Tag: Justice

A Walk Across New Hampshire For Aaron

Aaron Swartz photo imagesqtbnANd9GcSri_QsacSc5jhQFcunN_zps1a2d5300.jpg Today marks the one year anniversary of the death of Aaron Swartz, the computer coder and Internet freedom activist, who committed suicide while facing prosecution on federal hacking charges. So, today, in Aaron’s memory and for the causes he believed in, Harvard University Professor Lawrence Lessig is walking across New Hampshire

He is trying to build a coalition called New Hampshire Rebellion to fight the corrupting influence of money in politics ahead of the crucial 2016 presidential primary in the state. [..]

Lessig said it was a conversation with Swartz that propelled him to shift the focus of his work from Internet freedom to political corruption in 2007.

“He said to me, ‘Why are you wasting your time working on these Internet issues or these copyright issues, when you know that none of the ideas you’re pushing would ever be addressed because of the political system?'” Lessig recalled.

Lessig is asking supporters to join him as he walks across New Hampshire in segments — 10 miles on Saturday, 20 miles on Sunday, more down the road — to reach out to voters. His walk also will honor the work of Doris Haddock, more commonly known as Granny D, the New Hampshire political activist who advocated campaign finance reform until her death in 2010 at age 100.

Aaron’s Walk: The New Hampshire Rebellion

By Lawrence Lessig, Huffington Post

A year ago tomorrow, Aaron Swartz left. He had wound us all up, pointed us in a million directions, we were all working as hard as we could, moving things forward. And then he was gone. [..]

I wanted to find a way to mark this day. I wanted to feel it, as physically painful as it was emotionally painful one year ago, and every moment since. So I am marking it with the cause that he convinced me to take up seven years ago and which I am certain he wanted to make his legacy too.

On Saturday, we begin a walk across the state of New Hampshire, to launch a campaign to bring about an end to the system of corruption that we believe infects DC. This is the New Hampshire Rebellion.

Fifteen years after New Hampshire’s Doris Haddock (aka, “Granny D”), at 88, began her famous walk from LA to DC with the sign “CAMPAIGN FINANCE REFORM” on her chest, a dozen or so of us will start to walk in Dixville Notch, NH, the place the first 2016 presidential ballots will be cast. For two weeks, with more than 100 joining us along the way, we will walk south across New Hampshire, ending up in Nashua, NH, on the day Granny D was born.

Along the way, we will recruit everyone we can to do one thing: We want them to ask every presidential candidate at every event between now and January 2016, this one question: “How will YOU end the system of corruption in DC?” [..]

You can help. Please help. You can still join the walk. You can spread the word of the walk (tweet #NHRWalk linked to nhrebellion.org). You can sign a petition from wherever you are to push the candidates to answer this one question. Or, with just a few clicks, you can send support that will help this movement grow.

For Aaron

Anti-Capitalist Meet-Up: Annie Clemenc and the Italian Hall Massacre by JayRaye

Annie Takes Up Her Flag

Ana K Clemenc

Ana K Clemenc

On July 23, 1913, 9,000 copper miners of the Keweenaw laid down their tools and walked off the job. The were led by the great Western Federation of Miners, and they had voted by a good majority for a strike: 9,000 out of 13,000 The main issue were hours, the miners wanted an eight hour day, wages, and safety. The miners hated the new one-man drill which they called the “widow-maker.” They claimed this drill made an already dangerous job more dangerous.

The mining companies had steadfastly refused to recognize the Western Federation of Miners in anyway. They would continue to refuse all efforts at negotiation or arbitration, even those plans for arbitration which did not include the union, and this despite the best efforts of Governor Ferris, and the U. S. Department of Labor. James MacNaughton, general manger of Calumet and Hecla Mining Company, famously stated that grass would grow in the streets and that he would teach the miners to eat potato parings before he would negotiate in any way with the striking miners.

The Keweenaw Peninsula was a cold, windy place, jutting out into Lake Superior from the Upper Peninsula of Michigan. This area was known as the Copper Country of Michigan and included Calumet Township of Houghton County, with the twin towns of Hancock and Houghton ten miles to the south. Calumet Township included the villages of Red Jacket and Laurium.

It was here in Red Jacket, on the third day of the strike that Annie Clemenc, miner’s daughter and miner’s wife took up a massive America flag and led an early morning parade of 400 striking miners and their families. Annie Clemenc was six feet tall, and some claimed she was taller than that by two inches. The flag she carried was so massive that it required a staff two inches thick and ten feet tall. The miners and their supporters marched out of the Italian Hall and through the streets of the Red Jacket to the Blue Jacket and Yellow Jacket mines. They marched silently, without a band, lined up three and four abreast. These early morning marches, with Annie and her flag in the lead, were to become a feature of the strike.

NSA: “Electronic Omnivore”

“Yes, I believe it is in the nation’s best interest to put all the phone records into a lockbox that we could search.”

   –Keith B. Alexander, September 2013

Inside the “Electronic Omnivore”: New Leaks Show NSA Spying on U.N., Climate Summit, Text Messaging

The New York Times has revealed new details about how the National Security Agency is spying on targets ranging from the United Nations to foreign governments to global text messages. We are joined by New York Times reporter Scott Shane, who reports that the NSA has emerged “as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations.” The Times article reveals how the NSA intercepted the talking points of U.N. Secretary-General Ban Ki-moon ahead of a meeting with President Obama in April and mounted a major eavesdropping effort focused on the United Nations Climate Change Conference in Bali in 2007. The Times also reveals the existence of an NSA database called Dishfire that “stores years of text messages from around the world, just in case.” Another NSA program called Tracfin “accumulates gigabytes of credit card purchases.”



Transcript can be read here

As U.S. Weighs Spying Changes, Officials Say Data Sweeps Must Continue

by David E. Sanger, The New York Times

The Obama administration has told allies and lawmakers it is considering reining in a variety of National Security Agency practices overseas, including holding White House reviews of the world leaders the agency is monitoring, forging a new accord with Germany for a closer intelligence relationship and minimizing collection on some foreigners.

But for now, President Obama and his top advisers have concluded that there is no workable alternative to the bulk collection of huge quantities of “metadata,” including records of all telephone calls made inside the United States.

Instead, the administration has hinted it may hold that information for only three years instead of five while it seeks new technologies that would permit it to search the records of telephone and Internet companies, rather than collect the data in bulk in government computers. Gen. Keith B. Alexander, the director of the N.S.A., has told industry officials that developing the new technology would take at least three years.

NSA official cites ‘stop and frisk’ in effort to explain searches of phone records

by Ali Watkins, McClatchy Washington Bureau

The general counsel of the National Security Agency on Monday compared the agency’s telephone metadata collection program to the highly controversial “stop-and-frisk” practice used by law enforcement officers, saying the agency uses that same standard to choose which phone numbers to query in its database.

“It’s effectively the same standard as stop-and-frisk,” Rajesh De said in an attempt to explain the evidentiary use of “reasonable and articulable suspicion” to identify which phone numbers to target from the agency’s huge database of stored cellphone records.

De made the comment during a rare hearing of an obscure government body, the Privacy and Civil Liberties Oversight Board, which Congress created in 2004 to oversee the government’s expanded intelligence collection operations but which until Monday had never held a substantive hearing. [..]

The comparison was the latest in questionable analogies that intelligence officials have used in an effort to explain the agency’s metadata collection programs since former defense contractor Edward Snowden revealed their existence in June.

Intelligence officials, for example, have said repeatedly that the collection of hundreds of millions of phone records allows them to build a haystack in which to find a needle, apparently missing the irony that “finding a needle in a haystack” is an expression meant to convey that a task is all but impossible.

NSA’s Path to Totalitarianism

by Norman Pollack, Counterpunch

The New York Times, a recipient, along with the Guardian, of Snowden’s disclosures about the illegal activities of Obama and USG, is breaking out, as now, of its reticence about the nation’s profound disregard of constitutional principles AND its related policies of global hegemony at all costs-here Scott Shane’s lengthy article (3 Nov.), “No Morsel Too Miniscule for All-Consuming N.S.A.”  NSA to all intents and purposes appears as a “rogue” organization, extremism in the putative service of liberty, except that the designation is a way of distracting attention, and removing accountability, from its authorization and mission at the highest levels-call it, licensed roguery, official (with Obama’s eyes supposedly averted).  Or better, call it, stripped of all cosmetics, the unerring mark of a Police State, itself become identical  with Fortress America, the National-Security State.

Eavesdropping on foreign leaders speaks to an arrogance of power, in which the US claims for itself every right, unilaterally, to script both sides of the foreign dialogue as well as micromanage to its own advantage the rhythm and content of global events, from regional trade partnerships to the use of military force in shoring up alliance systems against a host of enemies, some terrorist groups to be sure, but, using that as pretext, mounting counterrevolution globally against alternative modes, notably, socialist, of modernization: autonomous national and/or radical aspirations seeking distance from US market penetration, the tarnished necklace of its worldwide military bases and CIA stations, and not least, the ideological saturation (assisted by IMF and World Bank applications of pressure) of market fundamentalism, the property right, unrestricted capital flows, and the honor of serving American industry with the lowest possible labor costs, as meanwhile we see the financialization of capitalism here and the gutting of the manufacturing base.

Eavesdropping, of course, is the polite term for control freak, which translates, in the realm of power politics, into societal desperation to employ any and all means for staying on top, cyber-strategies of disruption as well as information-gathering, campaigns of disinformation, CIA-JSOC paramilitary programs of regime change, and, upping the ante, as here, learning every move in advance of foreign leaders, the better-take no chances, take no prisoners-to orchestrate world politics in our favor.

AC Meet-Up: Hellraisers Journal, The Labor Martyrs Project, and WE NEVER FORGET by JayRaye

Back of Envelope Containing

Joe Hill’s Ashes

WE NEVER FORGET

At Joe Hill’s funeral, sashes were worn by many in attendance with “WE NEVER FORGET” written on them in big bold capital letters. This slogan was also written on the program for the day’s events. A year later, the ashes were handed out to IWW delegates from every state of the USA (except Utah) and from countries all around the world. The envelopes also carried this slogan. The Labor Martyrs Project uses this slogan to honor all of our Labor Martyrs, quite certain that Fellow Worker Joe Hill would not mind.

Obama Defends NSA Surveillance on the Way to the G-20

During his stop over in Stockholm, Sweden on the way to the G-20, President Barack Obama renewed his defense of unfettered surveillance

“I can give assurances to the publics in Europe and around the world that we’re not going around snooping at people’s emails or listening to their phone calls,” Obama said in response to a Swedish reporter’s question during a news conference with Prime Minister Fredrik Reinfeldt as he began a whirlwind, 24-hour trip to Sweden. “What we try to do is to target very specifically areas of concern.”

Still, the president acknowledged that questions about privacy were likely to trail him in Europe – a continent that is protective of privacy rights – for some time. The issue also bubbled up during his trip to Germany in June, shortly after newspapers published reports based on documents leaked by former government contractor Edward Snowden.

Despite Obama’s assertions of a more narrow-scope effort, the Snowden-leaked documents show the NSA collects and stores all kinds of data traveling through the Internet, including emails, video chats and instant messages. Under one such classified program, known as Prism, the government can obtain secret court orders and gather mass amounts of data from major Internet companies such as Google, Apple, Microsoft and Facebook.

The ACLU is challenging the constitutionality of the intelligence agency’s action filing a complaint in the Southern District of New York against James Clapper in June. An up date on that lawsuit was posted today on their web site. (please note that the link contains an interesting but really annoying gif).

An impressive array of organizations and individuals filed amicus briefs yesterday in support of the ACLU’s constitutional challenge to the government’s collection of the call records of virtually everyone in the United States. The range of voices joining the protest against mass government surveillance-not to mention the bipartisan storm that has swept Congress since the recent NSA disclosures – is a real testament to the fact that the government’s dragnet surveillance practices are offensive to Americans from across the political spectrum.

Among the groups supporting our lawsuit are the National Rifle Association, the Reporters Committee for Freedom of the Press, and the PEN American Center. Philosophy Professor Michael Lynch submitted a brief arguing that privacy is fundamental to human dignity. Our friends at the Electronic Frontier Foundation submitted a brief on behalf of Rep. Jim Sensenbrenner (R-Wis.), one of the authors of the Patriot Act. Rep. Sensenbrenner has decried the now-public call-records program as outside the scope of the law he authored.

Yes, you’re reading that right, the NRA and Rep. Sensenbrenner.

NSA surveillance: National Rifle Association backs ACLU challenge

by Ewen MacAskill, The Guardian

Anger at US government’s data trawling creates unlikely alliance in court between NRA and American Civil Liberties Union

The NRA, in an amicus brief in support of the ACLU, argues that the mass surveillance programme provides “the government not only with the means of identifying members and others who communicate with the NRA and other advocacy groups, but also with the means of identifying gun owners without their knowledge or consent”.

EFF Files Brief on Behalf of Rep. Sensenbrenner in NSA Spying Case

Press release from Electronic Freedom Foundation

Original Patriot Act Author Says Call-Data Collection Exceeds Congressional Intent

San Francisco – The Electronic Frontier Foundation (EFF) today filed a brief on behalf of Rep. Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, in a case brought by the American Civil Liberties Union (ACLU) against the National Security Agency (NSA). In the brief, Sensenbrenner argues that Congress never intended the Patriot Act to permit the NSA’s collection of the records of every telephone call made to, from and within the United States. Sensenbrenner urges the court to deny the NSA’s motion to dismiss and grant the ACLU’s motion for a preliminary injunction, which would halt the program until the case is decided.

In another development today, hundreds of pages from NSA spying documents are to be released in response to an FOIA request by EFF:

In a major victory in one of EFF’s Freedom of Information Act (FOIA) lawsuits, the Justice Department conceded yesterday that it will release hundreds of pages of documents, including FISA court opinions, related to the government’s secret interpretation of Section 215 of the Patriot Act, the law the NSA has relied upon for years to mass collect the phone records of millions of innocent Americans. [..]

While the government finally released a white paper detailing its expansive (and unconstitutional) interpretation of Section 215 last month, more important FISA court opinions adopting at least part of that interpretation have remained secret. The results of EFF’s FOIA lawsuit will finally lift the veil on the dubious legal underpinnings of NSA’s domestic phone surveillance program.

This victory for EFF comes on the heels of another FOIA success two weeks ago, when the Justice Department was also forced to release a 2011 FISA court opinion ruling some NSA surveillance unconstitutional.

Now to that gif. It is visualization demonstrating the staggering scope of the NSA’s surveillance. Click on the image to view.

ACLU NRA photo blog-3hops-500x280-v01_zpsa00e2a91.jpg

Worse Than NSA: DEA Deal with AT&T

In the midst of the angst of the debate over Obama bombing Syria, a front page article in Monday’s New York Times has revealed a new surveillance scandal involving a little known deal between the Drug Enforcement Agency (DEA) and AT&T called the Hemisphere Project. That deal gives the DEA access to 26 years of its phone records:

Unlike the controversial call record accesses obtained by the NSA, the data is stored by AT&T, not the government, but officials can access individual’s phone records within an hour of an administrative subpoena.

AT&T receives payment from the government in order to sit its employees alongside drug units to aid with access to the data.

The AT&T database includes every phone call which passes through the carrier’s infrastructure, not just those made by AT&T customers.

Details of the program – which was marked as law enforcement sensitive, but not classified – were released in a series of slides to an activist, Drew Hendricks, in response to freedom of information requests, and then passed to reporters at the New York Times.

Officials were instructed to take elaborate steps to ensure the secrecy of the Hemisphere program, a task described as a “formidable challenge” in the slide deck, which detailed the steps agencies had taken to “try and keep the program under the radar”.

The NYT‘s national security reporter, Scott Shane joined Democracy Now!‘s Amy Goodman to discuss the Hemisphere Project and it’s impact.



The transcript for this segment was not available at this time.

DOJ to Let States Legalize Marijuana

Attorney General Eric Holder announced that the Department of Justice would no longer seek to reverse state law that legalize the use of marijuana. However, it still leaves the door open for abuse and harassment by individual US Attornies.

Eric Holder Says DOJ Will Let Washington, Colorado Marijuana Laws Go Into Effect

by Ryan J. Reilly and Ryan Grim, Huffington Post

Deputy Attorney General James Cole also issued a three-and-a-half page memo to U.S. attorneys across the country. “The Department’s guidance in this memorandum rests on its expectation that states and local governments that have enacted laws authorizing marijuana-related conduct will implement strong and effective regulatory and enforcement systems that will address the threat those state laws could pose to public safety, public health and other law enforcement interests,” it reads. “A system adequate to that task must not only contain robust controls and procedures on paper; it must also be effective in practice.”

The memo also outlines eight priorities for federal prosecutors enforcing marijuana laws. According to the guidance, DOJ will still prosecute individuals or entities to prevent:

  • the distribution of marijuana to minors;
  • revenue from the sale of marijuana from going to criminal enterprises, gangs and cartels;
  • the diversion of marijuana from states where it is legal under state law in some form to other states;
  • state-authorized marijuana activity from being used as a cover or pretext for the trafficking of other illegal drugs or other illegal activity;
  • violence and the use of firearms in the cultivation and distribution of marijuana drugged driving and the exacerbation of other adverse public health consequences associated with marijuana use;
  • growing of marijuana on public lands and the attendant public safety and environmental dangers posed by marijuana production on public lands;
  • preventing marijuana possession or use on federal property.

The eight high-priority areas leave prosecutors bent on targeting marijuana businesses with a fair amount of leeway, especially the exception for “adverse public health consequences.” And prosecutors have shown a willingness to aggressively interpret DOJ guidance in the past, as the many medical marijuana dispensary owners now behind bars can attest.

Longtime investigative reporter and co-founder of FAIR, the national media watch group, Martin Lee joined Amy Goodman and Juan González on Democracy Now! to discuss the changes:

“There is so much cultural momentum with respect to marijuana, there is a significant shift in place that the politicians are now starting to catch up to it,” says Martin Lee, longtime investigative reporter and author of several books, including “Smoke Signals: A Social History of Marijuana – Medical, Recreational and Scientific.” He also notes that “the guidance issue made by the Department of Justice yesterday is kind of littered with caveats and red flags.”



Transcript can be read here

The Greatest Lies Ever Told

Someone suggested that latest lie told by President Barack Obama on the Jay Leno Show that other night stating, “There is no spying on Americans. We don’t have a domestic spying program,” was up there with the 10 greatest lies ever told. That fallacy of the president’s declaration was made very obvious in a New York Times article by Charlie Savage on the latest and greatest NSA domestic surveillance program. The NSA has been copying virtually all overseas messages that Americans send or receive, scanning them to see if they contain any references to people or subjects the agency thinks might have a link to terrorists.

Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency “seeks to acquire communications about the target that are not to or from the target.” The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked “Top Secret” amid 18 pages of restrictions, went largely overlooked amid other disclosures.

In an opinion by the New York Times Editorial Board, these messages could be very private and no connection to terrorists or terrorist activity:

That could very well include innocent communications between family members expressing fears of a terror attack. Or messages between an editor and a reporter who is covering international security issues. Or the privileged conversation between a lawyer and a client who is being investigated.

Data collection on this scale goes far beyond what Congress authorized, and it clearly shreds a common-sense understanding of the Fourth Amendment. It’s as if the government were telling its citizens not to even talk about security issues in private messages or else they will come to the attention of the nation’s spies.

At the Electronic Frontier Foundation, Mark Rumold explains what it means to be an NSA target:

When “Target” Means Searching a Specific Person’s Communications

First, at least this much is clear: a “target” under the FA (FISA Amendments Act ) must be (a) a non-US person and (b) not physically located within the United States. A “person,” for purposes of the FAA, includes individuals as well as “any group, entity, association, corporation, or foreign power.”  Under the FAA, the government can thus “target” a single individual (e.g., Vladimir Putin), a small group of people (e.g., Pussy Riot), or a formal corporation or entity (e.g., Gazprom).

So, when the NSA decides to “target” someone (or something), it turns its specific surveillance vacuum at them. [..]

When “Target” Means Searching Everyone’s Communications

Once a target is established, the NSA believes it can expand the sweep of its interception far more broadly than the communhttp://www.guardian.co.uk/world/interactive/2013/jun/20/exhibit-a-procedures-nsa-documentications of the particular, identified target. Notably, the NSA’s procedures state (emphasis added):

   [I]n those cases where NSA seeks to acquire communications about the target that are not to or from the target, NSA will either employ an Internet Protocol filter to ensure that the person from whom it seeks to obtain foreign intelligence information is located overseas, or it will target Internet links that terminate in a foreign country.

In plain English: the NSA believes it not only can (1) intercept the communications of the target, but also (2) intercept communications about a target, even if the target isn’t a party to the communication. The most likely way to assess if a communication is “about” a target is to conduct a content analysis of communications, probably based on specific search terms or selectors.

And that, folks, is what we call a content dragnet.

Importantly, under the NSA’s rules, when the agency intercepts communications about a target, the author or speaker of those communications does not, thereby, become a target: the target remains the original, non-US person. But, because the target remains a non-US person, the most robust protection for Americans’ communications under the FISA Amendments Act (and, indeed, the primary reassurance the government has given about the surveillance) flies out the window. If you communicate about a target of NSA surveillance, your citizenship is irrelevant: the only thing standing between you and NSA surveillance is your IP address or the fiber optic path through which your communications flow.

Jameel Jaffer, American Civil Liberties Union deputy legal director, made the following comments about the latest revelations:

“The program described by the New York Times involves a breathtaking invasion of millions of people’s privacy.  The NSA has cast a massive dragnet over Americans’ international communications, collecting and monitoring all of them, and retaining some untold number of them in government databases.  This is precisely the kind of generalized spying that the Fourth Amendment was intended to prohibit.

“The government’s scrutiny of virtually every international email sent by Americans will have extraordinary consequences for free expression. Americans will inevitably hesitate to discuss controversial topics, visit politically sensitive websites, or interact with foreigners with dissenting views. By injecting the NSA into virtually every cross-border interaction, the U.S. government will forever alter what has always been an open exchange of ideas.

“There is no spying on Americans. We don’t have a domestic spying program,” is right up there with “I am not a crook” and “I did not have sex with that woman.”

NSA Handing Information to DEA and DOJ

The National Security Agency isn’t just looking to “keep us safe” from terrorists by collecting metadata, the NSA is sharing its information with the secretive Special Operations Division of the U.S. Drug Enforcement Administration (DEA) which is then passing that information to local authorities, covering up the NSA source.

U.S. directs agents to cover up program used to investigate Americans

by John Shiffman and Kristina Cooke, Reuters

A secretive US Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

It isn’t just the DEA that is doing this, the Justice Department is also receiving information about non-terrorist related criminal activity.

NSA handing over non-terror intelligence

by Stewart M. Powell, SFGate

The National Security Agency is handing the Justice Department information, derived from its secret electronic eavesdropping programs, about suspected criminal activity unrelated to terrorism.

This little-known byproduct of counterterrorism surveillance continues amid controversy over the NSA’s wide-ranging collection of domestic communications intelligence, including Americans’ telephone calling records and Internet use.

It is unclear whether the referrals have been built upon the content of telephone calls and emails. Administration officials have previously assured Congress that NSA surveillance focuses on so-called metadata and in the main does not delve into the content of individual calls or email messages.

Also, some in the legal community question the constitutionality of criminal prosecutions stemming from intelligence-agency eavesdropping.

Other Agencies Clamor for Data N.S.A. Compiles

by Eric Lichtblau and Michael S. Schmidt, The New York Times

The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.

Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.

The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.

At emptywheel, bmaz points out this is nothing in the Reuter’s article on the SOD wasn’t already known, just no one has been paying attention:

First, the headline is misleading. The caption is:

   Exclusive: U.S. directs agents to cover up program used to investigate Americans

Well, not really (and, in fairness, the actual body of the article is about a practice that is a result of the SOD). DEA’s Special Ops Division is neither new nor secret in the least, and there is no way to “cover it up”. Google it; I got “About 289,000 results (0.29 seconds)” as a return. You will get something similar. The revelation that SOD was used in the Viktor Bout case is also not new, here is a Time story detailing it from 2011.

In fact, any criminal defense attorney who did cocaine hub conspiracy cases in the 90′s could have told you most of the Reuter’s article in their sleep. That was exactly the scene that DEA-SOD was born from. As the war on drugs went nuclear, the DEA devised what they termed the “Kingpin Strategy” (pdf):

   In 1992, the DEA instituted the Kingpin Strategy that focused investigative and enforcement efforts on specific drug trafficking organizations. The DEA planned to dis- able major organizations by attacking their most vulnerable areas-the chemicals needed to process the drugs, their finances, communications, transportation, and leadership structure.

   The Kingpin Strategy held that the greatest impact on the drug trade took place when major drug organizations were dis- rupted, weakened, and destroyed. This strategy focused enforcement efforts and resources against the highest-level traffickers and their organizations, and provided a systematic way of attacking the various vulnerabilities of the organiza- tions. By systematically attacking each of these vulnerabilities, the strategy aimed to destroy the entire organization, and with it, the organization’s capacity to finance, produce, and distrib- ute massive amounts of illegal drugs. Each blow weakened the organization and improved the prospects for arresting and prosecuting the leaders and managers of the organizations.

   The Kingpin Strategy evolved from the DEA’s domestic and overseas intelligence gathering and investigations.

And from Kingpin sprung the Special Operations Division:

   Under the original Kingpin Strategy, DEA headquarters often dictated the selection of Kingpin targets. In response to the SACs’ concerns, Administrator Constantine agreed to allow them more latitude in target selection. In conjuction with this decision, he established the Special Operations Division at Newington, Virginia, in 1994 to coordinate multi-jurisdictional investigations against major drug trafficking organizations responsible for the flow of drugs into the United States.

On this morning’s Democracy Now!, Guardian journalist Glenn Greenwald responded to a report by Reuters.



Transcript can be read here.

“It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained,” Greenwald says.

Their Silence Killed

There is no justice in following unjust laws.

~Aaron Swartz~

Aaron Swartz photo imagesqtbnANd9GcSri_QsacSc5jhQFcunN_zps1a2d5300.jpgThe long awaited internal report (pdf) of its roll of the Massachusetts Institute of Technology in the federal prosecution of Aaron Swartz for hacking into its computer system has been finally been released. Aaron was being charges by federal prosecutors with 13 counts of violating the Computer Frauds Act. He was facing a $1 million fine and up to 35 years in prison when he committed suicide in his Brooklyn apartment in January of this year. Aaron also suffered from severe depression.

The report found that MIT did not press for prosecution of Aaron for downloading several million academic articles from the JSTOR database through the MIT computer network, which were returned. However, the school did nothing to stop the over zealous prosecution.

In a Guardian article written by Amanda Holpuch, the report stated that the school viewed that US v Swartz was “simply a lawsuit to which it was not a party.” Yet, they told the prosecutors that that it was not seeking punishment for Swartz but never actually said that they were opposed to jail time. How these people thought that that they were “not party” to Aaron’s prosecution is simply beyond belief.

According to the report, prior to his death, “the MIT community paid scant attention” to Swartz’s prosecution and few people expressed concerns to the administration about the case. However, Swartz’s father, a consultant to the MIT lab and former student there, asked MIT to aid efforts to have the charges dropped or to get a plea deal that would not have jail time. Two faculty members advocated a similar appeal.

In choosing the position of neutrality, the report says the school did not consider Swartz’s contributions to internet technology and was not critical enough of the US government’s “overtly aggressive prosecution.” MIT also did not account for Swartz’s prosecution under the Computer Fraud and Abuse Act, which the report called ” a poorly drafted and questionable criminal law.” That law has been widely criticised since Swartz’s death. [..]

Friends and family have been harshly critical of the report with Aaron’s partner, Taren Stinebrickner-Kauffman, calling the report a “whitewash” on her blog.

She also criticized the school for objecting to a Freedom of Information Act request for the secret service files on Swartz’s case. The school took the unusual step of intervening in the request for government documents after a judge ordered the documents to be released in July.

The Wired reported that while MIT claimed it was “neutral,” it is very clear from the report that they willingly cooperated with the prosecution’s investigation:

MIT police called the Cambridge police, who showed up with a Secret Service agent from the New England Electronic Crimes Task Force – sparking the federal investigation.

The report says that MIT officially adopted a neutral posture with respect to the federal criminal case, treating it as an outside matter. But it also details extensive cooperation between MIT officials and federal agents and prosecutors.

MIT sniffed network traffic from Swartz’s computer and provided logs voluntarily to the government, without demanding a subpoena. And MIT did not offer to give Swartz’s defense team access to the employees interviewed by prosecutors. “The choice not to do this was based on a judgment that the criminal process was sufficiently fair, without the need for it to provide equality of outcome,” the report notes.

“The report makes clear that MIT was not neutral,” says Robert Swartz, who’d met with MIT repeatedly during the prosecution to plead for his son. “But they should not have been neutral. They should have advocated of Aaron’s behalf, because the law under which he was charged was wrong.”

“They cooperated with prosecutors in endless ways, and they were fundamentally opaque to us.”

My fervent hope that the people at MIT who decided to cooperate with the aggressive prosecution of Aaron sleep at night haunted by his face.

Load more