Friday, July 12, 2013

Sunday, June 30, 2013

America's not a country; it's just a business.









Thursday, June 27, 2013

Spying on First Amendment Activity - State-by-State






United States law enforcement agencies, from the FBI to local police, have a long history of spying on American citizens and infiltrating or otherwise obstructing political activist groups. Political spying was rampant during the Cold War under the FBI's COINTELPRO, the CIA's Operation Chaos, and other program. 

[MAP]

Unfortunately, it appears that these old tendencies have once again come to the fore. Law enforcement agencies across America continue to monitor and harass groups and individuals for doing little more than peacefully exercising their First Amendment rights.

A thorough search and review of news accounts by the ACLU reveals that these law enforcement behaviors have taken place in at least 36 states plus the District of Columbia in recent years. Americans have been put under surveillance or harassed by the police just for deciding to organize, march, protest, espouse unusual viewpoints, and engage in normal, innocuous behaviors such as writing notes or taking photographs in public.
For example, in 2009, at least four troubling Fusion Center reports have come to light:

• The Virginia Fusion Center's Homegrown Terrorism Document:
http://www.infowars.com/media/vafusioncenterterrorassessment.pdf

• The Texas Fusion Center's Prevention Awareness Bulletin:
http://www.privacylives.com/wp-content/uploads/2009/03/texasfusion_021909.pdf

• The Missouri Fusion Center's Document on the Modern Militia Movement:
http://www.privacylives.com/wp-content/uploads/2009/03/miacreport_022009.pdf

• The Massachusetts Fusion Center's “Commonwealth Fusion Center's Standard Operating Procedures”
http://www.aclu.org/files/pdfs/spyfiles/ma_14furtherinformation_attach_guidelinesforinvestigationsinvolvingfirstamendactivity.pdf

Nationally

• DHS Reports Warns of Veterans. DHS's "Right-Wing Extremism" Report warned that right-wing extremists might recruit and radicalize "disgruntled military veterans." (http://www.washingtontimes.com/news/2009/apr/14/federal-agency-warns-of-radicals-on-right/)

• DHS Report Warns of Environmental Groups. DHS's Contractor Eco-Terrorism Report described environmental organizations like the Sierra Club, the Humane Society, and the Audubon Society as "mainstream organizations with known or possible links to eco-terrorism." (http://www.unbossed.com/index.php?itemid=2546)

• DHS Keeps Calendar of Peaceful Protests. DHS's March 2006 "Protective Intelligence Bulletin" lists several advocacy groups that were targets of the Maryland State Police operations, including CODEPINK, Iraq Pledge of Resistance and DAWN, and contains a "civil activists and extremists action calendar" that details dozens of demonstrations planned around the country, mostly peace rallies. Federal Protective Services apparently gleaned this information from the Internet. There is no indication anywhere in the document to suggest illegal activity might occur at any of these demonstrations. The ACLU filed complaints in response to this improper intelligence gathering, and the DHS Office of Civil Rights and Civil Liberties concluded its review, determining that information like that will no longer be distributed regionally or nationally, and will only be distributed locally to those who have a situational awareness need for the information. (http://www.aclu.org/privacy/gen/39226prs20090401.html and
http://www.aclu.org/national-security/letter-aclu-dhs-office-civil-rights-and-civil-liberties-regarding-surveillance)

• FBI Lists Green Party as Target for Eco-Terrorism Investigation. The FBI Field Intelligence Group lists the Green Party as potential future target of eco-terrorism investigation. (http://gawker.com/5329187/fbi-agent-thinks-the-green-party-is-a-terrorist-group-with-nukes)

• DHS Reports on Nation of Islam in Violation of its own Protocols. In October 2007, DHS sent a report, "Nation of Islam: Uncertain Leadership Succession Poses Risks," to hundreds of federal officials despite the fact that Department guidelines had called for the files to be destroyed because the assessment of the group had lasted more than 180 days without uncovering evidence of potential terrorism. (http://www.nytimes.com/2009/12/17/us/17disclose.html?_r=2&ref=todayspaper).

• FBI Spies on Activists Involved in First Amendment Activities and Mischaracterizes Civil Disobedience.The FBI improperly spied on American activists involved in First Amendment-protected activities, mischaracterized nonviolent civil disobedience as terrorism, and improperly placed activists on terrorist watch lists, according to a report by the Justice Department’s Inspector General (IG). The IG found the improper investigations were often opened based on “factually weak” or even “speculative” justifications and were sometimes extended in duration without sufficient basis. (http://www.nytimes.com/2010/09/21/us/politics/21fbi.html,http://www.washingtonpost.com/wp-dyn/content/article/2010/09/20/AR201009...,http://blog.washingtonpost.com/spy-talk/2010/09/fbi_cover-up_turns_laugh...,http://online.wsj.com/article/SB1000142405274870398930457550419230689262..., andhttp://www.latimes.com/news/nationworld/nation/la-na-fbi-activists-20100...).

• Senate Security Will Use Internet Data Mining to Identify Lawmaker Threats. Senate Sgt. at Arms plans to contract with a private company to data mine the internet and social media sites to search keywords such as lawmakers names, and “slash” or “shoot” to identify potential threats. (http://thehill.com/blogs/hillicon-valley/technology/155881-senate-security-will-conduct-internet-data-mining-to-identify-lawmaker-threats)


Wednesday, June 26, 2013









Tuesday, June 25, 2013

The Banality of ‘Don’t Be Evil’



By JULIAN ASSANGE
Published: June 1, 2013



“THE New Digital Age” is a startlingly clear and provocative blueprint for technocratic imperialism, from two of its leading witch doctors, Eric Schmidt and Jared Cohen, who construct a new idiom for United States global power in the 21st century. This idiom reflects the ever closer union between the State Department and Silicon Valley, as personified by Mr. Schmidt, the executive chairman of Google, and Mr. Cohen, a former adviser to Condoleezza Rice and Hillary Clinton who is now director of Google Ideas.

The authors met in occupied Baghdad in 2009, when the book was conceived. Strolling among the ruins, the two became excited that consumer technology was transforming a society flattened by United States military occupation. They decided the tech industry could be a powerful agent of American foreign policy.

The book proselytizes the role of technology in reshaping the world’s people and nations into likenesses of the world’s dominant superpower, whether they want to be reshaped or not. The prose is terse, the argument confident and the wisdom — banal. But this isn’t a book designed to be read. It is a major declaration designed to foster alliances.

“The New Digital Age” is, beyond anything else, an attempt by Google to position itself as America’s geopolitical visionary — the one company that can answer the question “Where should America go?” It is not surprising that a respectable cast of the world’s most famous warmongers has been trotted out to give its stamp of approval to this enticement to Western soft power. The acknowledgments give pride of place to Henry Kissinger, who along with Tony Blair and the former C.I.A. director Michael Hayden provided advance praise for the book.

In the book the authors happily take up the white geek’s burden. A liberal sprinkling of convenient, hypothetical dark-skinned worthies appear: Congolese fisherwomen, graphic designers in Botswana, anticorruption activists in San Salvador and illiterate Masai cattle herders in the Serengeti are all obediently summoned to demonstrate the progressive properties of Google phones jacked into the informational supply chain of the Western empire.

The authors offer an expertly banalized version of tomorrow’s world: the gadgetry of decades hence is predicted to be much like what we have right now — only cooler. “Progress” is driven by the inexorable spread of American consumer technology over the surface of the earth. Already, every day, another million or so Google-run mobile devices are activated. Google will interpose itself, and hence the United States government, between the communications of every human being not in China (naughty China). Commodities just become more marvelous; young, urban professionals sleep, work and shop with greater ease and comfort; democracy is insidiously subverted by technologies of surveillance, and control is enthusiastically rebranded as “participation”; and our present world order of systematized domination, intimidation and oppression continues, unmentioned, unafflicted or only faintly perturbed.

The authors are sour about the Egyptian triumph of 2011. They dismiss the Egyptian youth witheringly, claiming that “the mix of activism and arrogance in young people is universal.” Digitally inspired mobs mean revolutions will be “easier to start” but “harder to finish.” Because of the absence of strong leaders, the result, or so Mr. Kissinger tells the authors, will be coalition governments that descend into autocracies. They say there will be “no more springs” (but China is on the ropes).

The authors fantasize about the future of “well resourced” revolutionary groups. A new “crop of consultants” will “use data to build and fine-tune a political figure.”

“His” speeches (the future isn’t all that different) and writing will be fed “through complex feature-extraction and trend-analysis software suites” while “mapping his brain function,” and other “sophisticated diagnostics” will be used to “assess the weak parts of his political repertoire.”

The book mirrors State Department institutional taboos and obsessions. It avoids meaningful criticism of Israel and Saudi Arabia. It pretends, quite extraordinarily, that the Latin American sovereignty movement, which has liberated so many from United States-backed plutocracies and dictatorships over the last 30 years, never happened. Referring instead to the region’s “aging leaders,” the book can’t see Latin America for Cuba. And, of course, the book frets theatrically over Washington’s favorite boogeymen: North Korea and Iran.

Google, which started out as an expression of independent Californian graduate student culture — a decent, humane and playful culture — has, as it encountered the big, bad world, thrown its lot in with traditional Washington power elements, from the State Department to the National Security Agency.

Despite accounting for an infinitesimal fraction of violent deaths globally, terrorism is a favorite brand in United States policy circles. This is a fetish that must also be catered to, and so “The Future of Terrorism” gets a whole chapter. The future of terrorism, we learn, is cyberterrorism. A session of indulgent scaremongering follows, including a breathless disaster-movie scenario, wherein cyberterrorists take control of American air-traffic control systems and send planes crashing into buildings, shutting down power grids and launching nuclear weapons. The authors then tar activists who engage in digital sit-ins with the same brush.

I have a very different perspective. The advance of information technology epitomized by Google heralds the death of privacy for most people and shifts the world toward authoritarianism. This is the principal thesis in my book, “Cypherpunks.” But while Mr. Schmidt and Mr. Cohen tell us that the death of privacy will aid governments in “repressive autocracies” in “targeting their citizens,” they also say governments in “open” democracies will see it as “a gift” enabling them to “better respond to citizen and customer concerns.” In reality, the erosion of individual privacy in the West and the attendant centralization of power make abuses inevitable, moving the “good” societies closer to the “bad” ones.

The section on “repressive autocracies” describes, disapprovingly, various repressive surveillance measures: legislation to insert back doors into software to enable spying on citizens, monitoring of social networks and the collection of intelligence on entire populations. All of these are already in widespread use in the United States. In fact, some of those measures — like the push to require every social-network profile to be linked to a real name — were spearheaded by Google itself.

THE writing is on the wall, but the authors cannot see it. They borrow from William Dobson the idea that the media, in an autocracy, “allows for an opposition press as long as regime opponents understand where the unspoken limits are.” But these trends are beginning to emerge in the United States. No one doubts the chilling effects of the investigations into The Associated Press and Fox’s James Rosen. But there has been little analysis of Google’s role in complying with the Rosen subpoena. I have personal experience of these trends.

The Department of Justice admitted in March that it was in its third year of a continuing criminal investigation of WikiLeaks. Court testimony states that its targets include “the founders, owners, or managers of WikiLeaks.” One alleged source, Bradley Manning, faces a 12-week trial beginning tomorrow, with 24 prosecution witnesses expected to testify in secret.

This book is a balefully seminal work in which neither author has the language to see, much less to express, the titanic centralizing evil they are constructing. “What Lockheed Martin was to the 20th century,” they tell us, “technology and cybersecurity companies will be to the 21st.” Without even understanding how, they have updated and seamlessly implemented George Orwell’s prophecy. If you want a vision of the future, imagine Washington-backed Google Glasses strapped onto vacant human faces — forever. Zealots of the cult of consumer technology will find little to inspire them here, not that they ever seem to need it. But this is essential reading for anyone caught up in the struggle for the future, in view of one simple imperative: Know your enemy.

Julian Assange is the editor in chief of WikiLeaks and author of “Cypherpunks: Freedom and the Future of the Internet.”


The FISA court is acting like a legislature, and that’s a problem



"These documents look more like legislation than search warrants." 


By Timothy B. Lee, Published: June 20, 2013 at 5:27 pm

One of the National Security Agency’s key talking points since the PRISM program was revealed two weeks ago has been that its surveillance activities are subject to oversight by the Foreign Intelligence Surveillance Court. In his latest scoop, the Guardian’s Glenn Greenwald has revealed two of the documents the government submits to the court prior to engaging in surveillance under the Foreign Intelligence Surveillance Act.

These documents are often compared to the warrants the government ordinarily needs for searches of Americans. But they’re dramatically different from a conventional search warrant. A warrant is supposed to “particularly” describe who will be targeted by a search. It will typically include a suspect’s name, as well as the address to be searched or the phone number to be wiretapped.

The documents released by the Guardian don’t look like that at all. The first document is nine pages long and explains in some detail the factors the NSA uses to determine whether a potential surveillance target is a “US person”—if the answer is yes, then the agency cancels the planned surveillance. The second document, also nine pages, describes what the NSA does if it accidentally collects the private communications of Americans.

These documents look more like legislation than search warrants. They define legal concepts, describe legal standards to be applied and specify procedures for NSA officials to follow. For example, the second document states that “a person known to be an alien admitted for permanent residence loses status as a United States person if the person leaves the united States and is not in compliance with 8 USC § 1203 enabling re-entry into the United States.”

But rather than being drafted, debated and enacted by Congress, the documents were drafted by Obama administration lawyers and reviewed by the FISC.

Congress is much better equipped than the courts to review this kind of quasi-legislative proposal. It has thousands of staffers and can spend months debating the details of a proposal. Members have the power to call witnesses and to amend legislation if it’s not to their liking. And they debate in public, giving academics, public interest groups and members of the general public an opportunity to point out flaws and suggest improvements.

In contrast, the FISC has only 11 members and a limited staff. In most cases it hears testimony only from the government, and only in secret. It must make decisions within 30 days. In principle it has the power to modify proposed orders, but it lacks the manpower and expertise to exercise this power effectively. The FISC’s secretive review process leaves no meaningful opportunities for third parties to point out flaws in the government’s proposal and suggest alternatives.

And once the courts sign off on these general targeting procedures, no one outside the executive branch performs the function traditionally performed by the courts: double-checking that the government actually follows the rules. The government has some internal oversight mechanisms, but no one in the judicial branch verifies that the individuals the government targets for surveillance are actual foreigners, as the law requires.

The Constitution specifies that Congress should write laws and that the courts should interpret them. The founders set things up that way for a reason. Allowing the executive branch to effectively write its own rules, get them rubber-stamped by a secretive court and then comply with them on an honor system is guaranteed to produce rules that are more favorable to the government and less carefully drafted than rules drafted the old-fashioned way.