the side show. Yes, capt Johnson, I call you on your preprocessed bovine waste (thank you, John Oliver).

Published on Aug 21, 2014

With 11 journalists arrested thus far, Truthout.org investigative reporter Mike Ludwig describes how Ferguson police are using intimidation tactics against journalists.



Transcript can be read here

Restricting and harassing the free press is a cover up of police criminality of the first order and it is being aided and abetted by the state government of Missouri and Federal government.  

Democracy Under Fire

In a joint statement, the ACLU and Human Rights Watch released a 120 page report documenting how mass surveillance by the US is undermining constitutional rights to freedom of the press and legal council

The 120-page report, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy,” is based on extensive interviews with dozens of journalists, lawyers, and senior US government officials. It documents how national security journalists and lawyers are adopting elaborate steps or otherwise modifying their practices to keep communications, sources, and other confidential information secure in light of revelations of unprecedented US government surveillance of electronic communications and transactions. The report finds that government surveillance and secrecy are undermining press freedom, the public’s right to information, and the right to counsel, all human rights essential to a healthy democracy.

Amy Goodman and Aaron Mate sat down with Alex Sinha, Aryeh Neier fellow at Human Rights Watch and the American Civil Liberties Union, and Jeremy Scahill, staff reporter with The Intercept to discuss the threat to Americans’ liberties.

In a new report, Human Rights Watch and the American Civil Liberties Union warn that “large-scale surveillance is seriously hampering U.S.-based journalists and lawyers in their work.” The report is based on interviews with dozens of reporters and lawyers. They describe a media climate where journalists take cumbersome security steps that slows down their reporting. Sources are afraid of talking, as aggressive prosecutions scare government officials into staying silent, even about issues that are unclassified. For lawyers, the threat of surveillance is stoking fears they will be unable to protect a client’s right to privacy. Some defendants are afraid of speaking openly to their own counsel, undermining a lawyer’s ability provide the best possible defense.



Transcript can be read here

Journalism under fire: America’s freedom of the press is in danger

By Heather Digby Parton, Salon

If there’s one thing that civil libertarians across the American political spectrum tend to agree upon, it’s that the Bill of Rights is a guiding document. It doesn’t say everything but it says a lot. The various political factions do sometimes differ in their emphasis and interpretation, with the right’s civil libertarians often tending to focus more closely on the 1st Amendment’s establishment clause and the 2nd Amendment while the left-leaning civil libertarians take a harder line on freedom of speech and the 4th amendment. This is of course a sweeping generalization which can be disproved in dozens of individual cases, but for the sake of argument, it can probably be stipulated that those who concern themselves with the civil liberties enshrined in the Constitution all agree on the Bill of Rights’ importance to our constitutional order.  And they tend to agree across the board, with equal fervor, on the necessity of a free press to a functioning democracy. [..]

Considering the reaction of many people in the government toward reporters involved in the NSA revelation, it’s clear they have reason to be paranoid. There are government officials awho consider them to be spies and have said they should be punished as such. Even fellow journalists have brought up the question of “aiding and abetting” as if it’s a legitimate line of inquiry.

The atmosphere of mistrust is also rampant within the government, as with the administration having cracked down on contacts between the intelligence community and issuing threats of legal action even before the Snowden revelations. The institutionalized, government-wide initiative called the Insider Threat Program could have any federal employee looking over his  shoulder and worrying that his innocent behavior might be construed as suspicious. [..]

And it’s not just national security agencies that are subject to this program. They are in effect in departments as disparate as the Department of Education and the Peace Corps.

Top Journalists and Lawyers: NSA Surveillance Threatens Press Freedom and Right to Counsel

By Dan Froomkin, The Intercept

Not even the strongest versions of NSA reform being considered in Congress come anywhere close to addressing the chilling effects on basic freedoms that the new survey describes.

“If the US fails to address these concerns promptly and effectively,” report author  G. Alex Sinha writes, “it could do serious, long-term damage to the fabric of democracy in the country.”

Even before the Snowden revelations, reporters trying to cover important defense, intelligence and counter-terrorism issues were reeling from the effects of unprecedented secrecy and attacks on whistleblowers.

But newfound awareness of the numerous ways the government can follow electronic trails –  previously considered the stuff of paranoid fantasy – has led sources to grow considerably more fearful.

USA Freedom Act Still Won’t Protect Americans’ Liberties

Senator Patrick Leahy (D-NH) introduced the version of the USA Freedom Act on Tuesday.

Leahy’s bill, like the House’s, would still provide the NSA with access to enormous amounts of American phone data. Though it would require a judge to issue an order to telecos for “call detail records” based on a “reasonable, articulable suspicion” of association with terrorism or a foreign power, the NSA will be able to use that single order to obtain the “call detail records” of a suspicious entity, as well as those of entities in “direct connection” with it and entities in connection with those.

While that would permit the NSA to yield thousands of records off of a single court order, on a daily basis for six months, the NSA and the bill’s architects contend that it bans “bulk collection.”

Leahy’s bill would go further than the House version in narrowing the critical definition of “specific selection term,” a foundational aspect of the bill defining what the government can collect. The House definition is a “term specifically identifying a person, entity, account, address, or device,” which privacy groups have lambasted as unreasonably broad.

Seeking to plug that loophole, Leahy would prevent the NSA or the FBI from accessing a service provider’s entire clientele or a wholesale “city, state, zip code, or area code.”

Although the Leahy bill has the support of several civil libertarian groups and major tech firms like Facebook and Google, it does not revive some privacy proposals that those organizations considered crucial but the intelligence agencies and their advocates in Congress stripped from the House measure.

There are still some really big loopholes, as noted by emptywheel’s Marcy Wheeler:

Leahy’s bill retains the language from USA Freedumber on contact chaining, which reads,

   (iii) provide that the Government may require the prompt production of call detail records-

   (I) using the specific selection term that satisfies the standard required under subsection (b)(2)(C)(ii) as the basis for production; and

   (II) using call detail records with a direct connection to such specific selection term as the basis for production of a second set of call detail records;

Now, I have no idea what this language means, and no one I’ve talked to outside of the intelligence committees does either. It might just mean they will do the same contact chaining they do now, but if it does, why adopt this obscure language? It may just mean they will correlate identities, and do contact chaining off all the burner phones their algorithms say are the same people, but nothing more, but if so, isn’t there clearer language to indicate that (and limit it to that)? [..]

I remain concerned, too, that such obscure language would permit the contact chaining on phone books and calendars, both things we know NSA obtains overseas, both things NSA might have access to through their newly immunized telecom partners.

In addition, Leahy’s bill keeps USA Freedumber’s retention language tied to Foreign Intelligence purpose, allowing the NSA to keep all records that might have a foreign intelligence purpose.

That’s just for starters. She is also concerned about the vague language will still be used to allow bulk collection. She doesn’t think it’s strong enough

The question is whether this “agency protocol” – what Chief Justice John Roberts said was not enough to protect Americans’ privacy – is sufficient to protect Americans’ privacy.

I don’t think it is.

First, it doesn’t specify how long the NSA and FBI and CIA can keep and sort through these corporate records (or what methods it can use to do so, which may themselves be very invasive).

It also permits the retention of data that gets pretty attenuated from actual targets of investigation: agents of foreign powers that might have information on subjects of investigation and people “in contact with or known to” suspected agents associated with a subject of an investigation.

Known to?!?! Hell, Barack Obama is known to all those people. Is it okay to keep his data under these procedures?

Also remember that the government has secretly redefined “threat of death or serious bodily harm” to include “threats to property,” which could be Intellectual Property.

So CIA could (at least under this law – again, we have no idea what the actual FISC orders this is based off of) keep 5 years of Western Union money transfer data until it has contact chained 3 degrees out from the subject of an investigation or any new subjects of investigation it has identified in the interim.

In other words, probably no different and potentially more lenient than what it does now.

And one more thing from Marcy: Leahy’s version still will allow the FBI uncounted use of backdoor searches:

I strongly believe this bill may expand the universe of US persons who will be thrown into the corporate store indefinitely, to be subjected to the full brunt of NSA’s analytical might.

But that’s not the part of the bill that disturbs me the most. It’s this language:

   ‘(3) FEDERAL BUREAU OF INVESTIGATION.-

   Subparagraphs (B)(iv), (B)(v), (D)(iii), (E)(iii), and (E)(iv) of paragraph (1) of subsection (b) shall not apply to information or records held by, or queries conducted by, the Federal Bureau of Investigation.

The language refers, in part,  to requirements that the government report to Congress [..]

These are back door searches on US person identifiers of Section 702 collected data – both content (iv) and metadata (v).

In other words, after having required the government to report how many back door searches of US person data it conducts, the bill then exempts the FBI.

The FBI – the one agency whose use of such data can actually result in a prosecution of the US person in question.

We already know the government has not provided all defendants caught using 702 data notice. And yet, having recognized the need to start counting how many Americans get caught in back door searches, Patrick Leahy has decided to exempt the agency that uses back door searches the most.

And if they’re not giving defendants notice (and they’re not), then this is an illegal use of Section 702.

While the Senate version may be a good enough reason for some civil libertarians, privacy groups and technology firms to back, it still falls far short of what is needed to protect Americans’ constitutional rights and privacy.

Andrew Cuomo’s Saturday Night Massacre

Last year, after the New York State legislature failed to pass campaign finance and a year riddled with corruption scandals, New York State Governor Andrew Cuomo empaneled an “independent” commission to pursue misconduct among public officials and make recommendations to changes to the state’s election and campaign fund-raising laws. The 25 member Moreland Commission was created last July to restore public trust in government. But nine months later, Gov. Cuomo shut it down. The governor claimed that with “the passage of new tougher laws on bribery and  corruption, and improved enforcement of election law”, the commission was no longer needed.

That didn’t satisfy government watch dogs or some lawmakers. Nor did it satisfy Preet Bharara, US Attorney for the Southern District of New York, whose investigations had led to the commissions formation. According to the New York Times, Mr. Bharara contacted two of the commission’s three chairs, William J. Fitzpatrick and Milton L. Williams Jr. His suspicion was that Gov. Cuomo had shut down the commission for political expediency and because the commission’s investigation was getting to close to his office. It now appears that Mr. Bharara has really good instincts.

This week the New York Times broke with this extensive report:

Cuomo’s Office Hobbled Ethics Inquiries by Moreland Commission

With Albany rocked by a seemingly endless barrage of scandals and arrests, Gov. Andrew M. Cuomo set up a high-powered commission last summer to root out corruption in state politics. It was barely two months old when its investigators, hunting for violations of campaign-finance laws, issued a subpoena to a media-buying firm that had placed millions of dollars’ worth of advertisements for the New York State Democratic Party.

The investigators did not realize that the firm, Buying Time, also counted Mr. Cuomo among its clients, having bought the airtime for his campaign when he ran for governor in 2010.

Word that the subpoena had been served quickly reached Mr. Cuomo’s most senior aide, Lawrence S. Schwartz. He called one of the commission’s three co-chairs, William J. Fitzpatrick, the district attorney in Syracuse.

“This is wrong,” Mr. Schwartz said, according to Mr. Fitzpatrick, whose account was corroborated by three other people told about the call at the time. He said the firm worked for the governor, and issued a simple directive:

“Pull it back.”

The subpoena was swiftly withdrawn. The panel’s chief investigator explained why in an email to the two other co-chairs later that afternoon.

“They apparently produced ads for the governor,” she wrote.

The pulled-back subpoena was the most flagrant example of how the commission, established with great ceremony by Mr. Cuomo in July 2013, was hobbled almost from the outset by demands from the governor’s office.

Despite Gov, Cuomo’s denial and protestations that it was his commission to dismiss, Mr Bharara is taking over where the commission’s investigations. The lengthy article is a must read.

MSNBC’s Rachel Maddow roasted Gov. Cuomo in an extended segment that included an interview with Thomas Kaplan one of the three authors who wrote the NYT’s article.

The governor’s travails also caught the attention of The Daily Show‘s Jon Stewart

Gov. Cuomo’s Democratic Primary opponent Fordham University law professor Zephyr Teachout has called for the governor to resign should these allegations prove true.

Also complicating his headaches, Gov. Cuomo had some of the commission members sworn in as deputy state attorneys general by State Attorney General Eric Schneiderman that calls into question his assertions that he had a right to interfere with the commission. Quite similar to late President Richard M. Nixon’s Saturday Night Massacre when he ordered the independent special prosecutor Archibald Cox fired after Mr. Cox issued subpoenas asking for copies of taped conversations recorded in the Oval Office and authorized by Nixon as evidence.

Gov. Cuomo does have a lot of questions to answer and so far his answers have fallen very short.

How To Get On The Terrorist Watch List Without Ever Trying

Are you on the Department of Homeland Security’s Terrorist Watch List or No-Fly List? If you are, there is no way for you to find out but we now know what the criteria is and it’s pretty fast and loose with the rules. The Intercept investigative journalists Jeremy Scahill and Ryan Devereaux have obtained a copy of the guidelines from a document that was issued by the National Counterterrorism Center, the “March 2013 Watchlisting Guidance.” In an extensive article, they examine how the government is using secret rules  “putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings.”

The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place “entire categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted.

Over the years, the Obama and Bush Administrations have fiercely resisted disclosing the criteria for placing names on the databases-though the guidelines are officially labeled as unclassified. In May, Attorney General Eric Holder even invoked the state secrets privilege to prevent watchlisting guidelines from being disclosed in litigation launched by an American who was on the no fly list. In an affidavit, Holder called them a “clear roadmap” to the government’s terrorist-tracking apparatus, adding: “The Watchlisting Guidance, although unclassified, contains national security information that, if disclosed … could cause significant harm to national security.” [..]

The document’s definition of “terrorist” activity includes actions that fall far short of bombing or hijacking. In addition to expected crimes, such as assassination or hostage-taking, the guidelines also define destruction of government property and damaging computers used by financial institutions as activities meriting placement on a list. They also define as terrorism any act that is “dangerous” to property and intended to influence government policy through intimidation.

This combination-a broad definition of what constitutes terrorism and a low threshold for designating someone a terrorist-opens the way to ensnaring innocent people in secret government dragnets. It can also be counterproductive. When resources are devoted to tracking people who are not genuine risks to national security, the actual threats get fewer resources-and might go unnoticed. [..]

The fallout is personal too. There are severe consequences for people unfairly labeled a terrorist by the U.S. government, which shares its watchlist data with local law enforcement, foreign governments, and “private entities.” Once the U.S. government secretly labels you a terrorist or terrorist suspect, other institutions tend to treat you as one. It can become difficult to get a job (or simply to stay out of jail). It can become burdensome-or impossible-to travel. And routine encounters with law enforcement can turn into ordeals. [..]

The government has been widely criticized for making it impossible for people to know why they have been placed on a watchlist, and for making it nearly impossible to get off. The guidelines bluntly state that “the general policy of the U.S. Government is to neither confirm nor deny an individual’s watchlist status.” But the courts have taken exception to the official silence and footdragging: In June, a federal judge described the government’s secretive removal process as unconstitutional and “wholly ineffective.”

The difficulty of getting off the list is highlighted by a passage in the guidelines stating that an individual can be kept on the watchlist, or even placed onto the watchlist, despite being acquitted of a terrorism-related crime. The rulebook justifies this by noting that conviction in U.S. courts requires evidence beyond a reasonable doubt, whereas watchlisting requires only a reasonable suspicion. Once suspicion is raised, even a jury’s verdict cannot erase it.

Not even death provides a guarantee of getting off the list. The guidelines say the names of dead people will stay on the list if there is reason to believe the deceased’s identity may be used by a suspected terrorist-which the National Counterterrorism Center calls a “demonstrated terrorist tactic.” In fact, for the same reason, the rules permit the deceased spouses of suspected terrorists to be placed onto the list after they have died.

Essentially, once a person is on these lists their Fourth Amendment rights are completely ignored, as Mike Masnick at Techdirt points out individuals are subjected to extra scrutiny, essentially allowing the government to sift through every aspect of a person’s life:

In addition to data like fingerprints, travel itineraries, identification documents and gun licenses, the rules encourage screeners to acquire health insurance information, drug prescriptions, “any cards with an electronic strip on it (hotel cards, grocery cards, gift cards, frequent flyer cards),” cellphones, email addresses, binoculars, peroxide, bank account numbers, pay stubs, academic transcripts, parking and speeding tickets, and want ads. The digital information singled out for collection includes social media accounts, cell phone lists, speed dial numbers, laptop images, thumb drives, iPods, Kindles, and cameras. All of the information is then uploaded to the TIDE (Terrorist Identities Datamart Environment) database.

Screeners are also instructed to collect data on any “pocket litter,” scuba gear, EZ Passes, library cards, and the titles of any books, along with information about their condition-“e.g., new, dog-eared, annotated, unopened.” Business cards and conference materials are also targeted, as well as “anything with an account number” and information about any gold or jewelry worn by the watchlisted individual. Even “animal information” – details about pets from veterinarians or tracking chips-is requested. The rulebook also encourages the collection of biometric or biographical data about the travel partners of watchlisted individuals.

At FDL’s The Dissenter, Kevin Gosztola discusses how this loop-hole ridden criteria violate a person’s rights and are inherently discriminatory towards Muslims:

There are a few general points to make in order to fully understand what this vague criteria for watchlisting means.

First of all, it is important not to ignore the anti-Muslim racism that likely influences a number of aspects of the watchlisting process. The idea that Muslims are “predisposed” to commit acts of violence is pervades the national security establishment. Training materials on fighting terrorism have been used by government agencies in previous years that deal with theories of “radicalization” and such training promotes prejudice, as evidenced by the fact that one NSA official used the slur “Mohammed Raghead” in an NSA memo.

Second, a federal district court in Oregon recently decided violated due process rights of Americans placed on the No-Fly List because it is nearly impossible to challenge inclusion and clear one’s name. The ACLU represented thirteen Americans, who have never engaged in any terrorist activity, in this case. Each person experienced hardship because they ended up on the No-Fly List.

The guidance shows why there needs to be a process established for getting off watchlists, especially the No-Fly List.

Finally, there is absolutely no reasonable justification for why this rulebook and any version of it from 2001 to 2014 should be secret. The watchlisting guidance is marked “unclassified.” There is nothing in it that will endanger any Americans.

Jeremy and Ryna sat down for an an interview with Huffington Post‘s Alyona Minkovski. During the discussion, Ryan called the these guidelines a “global stop and frisk program.”

Recently there were two court rulings that pertain to getting off the No-Fly list and a Supreme Court decision that bars warrantless searches of cell phones. Precisely how how those rulings will impact the guidelines remains to be seen but it is fairly obvious that the Obama administration has little regard for the rule of law.

Edward Snowden Calls on Professionals to Protect Private Communications

On July 10, NSA whistleblower Edward Snowden sat down for an interview with Alan Rusbridger, editor-in-chief of the Guardian, and reporter Ewen MacAskill in Moscow.

Over the course of seven hours, he talked about the need for professionals to protect the confidentiality of their clients in the light of the surveillance by spy agencies. He also spoke about his life in Moskow and the specious accusations that he was spying for Russia or had given the information he took from the NSA to Russian authorities.

(Snowden):

• Said if he ended up in US detention in Guantánamo Bay he could live with it.

• Offered rare glimpses into his daily life in Russia, insisting that, contrary to reports that he is depressed, he is not sad and does not have any regrets. He rejected various conspiracy theories surrounding him, describing as “bullshit” suggestions he is a Russian spy.

• Said that, contrary to a claim he works for a Russian organisation, he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world.

• Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in “sexually compromising” situations are routinely passed around.

• Spoke at length about his future, which seems destined to be spent in Russia for the foreseeable future after expressing disappointment over the failure of western European governments to offer him a home.

• Said he was holding out for a jury trial in the US rather a judge-only one, hopeful that it would be hard to find 12 jurors who would convict him if he was charged with an offence to which there was a public interest defence. Negotiations with the US government on a return to his country appear to be stalled.

Americans Spied On By NSA & FBI Without Cause

The National Security Agency and the Federal Bureau if Investigation was given authorization by a judge with the top-secret Foreign Intelligence Surveillance Court to spy on five Americans because of their political activity and, umm, their Middle Eastern names:

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On

By Glenn Greenwald and Murtaza Hussain

he National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans-including a political candidate and several civil rights activists, academics, and lawyers-under secretive procedures intended to target terrorists and foreign spies.

According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes:

• Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush;

• Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases;

• Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University;

• Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights;

• Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country.

The individuals appear on an NSA spreadsheet in the Snowden archives called “FISA recap”-short for the Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also “are or may be” engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens.he National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans-including a political candidate and several civil rights activists, academics, and lawyers-under secretive procedures intended to target terrorists and foreign spies.

According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes:

• Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush;

• Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases;

• Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University;

• Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights;

• Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country.

The individuals appear on an NSA spreadsheet in the Snowden archives called “FISA recap”-short for the Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also “are or may be” engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens. [..]

The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments.

[..]

Asim Ghafoor says his first-hand experience working on behalf of other Muslim-Americans has led him to believe that “the U.S. government embarked on a very systematic approach” to target his community.

“I saw the government specifically go after Muslim people who were involved in certain activities such as charity work, humanitarian work, political activism,” he says. “Maybe they had some website that had some speeches that nobody ever read or even noticed, maybe they had some bloodcurdling speeches. So the government just treated you like you were blowing up the next tower. They treated you like you were going to be the Manchurian Candidate, you were going to destroy America from within. There were U.S. attorneys, FBI agents, DHS agents, customs agents all over the country that were trying to find the next terror cell in their midst. If you were involved in those activities and maybe you were on a student visa and you didn’t quite fill out the paperwork, you were hosed. There is no question about it, you were worse off than a migrant worker in Dubai. You were just packed up and sent home. Life became very, very unbearable for them.”

Even a U.S. citizen like Faisal Gill, who served his country both in the armed forces and in the White House, found himself spied on by his own government. “I was a very conservative, Reagan-loving Republican,” he says. “If somebody like me could be surveilled, then [there are] other people out there I can only imagine who are under surveillance.

“I went to school here as a fourth grader – learned about the Revolutionary War, learned about individual rights, Thomas Jefferson, all these things,” he continues. “That is ingrained in you – your privacy is important. And to have that basically invaded for no reason whatsoever – for the fact that I didn’t do anything – I think that’s troubling. And I think that certainly goes to show how we need to shape policy differently than it is right now.”

As per Huffington Post‘s Ryan Grim, Glenn Greenwald received the permission of all five named in the article before printing their names.

This is the Democratic administration of Barack Hussein Obama.

Load more