Sunday, June 30, 2013




Friday, June 28, 2013

Spying on First Amendment Activity - State-by-State






United States law enforcement agencies, from the FBI to local police, have a long history of spying on American citizens and infiltrating or otherwise obstructing political activist groups. Political spying was rampant during the Cold War under the FBI's COINTELPRO, the CIA's Operation Chaos, and other program. 

[MAP]

Unfortunately, it appears that these old tendencies have once again come to the fore. Law enforcement agencies across America continue to monitor and harass groups and individuals for doing little more than peacefully exercising their First Amendment rights.

A thorough search and review of news accounts by the ACLU reveals that these law enforcement behaviors have taken place in at least 36 states plus the District of Columbia in recent years. Americans have been put under surveillance or harassed by the police just for deciding to organize, march, protest, espouse unusual viewpoints, and engage in normal, innocuous behaviors such as writing notes or taking photographs in public.
For example, in 2009, at least four troubling Fusion Center reports have come to light:

• The Virginia Fusion Center's Homegrown Terrorism Document:
http://www.infowars.com/media/vafusioncenterterrorassessment.pdf

• The Texas Fusion Center's Prevention Awareness Bulletin:
http://www.privacylives.com/wp-content/uploads/2009/03/texasfusion_021909.pdf

• The Missouri Fusion Center's Document on the Modern Militia Movement:
http://www.privacylives.com/wp-content/uploads/2009/03/miacreport_022009.pdf

• The Massachusetts Fusion Center's “Commonwealth Fusion Center's Standard Operating Procedures”
http://www.aclu.org/files/pdfs/spyfiles/ma_14furtherinformation_attach_guidelinesforinvestigationsinvolvingfirstamendactivity.pdf

Nationally

• DHS Reports Warns of Veterans. DHS's "Right-Wing Extremism" Report warned that right-wing extremists might recruit and radicalize "disgruntled military veterans." (http://www.washingtontimes.com/news/2009/apr/14/federal-agency-warns-of-radicals-on-right/)

• DHS Report Warns of Environmental Groups. DHS's Contractor Eco-Terrorism Report described environmental organizations like the Sierra Club, the Humane Society, and the Audubon Society as "mainstream organizations with known or possible links to eco-terrorism." (http://www.unbossed.com/index.php?itemid=2546)

• DHS Keeps Calendar of Peaceful Protests. DHS's March 2006 "Protective Intelligence Bulletin" lists several advocacy groups that were targets of the Maryland State Police operations, including CODEPINK, Iraq Pledge of Resistance and DAWN, and contains a "civil activists and extremists action calendar" that details dozens of demonstrations planned around the country, mostly peace rallies. Federal Protective Services apparently gleaned this information from the Internet. There is no indication anywhere in the document to suggest illegal activity might occur at any of these demonstrations. The ACLU filed complaints in response to this improper intelligence gathering, and the DHS Office of Civil Rights and Civil Liberties concluded its review, determining that information like that will no longer be distributed regionally or nationally, and will only be distributed locally to those who have a situational awareness need for the information. (http://www.aclu.org/privacy/gen/39226prs20090401.html and
http://www.aclu.org/national-security/letter-aclu-dhs-office-civil-rights-and-civil-liberties-regarding-surveillance)

• FBI Lists Green Party as Target for Eco-Terrorism Investigation. The FBI Field Intelligence Group lists the Green Party as potential future target of eco-terrorism investigation. (http://gawker.com/5329187/fbi-agent-thinks-the-green-party-is-a-terrorist-group-with-nukes)

• DHS Reports on Nation of Islam in Violation of its own Protocols. In October 2007, DHS sent a report, "Nation of Islam: Uncertain Leadership Succession Poses Risks," to hundreds of federal officials despite the fact that Department guidelines had called for the files to be destroyed because the assessment of the group had lasted more than 180 days without uncovering evidence of potential terrorism. (http://www.nytimes.com/2009/12/17/us/17disclose.html?_r=2&ref=todayspaper).

• FBI Spies on Activists Involved in First Amendment Activities and Mischaracterizes Civil Disobedience.The FBI improperly spied on American activists involved in First Amendment-protected activities, mischaracterized nonviolent civil disobedience as terrorism, and improperly placed activists on terrorist watch lists, according to a report by the Justice Department’s Inspector General (IG). The IG found the improper investigations were often opened based on “factually weak” or even “speculative” justifications and were sometimes extended in duration without sufficient basis. (http://www.nytimes.com/2010/09/21/us/politics/21fbi.html,http://www.washingtonpost.com/wp-dyn/content/article/2010/09/20/AR201009...,http://blog.washingtonpost.com/spy-talk/2010/09/fbi_cover-up_turns_laugh...,http://online.wsj.com/article/SB1000142405274870398930457550419230689262..., andhttp://www.latimes.com/news/nationworld/nation/la-na-fbi-activists-20100...).

• Senate Security Will Use Internet Data Mining to Identify Lawmaker Threats. Senate Sgt. at Arms plans to contract with a private company to data mine the internet and social media sites to search keywords such as lawmakers names, and “slash” or “shoot” to identify potential threats. (http://thehill.com/blogs/hillicon-valley/technology/155881-senate-security-will-conduct-internet-data-mining-to-identify-lawmaker-threats)


Wednesday, June 26, 2013









The Banality of ‘Don’t Be Evil’



By JULIAN ASSANGE
Published: June 1, 2013



“THE New Digital Age” is a startlingly clear and provocative blueprint for technocratic imperialism, from two of its leading witch doctors, Eric Schmidt and Jared Cohen, who construct a new idiom for United States global power in the 21st century. This idiom reflects the ever closer union between the State Department and Silicon Valley, as personified by Mr. Schmidt, the executive chairman of Google, and Mr. Cohen, a former adviser to Condoleezza Rice and Hillary Clinton who is now director of Google Ideas.

The authors met in occupied Baghdad in 2009, when the book was conceived. Strolling among the ruins, the two became excited that consumer technology was transforming a society flattened by United States military occupation. They decided the tech industry could be a powerful agent of American foreign policy.

The book proselytizes the role of technology in reshaping the world’s people and nations into likenesses of the world’s dominant superpower, whether they want to be reshaped or not. The prose is terse, the argument confident and the wisdom — banal. But this isn’t a book designed to be read. It is a major declaration designed to foster alliances.

“The New Digital Age” is, beyond anything else, an attempt by Google to position itself as America’s geopolitical visionary — the one company that can answer the question “Where should America go?” It is not surprising that a respectable cast of the world’s most famous warmongers has been trotted out to give its stamp of approval to this enticement to Western soft power. The acknowledgments give pride of place to Henry Kissinger, who along with Tony Blair and the former C.I.A. director Michael Hayden provided advance praise for the book.

In the book the authors happily take up the white geek’s burden. A liberal sprinkling of convenient, hypothetical dark-skinned worthies appear: Congolese fisherwomen, graphic designers in Botswana, anticorruption activists in San Salvador and illiterate Masai cattle herders in the Serengeti are all obediently summoned to demonstrate the progressive properties of Google phones jacked into the informational supply chain of the Western empire.

The authors offer an expertly banalized version of tomorrow’s world: the gadgetry of decades hence is predicted to be much like what we have right now — only cooler. “Progress” is driven by the inexorable spread of American consumer technology over the surface of the earth. Already, every day, another million or so Google-run mobile devices are activated. Google will interpose itself, and hence the United States government, between the communications of every human being not in China (naughty China). Commodities just become more marvelous; young, urban professionals sleep, work and shop with greater ease and comfort; democracy is insidiously subverted by technologies of surveillance, and control is enthusiastically rebranded as “participation”; and our present world order of systematized domination, intimidation and oppression continues, unmentioned, unafflicted or only faintly perturbed.

The authors are sour about the Egyptian triumph of 2011. They dismiss the Egyptian youth witheringly, claiming that “the mix of activism and arrogance in young people is universal.” Digitally inspired mobs mean revolutions will be “easier to start” but “harder to finish.” Because of the absence of strong leaders, the result, or so Mr. Kissinger tells the authors, will be coalition governments that descend into autocracies. They say there will be “no more springs” (but China is on the ropes).

The authors fantasize about the future of “well resourced” revolutionary groups. A new “crop of consultants” will “use data to build and fine-tune a political figure.”

“His” speeches (the future isn’t all that different) and writing will be fed “through complex feature-extraction and trend-analysis software suites” while “mapping his brain function,” and other “sophisticated diagnostics” will be used to “assess the weak parts of his political repertoire.”

The book mirrors State Department institutional taboos and obsessions. It avoids meaningful criticism of Israel and Saudi Arabia. It pretends, quite extraordinarily, that the Latin American sovereignty movement, which has liberated so many from United States-backed plutocracies and dictatorships over the last 30 years, never happened. Referring instead to the region’s “aging leaders,” the book can’t see Latin America for Cuba. And, of course, the book frets theatrically over Washington’s favorite boogeymen: North Korea and Iran.

Google, which started out as an expression of independent Californian graduate student culture — a decent, humane and playful culture — has, as it encountered the big, bad world, thrown its lot in with traditional Washington power elements, from the State Department to the National Security Agency.

Despite accounting for an infinitesimal fraction of violent deaths globally, terrorism is a favorite brand in United States policy circles. This is a fetish that must also be catered to, and so “The Future of Terrorism” gets a whole chapter. The future of terrorism, we learn, is cyberterrorism. A session of indulgent scaremongering follows, including a breathless disaster-movie scenario, wherein cyberterrorists take control of American air-traffic control systems and send planes crashing into buildings, shutting down power grids and launching nuclear weapons. The authors then tar activists who engage in digital sit-ins with the same brush.

I have a very different perspective. The advance of information technology epitomized by Google heralds the death of privacy for most people and shifts the world toward authoritarianism. This is the principal thesis in my book, “Cypherpunks.” But while Mr. Schmidt and Mr. Cohen tell us that the death of privacy will aid governments in “repressive autocracies” in “targeting their citizens,” they also say governments in “open” democracies will see it as “a gift” enabling them to “better respond to citizen and customer concerns.” In reality, the erosion of individual privacy in the West and the attendant centralization of power make abuses inevitable, moving the “good” societies closer to the “bad” ones.

The section on “repressive autocracies” describes, disapprovingly, various repressive surveillance measures: legislation to insert back doors into software to enable spying on citizens, monitoring of social networks and the collection of intelligence on entire populations. All of these are already in widespread use in the United States. In fact, some of those measures — like the push to require every social-network profile to be linked to a real name — were spearheaded by Google itself.

THE writing is on the wall, but the authors cannot see it. They borrow from William Dobson the idea that the media, in an autocracy, “allows for an opposition press as long as regime opponents understand where the unspoken limits are.” But these trends are beginning to emerge in the United States. No one doubts the chilling effects of the investigations into The Associated Press and Fox’s James Rosen. But there has been little analysis of Google’s role in complying with the Rosen subpoena. I have personal experience of these trends.

The Department of Justice admitted in March that it was in its third year of a continuing criminal investigation of WikiLeaks. Court testimony states that its targets include “the founders, owners, or managers of WikiLeaks.” One alleged source, Bradley Manning, faces a 12-week trial beginning tomorrow, with 24 prosecution witnesses expected to testify in secret.

This book is a balefully seminal work in which neither author has the language to see, much less to express, the titanic centralizing evil they are constructing. “What Lockheed Martin was to the 20th century,” they tell us, “technology and cybersecurity companies will be to the 21st.” Without even understanding how, they have updated and seamlessly implemented George Orwell’s prophecy. If you want a vision of the future, imagine Washington-backed Google Glasses strapped onto vacant human faces — forever. Zealots of the cult of consumer technology will find little to inspire them here, not that they ever seem to need it. But this is essential reading for anyone caught up in the struggle for the future, in view of one simple imperative: Know your enemy.

Julian Assange is the editor in chief of WikiLeaks and author of “Cypherpunks: Freedom and the Future of the Internet.”


The FISA court is acting like a legislature, and that’s a problem



"These documents look more like legislation than search warrants." 


By Timothy B. Lee, Published: June 20, 2013 at 5:27 pm

One of the National Security Agency’s key talking points since the PRISM program was revealed two weeks ago has been that its surveillance activities are subject to oversight by the Foreign Intelligence Surveillance Court. In his latest scoop, the Guardian’s Glenn Greenwald has revealed two of the documents the government submits to the court prior to engaging in surveillance under the Foreign Intelligence Surveillance Act.

These documents are often compared to the warrants the government ordinarily needs for searches of Americans. But they’re dramatically different from a conventional search warrant. A warrant is supposed to “particularly” describe who will be targeted by a search. It will typically include a suspect’s name, as well as the address to be searched or the phone number to be wiretapped.

The documents released by the Guardian don’t look like that at all. The first document is nine pages long and explains in some detail the factors the NSA uses to determine whether a potential surveillance target is a “US person”—if the answer is yes, then the agency cancels the planned surveillance. The second document, also nine pages, describes what the NSA does if it accidentally collects the private communications of Americans.

These documents look more like legislation than search warrants. They define legal concepts, describe legal standards to be applied and specify procedures for NSA officials to follow. For example, the second document states that “a person known to be an alien admitted for permanent residence loses status as a United States person if the person leaves the united States and is not in compliance with 8 USC § 1203 enabling re-entry into the United States.”

But rather than being drafted, debated and enacted by Congress, the documents were drafted by Obama administration lawyers and reviewed by the FISC.

Congress is much better equipped than the courts to review this kind of quasi-legislative proposal. It has thousands of staffers and can spend months debating the details of a proposal. Members have the power to call witnesses and to amend legislation if it’s not to their liking. And they debate in public, giving academics, public interest groups and members of the general public an opportunity to point out flaws and suggest improvements.

In contrast, the FISC has only 11 members and a limited staff. In most cases it hears testimony only from the government, and only in secret. It must make decisions within 30 days. In principle it has the power to modify proposed orders, but it lacks the manpower and expertise to exercise this power effectively. The FISC’s secretive review process leaves no meaningful opportunities for third parties to point out flaws in the government’s proposal and suggest alternatives.

And once the courts sign off on these general targeting procedures, no one outside the executive branch performs the function traditionally performed by the courts: double-checking that the government actually follows the rules. The government has some internal oversight mechanisms, but no one in the judicial branch verifies that the individuals the government targets for surveillance are actual foreigners, as the law requires.

The Constitution specifies that Congress should write laws and that the courts should interpret them. The founders set things up that way for a reason. Allowing the executive branch to effectively write its own rules, get them rubber-stamped by a secretive court and then comply with them on an honor system is guaranteed to produce rules that are more favorable to the government and less carefully drafted than rules drafted the old-fashioned way.


Warrants issued by a secret FISA court provide the NSA with a HUGE loophole into domestic surveillance



The top secret rules that allow NSA to use US data without a warrant


Fisa court submissions show broad scope of procedures governing NSA's surveillance of Americans' communication

 Document one: procedures used by NSA to target non-US persons
• Document two: procedures used by NSA to minimise data collected from US persons


guardian.co.uk, Thursday 20 June 2013 23.59 BST

The documents show that discretion as to who is actually targeted lies directly with the NSA's analysts. 

Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant.

The Guardian is publishing in full two documents submitted to the secret Foreign Intelligence Surveillance Court (known as the Fisa court), signed by Attorney General Eric Holder and stamped 29 July 2009. They detail the procedures the NSA is required to follow to target "non-US persons" under its foreign intelligence powers and what the agency does to minimize data collected on US citizens and residents in the course of that surveillance.

The documents show that even under authorities governing the collection of foreign intelligence from foreign targets, US communications can still be collected, retained and used.

The procedures cover only part of the NSA's surveillance of domestic US communications. The bulk collection of domestic call records, as first revealed by the Guardian earlier this month, takes place under rolling court orders issued on the basis of a legal interpretation of a different authority, section 215 of the Patriot Act.

The Fisa court's oversight role has been referenced many times by Barack Obama and senior intelligence officials as they have sought to reassure the public about surveillance, but the procedures approved by the court have never before been publicly disclosed.

The top secret documents published today detail the circumstances in which data collected on US persons under the foreign intelligence authority must be destroyed, extensive steps analysts must take to try to check targets are outside the US, and reveals how US call records are used to help remove US citizens and residents from data collection.

However, alongside those provisions, the Fisa court-approved policies allow the NSA to:

• Keep data that could potentially contain details of US persons for up to five years;
• Retain and make use of "inadvertently acquired" domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted, or are believed to contain any information relevant to cybersecurity;
• Preserve "foreign intelligence information" contained within attorney-client communications;
• Access the content of communications gathered from "U.S. based machine[s]" or phone numbers in order to establish if targets are located in the US, for the purposes of ceasing further surveillance.

The broad scope of the court orders, and the nature of the procedures set out in the documents, appear to clash with assurances from President Obama and senior intelligence officials that the NSA could not access Americans' call or email information without warrants.

The documents also show that discretion as to who is actually targeted under the NSA's foreign surveillance powers lies directly with its own analysts, without recourse to courts or superiors – though a percentage of targeting decisions are reviewed by internal audit teams on a regular basis.

Since the Guardian first revealed the extent of the NSA's collection of US communications, there have been repeated calls for the legal basis of the programs to be released. On Thursday, two US congressmen introduced a bill compelling the Obama administration to declassify the secret legal justifications for NSA surveillance.

The disclosure bill, sponsored by Adam Schiff, a California Democrat, and Todd Rokita, an Indiana Republican, is a complement to one proposed in the Senate last week. It would "increase the transparency of the Fisa Court and the state of the law in this area," Schiff told the Guardian. "It would give the public a better understanding of the safeguards, as well as the scope of these programs."

Section 702 of the Fisa Amendments Act (FAA), which was renewed for five years last December, is the authority under which the NSA is allowed to collect large-scale data, including foreign communications and also communications between the US and other countries, provided the target is overseas.

FAA warrants are issued by the Fisa court for up to 12 months at a time, and authorise the collection of bulk information – some of which can include communications of US citizens, or people inside the US. To intentionally target either of those groups requires an individual warrant.

One-paragraph order

One such warrant seen by the Guardian shows that they do not contain detailed legal rulings or explanation. 
Instead, the one-paragraph order, signed by a Fisa court judge in 2010, declares that the procedures submitted by the attorney general on behalf of the NSA are consistent with US law and the fourth amendment.

Those procedures state that the "NSA determines whether a person is a non-United States person reasonably believed to be outside the United States in light of the totality of the circumstances based on the information available with respect to that person, including information concerning the communications facility or facilities used by that person".

It includes information that the NSA analyst uses to make this determination – including IP addresses, statements made by the potential target, and other information in the NSA databases, which can include public information and data collected by other agencies.

Where the NSA has no specific information on a person's location, analysts are free to presume they are overseas, the document continues.

"In the absence of specific information regarding whether a target is a United States person," it states "a person reasonably believed to be located outside the United States or whose location is not known will be presumed to be a non-United States person unless such person can be positively identified as a United States person."

If it later appears that a target is in fact located in the US, analysts are permitted to look at the content of messages, or listen to phone calls, to establish if this is indeed the case.

Referring to steps taken to prevent intentional collection of telephone content of those inside the US, the document states: "NSA analysts may analyze content for indications that a foreign target has entered or intends to enter the United States. Such content analysis will be conducted according to analytic and intelligence requirements and priorities."

Details set out in the "minimization procedures", regularly referred to in House and Senate hearings, as well as public statements in recent weeks, also raise questions as to the extent of monitoring of US citizens and residents.

NSA minimization procedures signed by Holder in 2009 set out that once a target is confirmed to be within the US, interception must stop immediately. However, these circumstances do not apply to large-scale data where the NSA claims it is unable to filter US communications from non-US ones.

The NSA is empowered to retain data for up to five years and the policy states "communications which may be retained include electronic communications acquired because of limitations on the NSA's ability to filter communications".

Even if upon examination a communication is found to be domestic – entirely within the US – the NSA can appeal to its director to keep what it has found if it contains "significant foreign intelligence information", "evidence of a crime", "technical data base information" (such as encrypted communications), or "information pertaining to a threat of serious harm to life or property".

Domestic communications containing none of the above must be destroyed. Communications in which one party was outside the US, but the other is a US-person, are permitted for retention under FAA rules.

The minimization procedure adds that these can be disseminated to other agencies or friendly governments if the US person is anonymised, or including the US person's identity under certain criteria.

Holder's 'minimization procedure' says once a target is confirmed to be in the US, interception of communication must stop. 

A separate section of the same document notes that as soon as any intercepted communications are determined to have been between someone under US criminal indictment and their attorney, surveillance must stop. However, the material collected can be retained, if it is useful, though in a segregated database:

"The relevant portion of the communication containing that conversation will be segregated and the National Security Division of the Department of Justice will be notified so that appropriate procedures may be established to protect such communications from review or use in any criminal prosecution, while preserving foreign intelligence information contained therein," the document states.

In practice, much of the decision-making appears to lie with NSA analysts, rather than the Fisa court or senior officials.

A transcript of a 2008 briefing on FAA from the NSA's general counsel sets out how much discretion NSA analysts possess when it comes to the specifics of targeting, and making decisions on who they believe is a non-US person. Referring to a situation where there has been a suggestion a target is within the US.

"Once again, the standard here is a reasonable belief that your target is outside the United States. What does that mean when you get information that might lead you to believe the contrary? It means you can't ignore it. 

You can't turn a blind eye to somebody saying: 'Hey, I think so and so is in the United States.' You can't ignore that. Does it mean you have to completely turn off collection the minute you hear that? No, it means you have to do some sort of investigation: 'Is that guy right? Is my target here?" he says.

"But, if everything else you have says 'no' (he talked yesterday, I saw him on TV yesterday, even, depending on the target, he was in Baghdad) you can still continue targeting but you have to keep that in mind. You can't put it aside. You have to investigate it and, once again, with that new information in mind, what is your reasonable belief about your target's location?"

The broad nature of the court's oversight role, and the discretion given to NSA analysts, sheds light on responses from the administration and internet companies to the Guardian's disclosure of the PRISM program. They have stated that the content of online communications is turned over to the NSA only pursuant to a court order. But except when a US citizen is specifically targeted, the court orders used by the NSA to obtain that information as part of Prism are these general FAA orders, not individualized warrants specific to any individual.

Once armed with these general orders, the NSA is empowered to compel telephone and internet companies to turn over to it the communications of any individual identified by the NSA. The Fisa court plays no role in the selection of those individuals, nor does it monitor who is selected by the NSA.

The NSA's ability to collect and retain the communications of people in the US, even without a warrant, has fuelled congressional demands for an estimate of how many Americans have been caught up in surveillance.

Two US senators, Ron Wyden and Mark Udall – both members of the Senate intelligence committee – have been seeking this information since 2011, but senior White House and intelligence officials have repeatedly insisted that the agency is unable to gather such statistics.


Supreme Injustices




WASHINGTON — The Supreme Court on Tuesday effectively struck down the heart of the Voting Rights Act of 1965 by a 5-to-4 vote, ruling that Congress had not provided adequate justification for subjecting nine states, mostly in the South, to federal oversight.

Stephen Crowley/The New York Times

Wade Henderson, president and C.E.O. of the Leadership Conference on Civil and Human Rights, criticized the decision on Tuesday.

“In 1965, the states could be divided into two groups: those with a recent history of voting tests and low voter registration and turnout, and those without those characteristics,” Chief Justice John G. Roberts Jr. wrote for the majority. “Congress based its coverage formula on that distinction. Today the nation is no longer divided along those lines, yet the Voting Rights Act continues to treat it as if it were.”

Chief Justice Roberts said that Congress remained free to try to impose federal oversight on states where voting rights were at risk, but must do so based on contemporary data. When the law was last renewed, in 2006, Congress relied on data from decades before. The chances that the current Congress could reach agreement on where federal oversight is required are small, most analysts say.

Justices Antonin Scalia, Anthony M. Kennedy, Clarence Thomas and Samuel A. Alito Jr. joined the majority opinion. Justice Ruth Bader Ginsburg dissented, joined by Justices Stephen G. Breyer, Sonia Sotomayor and Elena Kagan.

The majority held that the coverage formula in Section 4 of the Voting Rights Act, originally passed in 1965 and most recently updated by Congress in 1975, was unconstitutional. The section determines which states must receive preclearance from the federal authorities.

The court did not strike down Section 5, which sets out the pre-clearance requirement itself. But without Section 4, which determines which states are covered, Section 5 is without significance — unless Congress chooses to pass a new bill for determining which states would be covered.

The Voting Rights Act of 1965 was one of the towering legislative achievements of the civil rights movement. Its central provision, Section 5, requires many state and local governments, mostly in the South, to obtain permission from the Justice Department or a federal court in Washington before making changes in laws that affect voting.

That means jurisdictions covered by Section 5 must get federal approval before they make minor changes to voting procedures, like relocating a polling place, or major ones, like redrawing electoral districts.

The Supreme Court had repeatedly upheld the law, saying that Section 5’s “preclearance requirement” was an effective tool to combat the legacy of lawless conduct by Southern officials bent on denying voting rights to blacks.

Critics of Section 5 say it is a unique federal intrusion on state sovereignty and a badge of shame for the affected jurisdictions that is no longer justified. They point to high voter registration rates among blacks and the re-election of a black president as proof that the provision is no longer needed.

Civil rights leaders, on the other hand, say the law played an important role in the 2012 election, with courts relying on it to block voter identification requirements and cutbacks on early voting.

Section 5 was originally set to expire in five years. Congress repeatedly extended it: for five years in 1970, seven years in 1975, and 25 years in 1982. Congress renewed the act in 2006 after holding extensive hearings on the persistence of racial discrimination at the polls, again extending the preclearance requirement for 25 years.

In 2012, a divided three-judge panel of the United States Court of Appeals for the District of Columbia rejected a challenge to the law filed by Shelby County, Ala. Judge David S. Tatel, writing for the majority, acknowledged that “the extraordinary federalism costs imposed by Section 5 raise substantial constitutional concerns,” and he added that the record compiled by Congress to justify the law’s renewal was “by no means unambiguous.”

“But Congress drew reasonable conclusions from the extensive evidence it gathered,” he went on. The constitutional amendments ratified after the Civil War, he said, “entrust Congress with ensuring that the right to vote — surely among the most important guarantees of political liberty in the Constitution — is not abridged on account of race. In this context, we owe much deference to the considered judgment of the people’s elected representatives.”

The dissenting member of the panel, Judge Stephen F. Williams, surveyed recent evidence concerning registration and turnout, the election of black officials, the use of federal election observers and suits under another part of the law.

Some of that evidence, he said, “suggests that the coverage formula completely lacks any rational connection to current levels of voter discrimination,” while other evidence indicates that the formula, “though not completely perverse, is a remarkably bad fit with Congress’s concerns.”

“Given the drastic remedy imposed on covered jurisdictions by Section 5,” he wrote, “I do not believe that such equivocal evidence can sustain the scheme.”

The Supreme Court had once before considered the constitutionality of the 2006 extension of the law in a 2009 decision, Northwest Austin Municipal Utility District Number One v. Holder. But it avoided answering the central question, and it seemed to give Congress an opportunity to make adjustments. Congress did not respond.