Sunday, June 30, 2013
Friday, June 28, 2013
Spying on First Amendment Activity - State-by-State
SEE THE MAP
ONLINE AT: http://www.aclu.org/maps/spying-first-amendment-activity-state-state?utm_source=TomDispatch&utm_campaign=dd5f4ffb42-TD_Gitlin6_27_2013&utm_medium=email&utm_term=0_1e41682ade-dd5f4ffb42-308837965
United
States law enforcement agencies, from the FBI to local police, have a long
history of spying on American citizens and infiltrating or otherwise
obstructing political activist groups. Political spying was rampant during
the Cold War under the FBI's COINTELPRO, the CIA's Operation Chaos, and other
program.
[MAP]
Unfortunately,
it appears that these old tendencies have once again come to the fore. Law
enforcement agencies across America continue to monitor and harass groups and
individuals for doing little more than peacefully exercising their First
Amendment rights.
A thorough
search and review of news accounts by the ACLU reveals that these law
enforcement behaviors have taken place in at least 36 states plus the District
of Columbia in recent years. Americans have been put under surveillance or
harassed by the police just for deciding to organize, march, protest, espouse
unusual viewpoints, and engage in normal, innocuous behaviors such as writing
notes or taking photographs in public.
For example,
in 2009, at least four troubling Fusion Center reports have come to light:
• The
Virginia Fusion Center's Homegrown Terrorism Document:
http://www.infowars.com/media/vafusioncenterterrorassessment.pdf
http://www.infowars.com/media/vafusioncenterterrorassessment.pdf
• The Texas
Fusion Center's Prevention Awareness Bulletin:
http://www.privacylives.com/wp-content/uploads/2009/03/texasfusion_021909.pdf
http://www.privacylives.com/wp-content/uploads/2009/03/texasfusion_021909.pdf
• The
Missouri Fusion Center's Document on the Modern Militia Movement:
http://www.privacylives.com/wp-content/uploads/2009/03/miacreport_022009.pdf
http://www.privacylives.com/wp-content/uploads/2009/03/miacreport_022009.pdf
• The
Massachusetts Fusion Center's “Commonwealth Fusion Center's Standard Operating
Procedures”
http://www.aclu.org/files/pdfs/spyfiles/ma_14furtherinformation_attach_guidelinesforinvestigationsinvolvingfirstamendactivity.pdf
http://www.aclu.org/files/pdfs/spyfiles/ma_14furtherinformation_attach_guidelinesforinvestigationsinvolvingfirstamendactivity.pdf
Nationally
• DHS
Reports Warns of Veterans. DHS's "Right-Wing Extremism" Report
warned that right-wing extremists might recruit and radicalize
"disgruntled military veterans." (http://www.washingtontimes.com/news/2009/apr/14/federal-agency-warns-of-radicals-on-right/)
• DHS
Report Warns of Environmental Groups. DHS's Contractor Eco-Terrorism
Report described environmental organizations like the Sierra Club, the Humane
Society, and the Audubon Society as "mainstream organizations with known
or possible links to eco-terrorism." (http://www.unbossed.com/index.php?itemid=2546)
• DHS
Keeps Calendar of Peaceful Protests. DHS's March 2006 "Protective
Intelligence Bulletin" lists several advocacy groups that were targets of
the Maryland State Police operations, including CODEPINK, Iraq Pledge of
Resistance and DAWN, and contains a "civil activists and extremists action
calendar" that details dozens of demonstrations planned around the
country, mostly peace rallies. Federal Protective Services apparently gleaned
this information from the Internet. There is no indication anywhere in the
document to suggest illegal activity might occur at any of these
demonstrations. The ACLU filed complaints in response to this improper
intelligence gathering, and the DHS Office of Civil Rights and Civil Liberties
concluded its review, determining that information like that will no longer be
distributed regionally or nationally, and will only be distributed locally to
those who have a situational awareness need for the information. (http://www.aclu.org/privacy/gen/39226prs20090401.html and
http://www.aclu.org/national-security/letter-aclu-dhs-office-civil-rights-and-civil-liberties-regarding-surveillance)
http://www.aclu.org/national-security/letter-aclu-dhs-office-civil-rights-and-civil-liberties-regarding-surveillance)
• FBI
Lists Green Party as Target for Eco-Terrorism Investigation. The FBI Field
Intelligence Group lists the Green Party as potential future target of
eco-terrorism investigation. (http://gawker.com/5329187/fbi-agent-thinks-the-green-party-is-a-terrorist-group-with-nukes)
• DHS
Reports on Nation of Islam in Violation of its own Protocols. In October
2007, DHS sent a report, "Nation of Islam: Uncertain Leadership Succession
Poses Risks," to hundreds of federal officials despite the fact that
Department guidelines had called for the files to be destroyed because the
assessment of the group had lasted more than 180 days without uncovering evidence
of potential terrorism. (http://www.nytimes.com/2009/12/17/us/17disclose.html?_r=2&ref=todayspaper).
• FBI
Spies on Activists Involved in First Amendment Activities and Mischaracterizes
Civil Disobedience.The FBI improperly spied on American activists involved in
First Amendment-protected activities, mischaracterized nonviolent civil
disobedience as terrorism, and improperly placed activists on terrorist watch
lists, according to a report by the Justice Department’s Inspector General
(IG). The IG found the improper investigations were often opened based on
“factually weak” or even “speculative” justifications and were sometimes
extended in duration without sufficient basis. (http://www.nytimes.com/2010/09/21/us/politics/21fbi.html,http://www.washingtonpost.com/wp-dyn/content/article/2010/09/20/AR201009...,http://blog.washingtonpost.com/spy-talk/2010/09/fbi_cover-up_turns_laugh...,http://online.wsj.com/article/SB1000142405274870398930457550419230689262...,
andhttp://www.latimes.com/news/nationworld/nation/la-na-fbi-activists-20100...).
• Senate
Security Will Use Internet Data Mining to Identify Lawmaker Threats. Senate
Sgt. at Arms plans to contract with a private company to data mine the internet
and social media sites to search keywords such as lawmakers names, and “slash”
or “shoot” to identify potential threats. (http://thehill.com/blogs/hillicon-valley/technology/155881-senate-security-will-conduct-internet-data-mining-to-identify-lawmaker-threats)
Wednesday, June 26, 2013
The Banality of ‘Don’t Be Evil’
By JULIAN
ASSANGE
Published:
June 1, 2013
“THE New
Digital Age” is a startlingly clear and provocative blueprint for technocratic
imperialism, from two of its leading witch doctors, Eric Schmidt and Jared
Cohen, who construct a new idiom for United States global power in the 21st
century. This idiom reflects the ever closer union between the State Department
and Silicon Valley, as personified by Mr. Schmidt, the executive chairman of Google, and Mr. Cohen, a former
adviser to Condoleezza Rice and Hillary Clinton who is now director of Google
Ideas.
The authors
met in occupied Baghdad in 2009, when the book was conceived. Strolling among
the ruins, the two became excited that consumer technology was transforming a
society flattened by United States military occupation. They decided the tech
industry could be a powerful agent of American foreign policy.
The book
proselytizes the role of technology in reshaping the world’s people and nations
into likenesses of the world’s dominant superpower, whether they want to be
reshaped or not. The prose is terse, the argument confident and the wisdom —
banal. But this isn’t a book designed to be read. It is a major declaration
designed to foster alliances.
“The New
Digital Age” is, beyond anything else, an attempt by Google to position itself
as America’s geopolitical visionary — the one company that can answer the
question “Where should America go?” It is not surprising that a respectable
cast of the world’s most famous warmongers has been trotted out to give its
stamp of approval to this enticement to Western soft power. The acknowledgments
give pride of place to Henry Kissinger, who along with Tony Blair and the
former C.I.A. director Michael Hayden provided advance praise for the book.
In the book
the authors happily take up the white geek’s burden. A liberal sprinkling of
convenient, hypothetical dark-skinned worthies appear: Congolese fisherwomen,
graphic designers in Botswana, anticorruption activists in San Salvador and
illiterate Masai cattle herders in the Serengeti are all obediently summoned to
demonstrate the progressive properties of Google phones jacked into the
informational supply chain of the Western empire.
The authors
offer an expertly banalized version of tomorrow’s world: the gadgetry of
decades hence is predicted to be much like what we have right now — only
cooler. “Progress” is driven by the inexorable spread of American consumer
technology over the surface of the earth. Already, every day, another million
or so Google-run mobile devices are activated. Google will interpose itself,
and hence the United States government, between the communications of every
human being not in China (naughty China). Commodities just become more
marvelous; young, urban professionals sleep, work and shop with greater ease
and comfort; democracy is insidiously subverted by technologies of
surveillance, and control is enthusiastically rebranded as “participation”; and
our present world order of systematized domination, intimidation and oppression
continues, unmentioned, unafflicted or only faintly perturbed.
The authors
are sour about the Egyptian triumph of 2011. They dismiss the Egyptian youth
witheringly, claiming that “the mix of activism and arrogance in young people
is universal.” Digitally inspired mobs mean revolutions will be “easier to start”
but “harder to finish.” Because of the absence of strong leaders, the result,
or so Mr. Kissinger tells the authors, will be coalition governments that
descend into autocracies. They say there will be “no more springs” (but China
is on the ropes).
The authors
fantasize about the future of “well resourced” revolutionary groups. A new
“crop of consultants” will “use data to build and fine-tune a political
figure.”
“His”
speeches (the future isn’t all that different) and writing will be fed “through
complex feature-extraction and trend-analysis software suites” while “mapping
his brain function,” and other “sophisticated diagnostics” will be used to
“assess the weak parts of his political repertoire.”
The book
mirrors State Department institutional taboos and obsessions. It avoids
meaningful criticism of Israel and Saudi Arabia. It pretends, quite
extraordinarily, that the Latin American sovereignty movement, which has
liberated so many from United States-backed plutocracies and dictatorships over
the last 30 years, never happened. Referring instead to the region’s “aging
leaders,” the book can’t see Latin America for Cuba. And, of course, the book
frets theatrically over Washington’s favorite boogeymen: North Korea and Iran.
Google,
which started out as an expression of independent Californian graduate student
culture — a decent, humane and playful culture — has, as it encountered the
big, bad world, thrown its lot in with traditional Washington power elements,
from the State Department to the National Security Agency.
Despite
accounting for an infinitesimal fraction of violent deaths globally, terrorism
is a favorite brand in United States policy circles. This is a fetish that must
also be catered to, and so “The Future of Terrorism” gets a whole chapter. The
future of terrorism, we learn, is cyberterrorism. A session of indulgent
scaremongering follows, including a breathless disaster-movie scenario, wherein
cyberterrorists take control of American air-traffic control systems and send
planes crashing into buildings, shutting down power grids and launching nuclear
weapons. The authors then tar activists who engage in digital sit-ins with the
same brush.
I have a
very different perspective. The advance of information technology epitomized by
Google heralds the death of privacy for most people and shifts the world toward
authoritarianism. This is the principal thesis in my book, “Cypherpunks.” But
while Mr. Schmidt and Mr. Cohen tell us that the death of privacy will aid
governments in “repressive autocracies” in “targeting their citizens,” they
also say governments in “open” democracies will see it as “a gift” enabling
them to “better respond to citizen and customer concerns.” In reality, the
erosion of individual privacy in the West and the attendant centralization of
power make abuses inevitable, moving the “good” societies closer to the “bad”
ones.
The section
on “repressive autocracies” describes, disapprovingly, various repressive
surveillance measures: legislation to insert back doors into software to enable
spying on citizens, monitoring of social networks and the collection of
intelligence on entire populations. All of these are already in widespread use
in the United States. In fact, some of those measures — like the push to
require every social-network profile to be linked to a real name — were
spearheaded by Google itself.
THE writing
is on the wall, but the authors cannot see it. They borrow from William
Dobson the idea that the media, in an autocracy, “allows for an opposition
press as long as regime opponents understand where the unspoken limits are.”
But these trends are beginning to emerge in the United States. No one doubts
the chilling effects of the investigations into The Associated Press and Fox’s
James Rosen. But there has been little analysis of Google’s role in complying
with the Rosen subpoena. I have personal experience of these trends.
The
Department of Justice admitted in March that it was in its third year of a
continuing criminal
investigation of WikiLeaks. Court testimony states that its targets
include “the founders, owners, or managers of WikiLeaks.” One alleged source,
Bradley Manning, faces a 12-week trial beginning tomorrow, with 24 prosecution
witnesses expected to testify in secret.
This book is
a balefully seminal work in which neither author has the language to see, much
less to express, the titanic centralizing evil they are constructing. “What
Lockheed Martin was to the 20th century,” they tell us, “technology and
cybersecurity companies will be to the 21st.” Without even understanding how,
they have updated and seamlessly implemented George Orwell’s prophecy. If you
want a vision of the future, imagine Washington-backed Google Glasses strapped onto
vacant human faces — forever. Zealots of the cult of consumer technology will
find little to inspire them here, not that they ever seem to need it. But this
is essential reading for anyone caught up in the struggle for the future, in
view of one simple imperative: Know your enemy.
Julian
Assange is the editor in chief of WikiLeaks and author of “Cypherpunks: Freedom
and the Future of the Internet.”
The FISA court is acting like a legislature, and that’s a problem
"These documents look more like legislation than search warrants."
By Timothy B.
Lee, Published: June 20, 2013 at 5:27 pm
One of the
National Security Agency’s key talking points since the PRISM program was
revealed two weeks ago has been that its surveillance activities are subject to
oversight by the Foreign Intelligence Surveillance Court. In his latest scoop,
the Guardian’s Glenn Greenwald has revealed two
of the documents the government submits to the court prior to engaging in
surveillance under the Foreign Intelligence Surveillance Act.
These
documents are often compared to the warrants the government ordinarily needs
for searches of Americans. But they’re dramatically different from a
conventional search warrant. A warrant is supposed to “particularly” describe
who will be targeted by a search. It will typically include a suspect’s name,
as well as the address to be searched or the phone number to be wiretapped.
The
documents released by the Guardian don’t look like that at all. The first
document is nine pages long and explains in some detail the factors the NSA
uses to determine whether a potential surveillance target is a “US person”—if
the answer is yes, then the agency cancels the planned surveillance. The second
document, also nine pages, describes what the NSA does if it accidentally
collects the private communications of Americans.
These
documents look more like legislation than search warrants. They define legal
concepts, describe legal standards to be applied and specify procedures for NSA
officials to follow. For example, the second document states that “a person
known to be an alien admitted for permanent residence loses status as a United
States person if the person leaves the united States and is not in compliance
with 8 USC § 1203 enabling re-entry into the United States.”
But rather
than being drafted, debated and enacted by Congress, the documents were drafted
by Obama administration lawyers and reviewed by the FISC.
Congress is
much better equipped than the courts to review this kind of quasi-legislative
proposal. It has thousands of staffers and can spend months debating the
details of a proposal. Members have the power to call witnesses and to amend
legislation if it’s not to their liking. And they debate in public, giving
academics, public interest groups and members of the general public an
opportunity to point out flaws and suggest improvements.
In contrast,
the FISC has only 11 members and a limited staff. In most cases it hears
testimony only from the government, and only in secret. It must make decisions
within 30 days. In principle it has the power to modify proposed orders, but it
lacks the manpower and expertise to exercise this power effectively. The FISC’s
secretive review process leaves no meaningful opportunities for third parties
to point out flaws in the government’s proposal and suggest alternatives.
And once the
courts sign off on these general targeting procedures, no one outside the
executive branch performs the function traditionally performed by the courts:
double-checking that the government actually follows the rules. The government
has some internal oversight mechanisms, but no one in the judicial branch
verifies that the individuals the government targets for surveillance are
actual foreigners, as the law requires.
The
Constitution specifies that Congress should write laws and that the courts
should interpret them. The founders set things up that way for a reason.
Allowing the executive branch to effectively write its own rules, get them
rubber-stamped by a secretive court and then comply with them on an honor
system is guaranteed to produce rules that are more favorable to the government
and less carefully drafted than rules drafted the old-fashioned way.
Warrants issued by a secret FISA court provide the NSA with a HUGE loophole into domestic surveillance
The top secret rules that allow NSA to use US data without a warrant
Fisa court
submissions show broad scope of procedures governing NSA's surveillance of
Americans' communication
• Document one: procedures used by NSA to target non-US persons
• Document two: procedures used by NSA to minimise data collected from US persons
• Document one: procedures used by NSA to target non-US persons
• Document two: procedures used by NSA to minimise data collected from US persons
guardian.co.uk, Thursday 20 June
2013 23.59 BST
The documents
show that discretion as to who is actually targeted lies directly with the
NSA's analysts.
Top secret
documents submitted to the court that oversees surveillance by US
intelligence agencies show the judges have signed off on broad orders which
allow the NSA to make use of information
"inadvertently" collected from domestic US communications without a
warrant.
The Guardian
is publishing in full two documents submitted to the secret Foreign
Intelligence Surveillance Court (known as the Fisa court), signed by
Attorney General Eric Holder and stamped 29 July 2009. They detail the
procedures the NSA is required to follow to target "non-US
persons" under its foreign intelligence powers and what the agency does to
minimize data collected on US citizens and residents in the course of that
surveillance.
The
documents show that even under authorities governing the collection of foreign
intelligence from foreign targets, US communications can still be collected,
retained and used.
The
procedures cover only part of the NSA's surveillance of domestic US
communications. The bulk collection of domestic call records, as
first revealed by the Guardian earlier this month, takes place under
rolling court orders issued on the basis of a legal interpretation of a
different authority, section 215 of the Patriot Act.
The Fisa court's oversight
role has
been referenced many times by Barack Obama and senior intelligence
officials as they have sought to reassure the public about surveillance, but
the procedures approved by the court have never before been publicly disclosed.
The top
secret documents published today detail the circumstances in which data
collected on US persons under the foreign intelligence authority must be
destroyed, extensive steps analysts must take to try to check targets are
outside the US, and reveals how US call records are used to help remove US
citizens and residents from data collection.
However,
alongside those provisions, the Fisa court-approved policies allow
the NSA to:
• Keep data
that could potentially contain details of US persons for up to five years;
• Retain and
make use of "inadvertently acquired" domestic communications if they
contain usable intelligence, information on criminal activity, threat of harm
to people or property, are encrypted, or are believed to contain any
information relevant to cybersecurity;
• Preserve
"foreign intelligence information" contained within attorney-client
communications;
• Access the
content of communications gathered from "U.S. based machine[s]" or
phone numbers in order to establish if targets are located in the US, for the purposes
of ceasing further surveillance.
The broad
scope of the court orders, and the nature of the procedures set out in the
documents, appear to clash with assurances from President Obama and senior
intelligence officials that the NSA could not access Americans' call
or email information without warrants.
The
documents also show that discretion as to who is actually targeted under the NSA's
foreign surveillance powers lies directly with its own analysts, without
recourse to courts or superiors – though a percentage of targeting decisions
are reviewed by internal audit teams on a regular basis.
Since the
Guardian first revealed the extent of the NSA's collection of US
communications, there have been repeated calls for the legal basis of the
programs to be released. On Thursday, two US congressmen introduced
a bill compelling the Obama administration to
declassify the secret legal justifications for NSA surveillance.
The
disclosure bill, sponsored by Adam Schiff, a California Democrat, and Todd
Rokita, an Indiana Republican, is a complement to one proposed in the Senate
last week. It would "increase the transparency of the Fisa Court
and the state of the law in this area," Schiff told the Guardian. "It
would give the public a better understanding of the safeguards, as well as the
scope of these programs."
Section 702
of the Fisa Amendments Act (FAA), which was renewed for five years
last December, is the authority under which the NSA is allowed to
collect large-scale data, including foreign communications and also
communications between the US and other countries, provided the target is
overseas.
FAA warrants
are issued by the Fisa court for up to 12 months at a time, and
authorise the collection of bulk information – some of which can include
communications of US citizens, or people inside the US. To intentionally target
either of those groups requires an individual warrant.
One-paragraph
order
One
such warrant seen by the Guardian shows that they do not contain
detailed legal rulings or explanation.
Instead, the
one-paragraph order, signed by a Fisa court judge in 2010,
declares that the procedures submitted by the attorney general on behalf of the NSA are
consistent with US law and the fourth amendment.
Those
procedures state that the "NSA determines whether a person is a
non-United States person reasonably believed to be outside the United States in
light of the totality of the circumstances based on the information available
with respect to that person, including information concerning the
communications facility or facilities used by that person".
It includes
information that the NSA analyst uses to make this determination –
including IP addresses, statements made by the potential target, and other
information in the NSA databases, which can include public information and data
collected by other agencies.
Where the NSA has
no specific information on a person's location, analysts are free to presume
they are overseas, the document continues.
"In the
absence of specific information regarding whether a target is a United States
person," it states "a person reasonably believed to be located
outside the United States or whose location is not known will be presumed to be
a non-United States person unless such person can be positively identified as a
United States person."
If it later
appears that a target is in fact located in the US, analysts are permitted to
look at the content of messages, or listen to phone calls, to establish if this
is indeed the case.
Referring to
steps taken to prevent intentional collection of telephone content of those
inside the US, the document states: "NSA analysts may analyze content
for indications that a foreign target has entered or intends to enter the
United States. Such content analysis will be conducted according to analytic
and intelligence requirements and priorities."
Details set
out in the "minimization procedures", regularly referred to in
House and Senate hearings, as well as public statements in recent weeks,
also raise questions as to the extent of monitoring of US citizens and
residents.
NSA minimization
procedures signed by Holder in 2009 set out that once a target is confirmed to
be within the US, interception must stop immediately. However, these
circumstances do not apply to large-scale data where the NSA claims it is
unable to filter US communications from non-US ones.
The NSA is
empowered to retain data for up to five years and the policy states
"communications which may be retained include electronic communications
acquired because of limitations on the NSA's ability to filter
communications".
Even if upon
examination a communication is found to be domestic – entirely within the US – the NSA can
appeal to its director to keep what it has found if it contains
"significant foreign intelligence information", "evidence of a
crime", "technical data base information" (such as encrypted
communications), or "information pertaining to a threat of serious harm to
life or property".
Domestic
communications containing none of the above must be destroyed. Communications
in which one party was outside the US, but the other is a US-person, are
permitted for retention under FAA rules.
The
minimization procedure adds that these can be disseminated to other agencies or
friendly governments if the US person is anonymised, or including the
US person's identity under certain criteria.
A separate
section of the same document notes that as soon as any intercepted
communications are determined to have been between someone under US criminal
indictment and their attorney, surveillance must stop. However, the material
collected can be retained, if it is useful, though in a segregated database:
"The
relevant portion of the communication containing that conversation will be
segregated and the National Security Division of the Department of Justice will
be notified so that appropriate procedures may be established to protect such
communications from review or use in any criminal prosecution, while preserving
foreign intelligence information contained therein," the document states.
In practice,
much of the decision-making appears to lie with NSA analysts, rather than
the Fisa court or senior officials.
A transcript
of a 2008 briefing on FAA from the NSA's general counsel sets
out how much discretion NSA analysts possess when it comes to the specifics of
targeting, and making decisions on who they believe is a non-US person.
Referring to a situation where there has been a suggestion a target is within
the US.
"Once
again, the standard here is a reasonable belief that your target is outside the
United States. What does that mean when you get information that might lead you
to believe the contrary? It means you can't ignore it.
You can't turn a blind
eye to somebody saying: 'Hey, I think so and so is in the United States.' You
can't ignore that. Does it mean you have to completely turn off collection the
minute you hear that? No, it means you have to do some sort of investigation:
'Is that guy right? Is my target here?" he says.
"But,
if everything else you have says 'no' (he talked yesterday, I saw him on TV
yesterday, even, depending on the target, he was in Baghdad) you can still
continue targeting but you have to keep that in mind. You can't put it aside.
You have to investigate it and, once again, with that new information in mind,
what is your reasonable belief about your target's location?"
The broad
nature of the court's oversight role, and the discretion given to NSA analysts,
sheds light on responses from the administration and internet companies to the
Guardian's disclosure of the PRISM program. They have
stated that the content of online communications is turned over to the NSA only
pursuant to a court order. But except when a US citizen is specifically
targeted, the court orders used by the NSA to obtain that information as part
of Prism are these general FAA orders, not individualized
warrants specific to any individual.
Once armed
with these general orders, the NSA is empowered to compel telephone
and internet companies to turn over to it the communications of any individual
identified by the NSA. The Fisa court plays no role in the selection
of those individuals, nor does it monitor who is selected by the NSA.
The NSA's
ability to collect and retain the communications of people in the US, even
without a warrant, has fuelled congressional demands for an estimate of how
many Americans have been caught up in surveillance.
Two US
senators, Ron Wyden and Mark Udall – both members of the Senate intelligence
committee – have been seeking this information since 2011, but senior White
House and intelligence officials have repeatedly insisted that the agency is
unable to gather such statistics.
Supreme Injustices
WASHINGTON —
The Supreme Court on Tuesday effectively
struck down the heart of the Voting Rights Act of 1965 by a 5-to-4
vote, ruling that Congress had not provided adequate justification for
subjecting nine states, mostly in the South, to federal oversight.
Stephen
Crowley/The New York Times
Wade
Henderson, president and C.E.O. of the Leadership Conference on Civil and Human
Rights, criticized the decision on Tuesday.
“In 1965,
the states could be divided into two groups: those with a recent history of
voting tests and low voter registration and turnout, and those without those
characteristics,” Chief Justice John G. Roberts Jr. wrote for the majority.
“Congress based its coverage formula on that distinction. Today the nation is
no longer divided along those lines, yet the Voting Rights Act continues to
treat it as if it were.”
Chief
Justice Roberts said that Congress remained free to try to impose federal
oversight on states where voting rights were at risk, but must do so based on
contemporary data. When the law was last renewed, in 2006, Congress relied on
data from decades before. The chances that the current Congress could reach
agreement on where federal oversight is required are small, most analysts say.
Justices
Antonin Scalia, Anthony M. Kennedy, Clarence Thomas and Samuel A. Alito Jr.
joined the majority opinion. Justice Ruth Bader Ginsburg dissented, joined by
Justices Stephen G. Breyer, Sonia Sotomayor and Elena Kagan.
The majority
held that the coverage formula in Section 4 of the Voting Rights Act,
originally passed in 1965 and most recently updated by Congress in 1975, was
unconstitutional. The section determines which states must receive preclearance
from the federal authorities.
The court
did not strike down Section 5, which sets out the pre-clearance requirement
itself. But without Section 4, which determines which states are covered,
Section 5 is without significance — unless Congress chooses to pass a new bill
for determining which states would be covered.
The Voting Rights Act of 1965 was
one of the towering legislative achievements of the civil rights movement. Its
central provision, Section 5, requires many state and local governments, mostly
in the South, to obtain permission from the Justice Department or a federal
court in Washington before making changes in laws that affect voting.
That means
jurisdictions covered by Section 5 must get federal approval before they make
minor changes to voting procedures, like relocating a polling place, or major
ones, like redrawing electoral districts.
The Supreme
Court had repeatedly upheld the law, saying that Section 5’s “preclearance
requirement” was an effective tool to combat the legacy of lawless conduct by
Southern officials bent on denying voting rights to blacks.
Critics of
Section 5 say it is a unique federal intrusion on state sovereignty and a badge
of shame for the affected jurisdictions that is no longer justified. They point
to high voter registration rates among blacks and the re-election of a black
president as proof that the provision is no longer needed.
Civil rights
leaders, on the other hand, say the law played an important role in the 2012
election, with courts relying on it to block voter identification requirements and cutbacks
on early voting.
Section 5
was originally set to expire in five years. Congress repeatedly extended it:
for five years in 1970, seven years in 1975, and 25 years in 1982. Congress
renewed the act in 2006 after holding extensive hearings on the persistence of
racial discrimination at the polls, again extending the preclearance
requirement for 25 years.
In 2012, a
divided three-judge panel of the United States Court of Appeals for the
District of Columbia rejected a challenge to the law filed by Shelby County,
Ala. Judge David S. Tatel, writing for the majority, acknowledged that “the
extraordinary federalism costs imposed by Section 5 raise substantial
constitutional concerns,” and he added that the record compiled by Congress to
justify the law’s renewal was “by no means unambiguous.”
“But
Congress drew reasonable conclusions from the extensive evidence it gathered,”
he went on. The constitutional amendments ratified after the Civil War, he
said, “entrust Congress with ensuring that the right to vote — surely among the
most important guarantees of political liberty in the Constitution — is not
abridged on account of race. In this context, we owe much deference to the
considered judgment of the people’s elected representatives.”
The
dissenting member of the panel, Judge Stephen F. Williams, surveyed recent
evidence concerning registration and turnout, the election of black officials,
the use of federal election observers and suits under another part of the law.
Some of that
evidence, he said, “suggests that the coverage formula completely lacks any
rational connection to current levels of voter discrimination,” while other
evidence indicates that the formula, “though not completely perverse, is a
remarkably bad fit with Congress’s concerns.”
“Given the
drastic remedy imposed on covered jurisdictions by Section 5,” he wrote, “I do
not believe that such equivocal evidence can sustain the scheme.”
The Supreme
Court had once before considered the constitutionality of the 2006 extension of
the law in a 2009 decision, Northwest Austin Municipal Utility District Number One v. Holder.
But it avoided answering the central question, and it seemed to give Congress
an opportunity to make adjustments. Congress did not respond.
Subscribe to:
Comments (Atom)