U.K. Spy Agency Taps Trans-Atlantic Fiber Optic Cables
Of course if you ask Emperor Obama the government isn't spying on millions of Americans. Honest Obama isn't lying!!!! Well at least that's what he wants us to think!!!!
I think GCHQ is a British acronym for Government Communications Headquarters and is some type of English government spy agency.
The last article says the GCHQ or Government Communications Headquarters is Britain's equivalent to the U.S. National Security Agency or NSA
Source
Report: U.K. Spy Agency Taps Trans-Atlantic Fiber Optic Cables
by Eyder Peralta
June 21, 2013 1:30 PM
The drip-drip of classified information has now moved overseas: Citing more classified documents leaked by , that the British spy agency taps into trans-Atlantic fiber optic cables, sucking up vast amounts of data that includes communication sent by Americans and Britons.
The big claim here is that the Government Communications Headquarters (GCHQ), the equivalent of the NSA, sucks up that information in an indiscriminate manner. The NSA has access to the information.
Here's how The Guardian describes the program:
"The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.
"One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
"GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.
"This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets."
The newspaper quotes an unnamed source with knowledge of the program as saying that while the program collects a lot of information, it does not have the "resources" to look at it.
"If you had the impression we are reading millions of emails, we are not. There is no intention in this whole programme to use it for looking at UK domestic traffic — British people talking to each other," the source told the paper.
Snowden told The Guardian that the GCHQ is "worse than the U.S."
Communications of Millions Subject to US-UK Spying
Source
Communications of Millions Subject to US-UK Spying
By Eric London
Global Research, June 22, 2013
World Socialist Web Site
Whistleblower Edward Snowden revealed on Friday that the UK intelligence agency GCHQ and the NSA record the content of phone calls, email messages, Facebook posts and browser histories of tens of millions of people. By tapping into fiber-optic cables—the infrastructure through which all Internet traffic must pass—the two agencies have created a systematic procedure for procuring, filtering and storing private communications.
The leak is the latest in a series that have left the US and UK governments scurrying to cover up their deeply antidemocratic maneuvers with scripted lies. It comes one day after the release of secret FISA Court documents showing the NSA has almost complete latitude to monitor the communications of US residents (See, “NSA monitoring US communications without a warrant, documents show”)
Hours after the release of the latest documents, the US government announced that it was filing charges against Snowden under the Espionage Act, which contains a possible penalty of execution.
“Nobody is listening to your telephone calls,” President Obama said in a public speech two weeks ago. UK Foreign Minister William Hague told MPs last week that there is “a strong framework of democratic accountability and oversight” within the national intelligence apparatus.
According to documents leaked to the Guardian, and reported by Glenn Greenwald, however, GCHQ and the NSA have set up a complex scheme by which the intelligence agencies collect data and content from the communications of at least tens of millions of people. Officials monitor the data and content of those communications and then store what they deem valuable.
Described by GCHQ with the revealing titles “Mastering the Internet” and “Global Telecoms Exploitation,” the programs expose the repeated claims of President Obama and his coconspirators as outright lies.
Through the “Tempora” program, the two agencies have been tapping and storing hundreds of petabytes of data from a majority of the fiber-optic cables in the UK over the past 18 months. The NSA has a similar program in the US, as revealed in an Associated Press report last week.
First, GCHQ handles 600 million “telephone events” each day by tapping over 200 fiber-optic cables, including those that connect the UK to the US. According to the Guardian, GCHQ is able to collect data at a rate “equivalent to sending all the information in all the books in the British Library 192 times every 24 hours” by processing data from a minimum of 46 fiber-optic cables simultaneously.
The data is then transmitted to a government database and shared with the NSA, which is given top clearance. Lawyers for the GCHQ told their American counterparts that it was “your call” as to what limitations should be in place for data sifting and storage.
According to the leaked documents, these massive databases have been built up over the past several years through widespread corporate collaboration. GCHQ colludes with an array of companies it calls “intercept partners,” and sometimes forces them to hand over huge quantities of data for inspection and storage. The corporate agreements were kept highly guarded under fears that public knowledge of the collusion would lead to “high-level political fallout.”
Once the data is collected, the agencies then filter information through a process known as Massive Volume Reduction (MVR). Through this process, information is pared down to specific individuals, email addresses, or phone numbers. The NSA identified 31,000 “selector” terms, while GCHQ identified 40,000. The leaked documents reveal that a majority of the information extracted is content, including word-for-word email, text and phone recordings.
Through Tempora, GCHQ and the NSA have set up Internet buffers that allow the agencies to watch data accumulate in real-time and store it for less than a week for content or 30 days for metadata.
“Internet buffers represent an exciting opportunity to get direct access to enormous amounts of GCHQ’s special source data,” agents explained in the leaked documents. Valuable information is presumably removed from this temporary buffer and kept on file in intelligence storage facilities.
This information filtration system is not aimed at eliminating the possibility of storing the data of innocent people. In fact, this is precisely the purpose of the surveillance programs. Rather, unnecessary information is sifted out because the governments do not yet have the ability to store such vast quantities of communications content and metadata.
Despite these technological limitations, the immensity of the Tempora program was best described by GCHQ attorneys who acknowledged that listing the number of people targeted by the program would be impossible because “this would be an infinite list which we couldn’t manage.”
GCHQ officials bragged that its surveillance program “produces larger amounts of metadata than NSA,” and were told by GCHQ attorneys that “[w]e have a light oversight regime compared with the US.” The latter statement is extraordinary given the fact that the FISA Court allows the NSA to operate almost entirely without constraint.
Friday’s revelations highlight the international character of the global surveillance programs. Far from being satisfied by storing the content of the communications of its own residents, the US and UK governments are working together to create an unprecedented database of international intelligence.
The intimacy of the two spy agencies is evidenced by an order given by NSA head Keith Alexander in 2008: “Why can’t we collect all the signals, all the time? Sounds like a good summer homework project for [British and American spy center] Menwith!”
Snowden noted Friday that “it’s not just a US problem. The UK has a huge dog in this fight. They [GCHQ] are worse than the US.”
Just like their American counterparts, the GCHQ attorneys have attempted to place a legal veneer over the facially illegal spying operations of the government.
GCHQ lawyers have invoked paragraph four of section 8 of the Regulation of Investigatory Powers Act (Ripa) to run around the legal requirement that intelligence officials acquire a warrant before performing a wiretap. Since this would have required GCHQ to acquire a warrant for every person in the UK, the attorneys instead have claimed that they can perform indiscriminate data mining operations with a “certificate” from a minister.
In a briefing document released by Snowden, GCHQ attorneys claim that these certificates “cover the entire range of GCHQ’s intelligence production.”
Under Ripa, GCHQ officials may also seek a Sensitive Targeting Authority (STA), which would allow them to spy on any UK citizen “anywhere in the world” or on a foreign person in the UK.
A lawyer for GCHQ also noted in the secret documents that the parliamentary intelligence and security committee, which oversees the intelligence agencies, has “always been exceptionally good at understanding the need to keep our work secret,” and that a tribunal set up to monitor the agencies has “so far always found in our favor.”
Article 8 of the European Convention on Human Rights, to which the UK is a signatory, states: “Everyone has the right to respect for his private and family life, his home and his correspondence,” and that “[t]here shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society…”
In Britain as much as the United States, the ruling class is engaged in activity that is in flagrant violation of these democratic principles.
The legal loopholes that allow GCHQ to spy on the world
Source
The legal loopholes that allow GCHQ to spy on the world
Ewen MacAskill, Julian Borger, Nick Hopkins, Nick Davies and James Ball
The Guardian, Friday 21 June 2013 12.23 EDT
William Hague was adamant when he addressed MPs on Monday last week. In an emergency statement (video) forced by the Guardian's disclosures about GCHQ involvement with the Prism programme, the foreign secretary insisted the agency operated within a "strong framework of democratic accountability and oversight".
The laws governing the intelligence agencies provide "the strongest systems of checks and balances for secret intelligence anywhere in the world", he said.
Leaked documents seen by the Guardian give the impression some high-ranking officials at GCHQ have a different view.
In confidential briefings, one of Cheltenham's senior legal advisers, whom the Guardian will not name, made a note to tell his guests: "We have a light oversight regime compared with the US".
The parliamentary intelligence and security committee, which scrutinises the work of the agencies, was sympathetic to the agencies' difficulties, he suggested.
"They have always been exceptionally good at understanding the need to keep our work secret," the legal adviser said.
Complaints against the agencies, undertaken by the interception commissioner, are conducted under "the veil of secrecy". And the investigatory powers tribunal, which assesses complaints against the agencies, has "so far always found in our favour".
The briefings offer important glimpses into the GCHQ's view of itself, the legal framework in which it works, and, it would seem, the necessity for reassuring the UK's most important intelligence partner, the United States, that sensitive information can be shared without raising anxiety in Washington.
None of the documents advocates law-breaking – quite the opposite. But critics will say they highlight the limitations of the three pieces of legislation that underpin the activities of GCHQ, MI5 and MI6 – which were repeatedly mentioned by Hague as pillars of the regulatory and oversight regime during his statement to the Commons.
The foreign secretary said GCHQ "complied fully" with the Regulation of Investigatory Powers Act (Ripa), the Human Rights Act (HRA) and the Intelligence Services Act (Isa).
Privacy campaigners argue the laws have one important thing in common: they were drafted in the last century, and nobody involved in writing them, or passing them, could possibly have envisaged the exponential growth of traffic from telecoms and internet service providers over the past decade.
Nor could they have imagined that GCHQ could have found a way of storing and analysing so much of that information as part of its overarching Mastering the Internet project.
The Tempora programme appears to have given Britain's spymasters that resource, with documents seen by the Guardian showing Britain can retain for up to 30 days an astronomical amount of unfiltered data garnered from cables carrying internet traffic.
This raises a number of questions about the way GCHQ officials and ministers have legitimised the programme.
The briefings, which are entitled UK Operational Legalities, stress that GCHQ "is an organisation with a highly responsible approach to compliance with the law".
GCHQ also has a well staffed legal team, known as OPP-LEG, to help staff navigate their way through the complexities of the law.
But there appears to be some nervousness about Tempora. In a paper written for National Security Agency (NSA) analysts entitled A Guide to Using Internet Buffers at GCHQ, the author notes: "[Tempora] represents an exciting opportunity to get direct access to enormous amounts of GCHQ's special source data.
"As large-scale buffering of metadata and content represent a new concept for GCHQ's exploitation of the internet, GCHQ's legal and policy officers are understandably taking a careful approach to their access and use."
So how did GCHQ secure the legal authority for setting up Tempora, and what safeguards are in place for sharing the intelligence with the Americans? According to the documents, the British government used Ripa to get taps on to the fibre-optic cables.
These cables carry internet traffic in and out of the country and contain details of millions of emails and web searches. The information from these cables went straight into the Tempora storage programme.
In one presentation, which appeared to be for US analysts from the NSA, GCHQ explained: "Direct access to large volumes of unselected SSE data [is] collected under a Ripa warrant."
The precise arrangement between the firms is unclear, as are the legal justifications put before ministers. Isa gives GCHQ some powers for the "passive collection" of data, including from computer networks.
But it appears GCHQ has relied on paragraph four of section 8 of Ripa to gain "external warrants" for its programmes.
They allow the agency to intercept external communications where, for instance, one of the people being targeted is outside Britain.
In most Ripa cases, a minister has to be told the name of an individual or company being targeted before a warrant is granted.
But section 8 permits GCHQ to perform more sweeping and indiscriminate trawls of external data if a minister issues a "certificate" along with the warrant.
According to the documents, the certificate authorises GCHQ to search for material under a number of themes, including: intelligence on the political intentions of foreign governments; military postures of foreign countries; terrorism, international drug trafficking and fraud.
The briefing document says such sweeping certificates, which have to be signed off by a minister, "cover the entire range of GCHQ's intelligence production".
"The certificate is issued with the warrant and signed by the secretary of state and sets out [the] class of work we can do under it … cannot list numbers or individuals as this would be an infinite list which we couldn't manage."
Lawyers at GCHQ speak of having 10 basic certificates, including a "global" one that covers the agency's support station at Bude in Cornwall, Menwith Hill in North Yorkshire, and Cyprus.
Other certificates have been used for "special source accesses" – a reference, perhaps, to the cables carrying web traffic. All certificates have to be renewed by the foreign secretary every six months.
A source with knowledge of intelligence confirmed: "Overall exercise of collection and analysis [is] done under a broad, overall legal authority which has to be renewed at intervals, and is signed off at a senior political level."
The source said the interception commissioner was able to "conclude that [the process] was not appropriate", and that the companies involved were not giving up the information voluntarily.
"We have overriding authority to compel [them] to do this," the source said. "There's an overarching condition of the licensing of the companies that they have to co-operate in this.
"Should they decline, we can compel them to do so. They have no choice. They can't talk about the warrant, they can't reveal the existence of it."
GCHQ says it can also seek a sensitive targeting authority (STA), which allows it snoop on any Briton "anywhere in the world" or any foreign national located in the UK.
It is unclear how the STA system works, and who has authority over it.
The intelligence agencies also have to take note of the HRA, which demands any interception is "necessary and proportionate".
But the documents show GCHQ believes these terms are open to interpretation – which "creates flexibility". When Tempora became fully functional in around 2011, GCHQ gave the NSA access to the programme on a three-month trial – and the NSA was keen to impress.
The US agency sent a briefing to some of its analysts urging them to show they could behave responsibly with the data. Under a heading – "The need to be successful!" – the author wrote: "As the first NSA users to receive operational access [to Tempora], we're depending on you to provide the business case required to justify expanded access. Most importantly we need to prove that NSA users can utilise the internet buffers in ways that are consistent with GCHQ's legal and policy rules.
"In addition, we need to prove that NSA's access … is necessary to prosecute our mission and will greatly enhance the production of the intelligence … success of this three-month trial will determine expanded NSA access to internet buffers in the future."
The NSA appears to have made a successful case. In May last year, an internal GCHQ memo said it had 300 analysts working on intelligence from Tempora, and the NSA had 250. The teams were supporting "the target discovery mission".
But the safeguards for the sharing of this information are unclear.
Though GCHQ says it only keeps the content of messages for three working days, and the metadata for up to 30 days, privacy campaigners here and in the US will want to know if the NSA is adhering to the same self-imposed rules. One concern for privacy campaigners is that GCHQ and the NSA could conduct intercepts for each other, and then offer to share the information – a manoeuvre that could bypass the domestic rules they have to abide by.
This was raised by MPs during last week's statement, with the former Labour home secretary David Blunkett calling for clarification on this potential loophole.
Last week, the Guardian sent a series of questions to the Foreign Office about this issue, but the department said it would not be drawn on it.
"It is a longstanding policy not to comment on intelligence matters; this includes our intelligence co-operation with the United States.
"The intelligence and security committee is looking into this, which is the proper channel for such matters."
German minister seeks answers from UK over spying 'catastrophe'
Source
German minister seeks answers from UK over spying 'catastrophe'
By Michael Nienaber
BERLIN | Sat Jun 22, 2013 4:24pm BST
(Reuters) - Britain's European partners will seek urgent clarification from London about whether a British spy agency has tapped international telephone and Internet traffic on a massive scale, Germany's justice minister said on Saturday.
Sabine Leutheusser-Schnarrenberger said a report in Britain's Guardian newspaper read like the plot of a horror film and, if confirmed as true, would be a "catastrophe".
In its latest article based on information from Edward Snowden, a former contractor for the U.S. National Security Agency (NSA), the Guardian reported a project codenamed "Tempora" under which Britain's eavesdropping agency can tap into and store huge volumes of data from fibre-optic cables.
Tempora has been running for about 18 months and allows the Government Communications Headquarters agency (GCHQ) to access the data and keep it for 30 days, the paper said, adding that much information was shared with the NSA.
"If these accusations are correct, this would be a catastrophe," Leutheusser-Schnarrenberger said in a statement emailed to Reuters.
"The accusations against Great Britain sound like a Hollywood nightmare. The European institutions should seek straight away to clarify the situation."
With a few months to go before federal elections, the minister's comments are likely to please Germans who are highly sensitive to government monitoring, having lived through the Stasi secret police in communist East Germany and with lingering memories of the Gestapo under the Nazis.
"The accusations make it sound as if George Orwell's surveillance society has become reality in Great Britain," the parliamentary floor leader of the opposition Social Democrats, Thomas Oppermann, was quoted as saying in a newspaper.
Orwell's novel "1984" envisioned a futuristic security state where "Big Brother" spied on the intimate details of people's lives.
"This is unbearable," Oppermann told the Frankfurter Allgemeine Sonntagszeitung. "The government must clarify these accusations and act against a total surveillance of German citizens."
Earlier this month, in response to questions about the secret U.S. data-monitoring programme Prism, also exposed by Snowden, British Foreign Secretary William Hague told parliament that GCHQ always adhered to British law when processing data gained from eavesdropping.
He would not confirm or deny any details of UK-U.S. intelligence sharing, saying that to do so could help Britain's enemies.
News of Prism outraged Germans, with one politician likening U.S. tactics to those of the Stasi, and the issue overshadowed a visit by U.S. President Barack Obama to Berlin last week.
(Writing by Sarah Marsh; Editing by Robin Pomeroy)
UK security agency has spy program; shares data with NSA
Source
Guardian newspaper: UK security agency has spy program; shares data with NSA
By CNN Staff
updated 9:16 PM EDT, Fri June 21, 2013
London (CNN) -- Britain's equivalent to the U.S. National Security Agency, the Government Communications Headquarters, has tapped into many of the world's key international fiber optic cables and is routinely downloading and analyzing vast quantities of Internet and phone traffic, sharing the data with the NSA, The Guardian newspaper reported Friday.
The NSA slammed the report as "absolutely false."
"Any allegation that NSA relies on its foreign partners to circumvent U.S. law is absolutely false. NSA does not ask its foreign partners to undertake any intelligence activity that the U.S. government would be legally prohibited from undertaking itself," NSA spokeswoman Judith Emmel said.
The scope of the surveillance dragnet described in the article is enormous.
The newspaper says the report, like many previous ones, is based on the Guardian's reading of documents provided by former U.S. defense contractor Edward Snowden, who admitted leaking documents this month detailing government surveillance programs.
Unlike some previous reports, the paper has not published the full documents on which the story was based.
A spokesman for the British agency, known as GCHQ, issued a statement saying that in line with long-standing practice, it does not comment on intelligence matters.
"It is worth pointing out that GCHQ takes its obligations under the law very seriously," the statement read. "Our work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the secretary of state, the Interception and Intelligence Services Commissioners and the Intelligence and Security Committee."
The prime minister's office at 10 Downing Street also gave a statement saying only, "We don't comment on intelligence matters."
The GCHQ is one of the three UK intelligence agencies and, according to its website, forms a "crucial part of the UK's national intelligence and security machinery."
A source with knowledge of intelligence matters said "intelligence agencies are there to keep citizens safe and the vast majority of data collected is discarded."
The process used by the GCHQ, the source said, "scans bulk data for any information that can have national security implication.
"Only information deemed useful for national security is pulled out and examined in more detail. The vast majority of data is not examined or retained.
"The process is legal and governed by the 2000 Regulatory Investigatory Power Act. It is regularly reviewed and authorized by ministerial warrants. This is vital national security work. It's proportionate and it's about following terrorist or criminal activity and not about following law-abiding citizens."
CNN's Bharati Naik contributed to this report.
Freedom fighter Snowden off to Venezuela???
Freedom fighter Snowden off to Venezuela???
Oddly Edward Snowden isn't a criminal as the US government says, but a freedom fighter. The real criminals are are American Emperors Barack Obama and George W. Bush who have murdered thousands of innocent civilians in their illegal wars in Iraq and Afghanistan.
Source
Reports: Snowden fled Hong Kong, in Moscow
Associated Press Sun Jun 23, 2013 10:37 AM
HONG KONG — NSA leaker Edward Snowden was permitted to leave Hong Kong despite an extradition request that he be returned to the United States to face charges of espionage, Hong Kong said Sunday.
Russian state media say he has landed in Moscow and that he intends to fly to Cuba and on to Venezuela.
The U.S. Justice Department confirmed his departure from Hong Kong just hours after officials announced they filed a formal petition with Chinese authorities seeking Snowden's arrest and return to the United States.
"We have been informed by the Hong Kong authorities Mr. Snowden has departed Hong Kong for a third country,'' Justice Department spokeswoman Nanda Chitre said Sunday. "We will continue to discuss this matter with Hong Kong and pursue relevant law enforcement cooperation with other countries where Mr. Snowden may be attempting to travel.''
House Intelligence Committee Chairman Mike Rogers said on Sunday that the U.S. government must exhaust all legal options to get Snowden back.
"Every one of those nations is hostile to the United States," Rogers, R-Mich., said on NBC's Meet the Press.
"When you think about what he says he wants and what his actions are, it defies logic," said Rogers, who repeated his assertion that Snowden's leaks of secret government surveillance programs had damaged U.S. national security.
The Hong Kong government said Sunday that Snowden, 30, was allowed to fly out "on his own accord" because a the U.S. extradition request announced Saturday did not fully comply with Hong Kong law.
Russian news media site RT reported that Snowden will be on a flight to Havana, leaving Moscow on Monday and then on to Caracas, arriving Monday night. Russia's state ITAR-Tass news agency said Snowden was on Flight SU213, which landed on Sunday afternoon.
RT reported that Russian President Vladimir Putin's spokesperson, Dmitry Peskov, said the Kremlin was unaware of Snowden's plans to fly to Moscow. It said Russian Interfax news agency said Snowden was met at the airport by an official from the Venezuela embassy.
Venezuela's Foreign Ministry in Caracas said it had no information on Snowden to provide. Earlier this month, Peskov said the Kremlin would consider granting Snowden asylum if he asked for it.
Julian Assange, founder of Wikileaks, told Australian Sydney Morning Herald that Snowden will be met by "diplomats from the country that will be his ultimate destination" in the airport, who'll accompany him on a further flight to his destination.
Interfax reported that Snowden has not been able to leave the airport because he does not have a Russian visa. He was accompanied by Wikileaks representative Sarah Harrison, a British citizen and Assange confidante who does have a Russian visa, according to Interfax. A car belonging to the Venezuela embassy was spotted visiting the airport.
Wikileaks has published national secrets on its site in the past and Assange is hiding in the Ecuadorean embassy in London to avoid extradition to Sweden on charges of rape. WikiLeaks said it had helped him exit Hong Kong.
"(Snowden) is bound for a democratic nation via a safe route for the purposes of asylum,and is being escorted by diplomats and legal advisers from WikiLeaks," the group said in a statement.
Rep. Ileana Ros-Lehtinen, R-Fla., said she was not surprised that Snowden would seek safe haven in Cuba or Venezuela, "two regimes that have a longstanding history of giving refuge to fugitives from U.S. law."
"The cruel irony is that there are no press freedoms in either Cuba or Venezuela, yet Snowden who supposedly stands for transparency in government seeks refuge in police states like these two countries," she said.
Hong Kong said in a statement that it allowed Snowden to leave because documents provided by the U.S. government for extradition did not "fully comply with the legal requirements under Hong Kong law," and the U.S. had not yet provided the additional information requested to consider the U.S. request for a provisional arrest warrant.
It said there was no legal basis to stop Snowden from leaving, and the U.S. had been informed of his departure.
Regina Ip, a legislator and Cabinet member, said Sunday that a judge in Hong Kong might have rejected a provisional arrest warrant for Snowden if the government had proceeded with the "insufficient" information the U.S. had provided.
"I don't think we need to be concerned about any consequences," she said without elaboration.
After the announcement Saturday of the extradition request, an Obama administration official told USA TODAY that Hong Kong risked harming relations with the two sides if it did not comply with its legal obligations.
Snowden has been the focus of a criminal investigation since he acknowledged earlier this month that he was the source of materials detailing surveillance programs that collected telephone records for millions of Americans and a separate operation that targeted the Internet communications of non-citizens abroad who were suspected of terrorist connections.
A criminal complaint was filed in the Eastern District of Virginia on June 14 and was unsealed Friday.
Hong Kong also said it had asked the U.S. to clarify reports, based on interviews with Snowden, that the NSA had hacked into computers in Hong Kong and would follow up on the matter "to protect the legal rights of the people of Hong Kong."
Legislator Leung Kwok Hung called Snowden's departure "a loss" for the people of Hong Kong given the value of his leaks in bringing attention to U.S. electronic surveillance in Hong Kong and globally. Leung worries that Snowden may end up in a place where he is less able to call attention to the NSA's activities.
"He has done something good for Hong Kong and the rest of the world already," said Leung, chairman of the League of Social Democrats. "I totally respect his choice as an individual" to leave Hong Kong. As an individual he needs to take care of his interests," he said.
The South China Morning Post meanwhile published additional allegations of hacking in Hong Kong and China on Sunday based on its June 12 interview with Snowden. The newspaper reported that Snowden had provided information to show that the NSA had hacked into the Hong Kong system of Pacnet, which runs undersea telecommunications cables around the Pacific, and into 63 computers and servers at Tsinghua University in Beijing, one of China's most elite schools.
He added, "The NSA does all kinds of things like hack Chinese cellphone companies to steal all of your SMS data."
The newspaper did not indicate why it withheld publication of these reports until Snowden had left Hong Kong.
Snowden, who was employed by Booz Allen Hamilton as an NSA systems analyst in Hawaii, fled to the Chinese territory of Hong Kong last month with top-secret documents and court orders on government surveillance operations.
A one-page criminal complaint against Snowden was unsealed Friday in federal court in Alexandria, Va., part of the Eastern District of Virginia where his former employer, government contractor Booz Allen Hamilton, is headquartered, in McLean. He is charged with unauthorized communication of national defense information, willful communication of classified communications intelligence information and theft of government property. The first two are under the Espionage Act and each of the three crimes carries a maximum sentence of 10 years in prison on conviction.
The complaint is dated June 14, five days after Snowden's name first surfaced as the person who had leaked to the news media that the NSA, in two highly classified surveillance programs, gathered telephone and Internet records to ferret out terror plots.
Snowden told the South China Morning Post in an interview published June 12 on its website that he hoped to stay in the autonomous region of China because he has faith in "the courts and people of Hong Kong to decide my fate."
James Hon, a leader of the League in Defense of Hong Kong's Freedom, said, "If (Snowden) has left, that would be good news… because you don't know what the Hong Kong government and the Chinese government together are going to do to him."
Hon, whose group participates in many opposition protests in Hong Kong, added, "I wish him luck."
Contributing: Kevin Johnson in Washington; Richard Wolf in McLean, Va.; Arutunyan reported from Moscow
Snowden seeks asylum, Ecuador says
Snowden seeks asylum, Ecuador says
As I have said before Snowden is not a criminal, he is a freedom fighter. The only criminals here are American Emperors George W. Bush and Barack Obama, who in addition to violation the Constitutional rights of millions of Americans have also murdered thousands in Iraq and Afghanistan.
Of course I suspect the US government thugs in Homeland Security and the FBI who will read this email before you do disagree with my view of their boss Emperor Obama, but they are part of the problem.
Source
Snowden flees Hong Kong for Moscow
By Kathy Lally, Jia Lynn Yang and Anthony Faiola, Updated: Sunday, June 23, 11:30 AM E-mail the writers
MOSCOW — Edward Snowden, the former government contractor who leaked top-secret documents about U.S. surveillance programs, fled Hong Kong for Moscow on Sunday with the assistance of the anti-secrecy organization WikiLeaks, landing at Sheremetyevo International Airport aboard an Aeroflot flight, according to Russian media reports and a WikiLeaks spokesman.
Snowden’s ultimate destination was unknown, but Ricardo Patiño Aroca, Ecuador’s foreign minister, tweeted Sunday afternoon that his government had received a request for asylum from Snowden. WikiLeaks released a statement saying Snowden was “bound for the Republic of Ecuador via a safe route for the purposes of asylum.”
The Hong Kong government said Sunday that Snowden left “on his own accord for a third country.” A black BMW with diplomatic license plates assigned to the Ecuadoran Embassy was seen parked at Sheremetyevo, but it was unclear who might have been in the car.
The Russian news agency Interfax and Radio Ekho Moskvy reported that Snowden was booked on a flight to Cuba and then from Havana to Caracas, Venezuela. Either, or both, could be stopping points on the way to Ecuador. The next Aeroflot flight to Havana leaves Monday afternoon.
WikiLeaks, which has published hundreds of thousands of classified documents, said it is aiding Snowden in his bid to avoid a return to the United States, which has filed espionage charges against him and asked Hong Kong to detain him.
The group posted on Twitter about 5 a.m. EDT that Snowden was “currently over Russian airspace accompanied by WikiLeaks legal advisors.” The organization later said Snowden was accompanied on his flight to Moscow by Sarah Harrison, who the organization said is a UK citizen, journalist and researcher working with the WikiLeaks legal defense team.
Kristinn Hrafnsson, an Icelandic investigative journalist and spokesman for WikiLeaks, said in a phone interview that Snowden would overnight in Moscow, which he described as “not a final destination.” He declined to say when Snowden would be departing or where his next or ultimate stop would be.
Hrafnsson said he had personally established contact with Snowden last week while the American was still in Hong Kong. Arrangements were made for Harrison, a member of the WikiLeaks legal defense team, to meet Snowden in Hong Kong and accompany him out. Harrison was still with Snowden in Moscow, Hrafnsson said.
He said information on Snowden’s next step would probably be withheld until at least tonight or tomorrow morning.
“The WikiLeaks legal team and I are interested in preserving Mr. Snowden’s rights and protecting him as a person,” said Baltasar Garzon, legal director of WikiLeaks and lawyer for Julian Assange, the group’s founder, who has spent the past year holed up in the Ecuadoran Embassy in London. “What is being done to Mr. Snowden and to Mr. Julian Assange — for making or facilitating disclosures in the public interest — is an assault against the people.”
Three U.S. officials said that Snowden’s passport had been revoked, before he left Hong Kong. The State Department said privacy laws prevented it from commenting on Snowden’s passport.
“As is routine and consistent with U.S. regulations, persons with felony arrest warrants are subject to having their passport revoked,” said spokeswoman Jen Psaki. “. . . Persons wanted on felony charges, such as Mr. Snowden, should not be allowed to proceed in any further international travel, other than is necessary to return him to the United States.”
But Interfax, quoting a Russian law enforcement source, said Snowden could continue on his journey from Moscow despite revocation of his U.S. passport if the country where he was seeking asylum provided him with travel documents. Those documents could include affirmation of refugee status, Interfax reported, or even a passport from the destination country.
Snowden, who has drawn comparisons to Bradley Manning, the U.S. Army private who provided secret files to WikiLeaks, was being examined at the airport by a doctor from the Ecuadoran Embassy on Sunday morning, according to RT, a television network financed by the Russian government. Other Russian media also reported that Snowden was in Moscow.
The Hong Kong government said that documents from the U.S. government requesting a warrant for his arrest “did not fully comply with the legal requirements under Hong Kong law” and it had asked the United States to provide “additional information.”
“As the HKSAR Government has yet to have sufficient information to process the request for provisional warrant of arrest, there is no legal basis to restrict Mr. Snowden from leaving Hong Kong,” the statement said.
A senior Justice Department official disputed that claim. “The request met the requirements of the agreement,” said the official, who spoke on the condition of anonymity because of the sensitivity of the case. “They came back to us late Friday with additional questions, and we were in the process of responding. Obviously, this raises concerns for us and we will continue to discuss this with the authorities there.”
The Hong Kong government said it had informed the U.S. government that Snowden had left.
It has also formally written to the U.S. government asking for “clarification” on reports that computer systems in Hong Kong had been hacked by U.S. agencies.
“The HKSAR Government will continue to follow up on the matter so as to protect the legal rights of the people of Hong Kong,” the statement said.
Nanda Chitre, a spokeswoman for the Justice Department, confirmed in a statement that U.S. officials had been informed by Hong Kong of Snowden’s departure.
“We will continue to discuss this matter with Hong Kong and pursue relevant law enforcement cooperation with other countries where Mr. Snowden may be attempting to travel,” Chitre said.
Snowden would not need a Russian visa if he remained at Sheremetyevo International Airport and departed for another country from there. He could stay within passport control and wait for another flight.
However, if he had to transfer to another Russian airport for a flight out, he would need a transit visa, which usually is not difficult to obtain.
Hrafnsson said he had made contact with Iceland’s government on Snowden’s behalf, but had been told that asylum seekers need to be present and within that nation’s jurisdiction before any claim could be processed. Hrafnsson added that people “within the WikiLeaks circle” had also approached “other governments” on Snowden’s behalf, but he declined to be more specific.
If Snowden is relocating to Ecuador, he would have limited travel options. There are no direct flights from Moscow to Quito, and many would-be layover destinations would probably heed Washington’s request to detain him. One likely exception would be transitioning through Havana. There are direct flights from Moscow to Havana five days a week, including Mondays, and a direct flight from Havana to Quito on Fridays.
Famous leaks in American history: Ten famous leaks in American history — and leakers from Ben Franklin to Edward Snowden.
Patiño recently said Quito would be willing to consider an asylum claim by Snowden. Speaking at a news conference in London after visiting Assange last Monday, Patiño suggested that his nation would approve such a request.
“If he wants to seek asylum from the Ecuadorian government he can do so, and we, of course will analyze it,” Patiño said during the news conference at the Ecuadoran Embassy. Authorities in Ecuador would weigh a petition “responsibly, just like we did so in Mr. Assange’s case,” the minister added.
Assange, the head of the anti-secrecy group, has been unable to leave the Ecuadoran Embassy because the United Kingdom has refused to provide him safe passage while he faces rape charges in Sweden.
Ecuadoran President Rafael Correa has emerged as one of the loudest critics of U.S. policy in the Western hemisphere. In 2011, his administration expelled the American ambassador in Quito to protest a cable released by WikiLeaks that alleged the Ecuadoran police force was rife with corruption.
The extradition treaties between the United States and both Ecuador and Venezuela state that offenses of “a political character” do not warrant extradition — much like the United States’ agreement with Hong Kong. A U.S. report on international narcotics control from 2012 says that Venezuela “does periodically deport non-Venezuelan nationals to the United States.” The treaty with Ecuador was signed in 1872; the agreement with Venezuela went into effect in 1923.
The Russian consulate in Hong Kong declined to comment.
The U.S. government last week asked Hong Kong to issue a provisional arrest warrant and filed charges against Snowden, including theft, “unauthorized communication of national defense information” and “willful communication of classified communications intelligence information to an unauthorized person.”
Under the extradition treaty between the United States and Hong Kong, a judge must review the request for a provisional arrest warrant and make sure it meets certain conditions before issuing the warrant. .
The judge may have considered Snowden more of an activist than a criminal. The extradition also can be rejected if there’s any reason to believe that the person would not receive a fair trial if returned to his home country.
It’s unclear whether Chinese leadership in Beijing had any role in Hong Kong’s decision. Hong Kong is a semiautonomous region that prides itself on its independent legal system, but the government ultimately answers to the mainland government, whose influence can be difficult to discern. Residents in Hong Kong are deeply resistant to any overt sign of interference from the Communist Party.
The Ministry of Foreign Affairs in Beijing said in a statement Sunday that it had seen the reports of Snowden’s departure but did not have “specific details,” stating it would continue to pay attention to developments. The government added that it was “deeply concerned” about reports of U.S. government cyberattacks on China, saying “it proved that China is a victim of cyberattacks.”
The statement also said China opposes all forms of cyberattacks. “China is willing to strengthen dialogue and cooperation with international community based on the spirit of mutual respect, make joint effort to maintain peace and security in cyberspace.”
Ken Lieberthal, a China expert with the Brookings Institution, said it was doubtful that Beijing — or Hong Kong — had much appetite for having Snowden within their borders.
“I think the Chinese government’s position has been, ‘We don’t want to have anything to do with this,’ ” said Lieberthal, adding that this episode is unlikely to damage U.S.-China relations because U.S. government officials knowledgeable about China would understand the distinction between Hong Kong’s actions and Beijing’s.
Lieberthal said Hong Kong may well have looked carefully at the information provided by the U.S. government and decided it technically didn’t meet the test for issuing a warrant. “That seems like a perfectly justifiable position,” Lieberthal said. “I assume they’d be delighted not to be in the middle of this.”
Yang reported from Hong Kong, Lally reported from Moscow and Faiola reported from London. Ernesto Londoño in Kabul, Sari Horwitz in Washington and Liu Liu in Beijing contributed to this report.
Where Did Our ‘Inalienable Rights’ Go?
I doubt if any of the data being collected by the NSA, FBI and Homeland Security will be used to prevent any crimes.
I suspect most of the data will be dug up AFTER people are arrested for some other crime and the data the government illegally collected on them will be used to charge them with other crimes and perhaps as evidence do convict them of whatever crime they were arrested for.
The bottom line is all the data the Federal and state governments are collecting on us is just a fishing expedition by the cops looking for stuff to arrest us for. Well in addition to creating jobs for overpaid cops with nothing to do, other then spy on us.
Source
Where Did Our ‘Inalienable Rights’ Go?
By MAX FRANKEL
Published: June 22, 2013
NOW that we sense the magnitude of our government’s effort to track Americans’ telephone and Internet transactions, the issue finally and fully before us is not how we balance personal privacy with police efficiency.
We have long since surrendered a record of our curiosities and fantasies to Google. We have broadcast our tastes and addictions for the convenience of one-button Amazon shopping. We have published our health and financial histories in exchange for better and faster hospital and bank services. We have bellowed our angers and frustrations for all to overhear while we walk the streets or ride a bus. Privacy is a currency that we all now routinely spend to purchase convenience.
But Google and Amazon do not indict, prosecute and jail the people they track and bug. The issue raised by the National Security Agency’s data vacuuming is how to protect our civil liberty against the anxious pursuit of civic security. Our rights must not be so casually bartered as our Facebook chatter. Remember “inalienable”?
I envy the commentators who, after a few days of vague discussion, think they have heard enough to strike the balance between liberty and security. Many seem confident that the government is doing nothing more than relieving Verizon and AT&T and Facebook of their storage problems, so that government agents can, on occasion, sift through years of phone and Internet records if they need to find a contact with a suspicious foreigner. Many Americans accept assurances that specific conversations are only rarely exhumed and only if the oddly named Foreign Intelligence Surveillance Court allows it. Such sifting and warrants — in unexplained combination with more conventional intelligence efforts — are now said, by President Obama and his team, to have prevented several dozen potential terrorist attacks, with elliptical references to threats against New York City’s subways and stock exchange.
Even if true and satisfying, these assurances are now being publicized only because this huge data-gathering effort can no longer be denied. Whatever the motive for the leaks by Edward J. Snowden, they have stimulated a long-overdue public airing. Although the government’s extensive data-hauling activity was partly revealed by diligent reporters and a few disapproving government sources over the last seven years, the undeniable proof came only from Mr. Snowden’s documents. Until then, the very existence of the enterprise was “top secret” and publicly denied, even in Congressional hearings. Even now, the project remains a secret in every important respect.
As those of us who had to defend the 1971 publication of the secret Pentagon Papers about the Vietnam War have been arguing ever since, there can be no mature discussion of national security policies without the disclosure — authorized or not — of the government’s hoard of secrets.
HOW many thousands have access to these storage bins? Who decides to open any individual file and who then gains access to its content? Is there ever a chance to challenge the necessity of opening a file? And what happens to gleaned information that has no bearing whatsoever on terrorism?
Given the history of misused “secrets” in Washington, such questions are by no means paranoid. J. Edgar Hoover used F.B.I. investigations and files to smear the reputations of individuals — even to the point of intimidating presidents. Throughout the government, “security” monitors leaked personnel files to Congressional demagogues like Senator Joseph R. McCarthy to wreck the careers of officials and blacklisted citizens with claims of disloyalty. President Lyndon B. Johnson and other officials used secret files from the Internal Revenue Service to harass and intimidate political opponents. President Richard M. Nixon tried to use the C.I.A. to cover up his Watergate crimes.
Information that is gathered and managed in secret is a potent weapon — and the temptation to use it in political combat or the pursuit of crimes far removed from terrorism can be irresistible.
President Obama and other defenders of the amassing of data insist that no individual conversation or transaction is ever examined without “court” approval, meaning a warrant from the Foreign Intelligence Surveillance Court. But the court authorizes the scrutiny of more Americans than foreigners, and it is no court in the customary sense: it operates entirely in secret. Its members are federal judges from around the country, any one of whom may authorize the opening of files. Lacking any real challenge to the evidence, they function more as grand jury than court. Mr. Obama has conceded that only a handful of warrant requests have ever been turned down (a few have been modified), a success rate he attributes to government restraint.
Yet most federal judges are predisposed to defer to executive claims of national security. They are generalists with little experience in evaluating intelligence, and they are reluctant to hamper government operatives sworn to defend the nation. The same reluctance is evident among members of Congress, who pose as watchdogs but melt when they hear appeals to patriotism from the managers of the intelligence services.
In theory, Americans are in the habit of resisting government intrusions on their rights of free speech and association. Accordingly we should be skeptical of such overweening exertions. But the data-hauling has gone on for years without real challenge. When asked whether the government could not simply log individual suspicious calls without amassing a national database, Gen. Keith B. Alexander, the head of the National Security Agency, said he was open to discussing that approach, though it might delay work in a crisis. A delay of hours? Days? Weeks? Did President George W. Bush or Mr. Obama ever ask the question?
What ought to compound our skepticism is the news that there is money to be made in the mass approach. We are learning that much of the snooping is farmed out to profit-seeking corporations that have great appetites for government contracts, secured through executives who enrich themselves by shuttling between agency jobs and the contractors’ board rooms. We have privatized what should be a most solemn government activity, guaranteeing bloat and also the inevitable and ironic employ of rebellious hackers like Mr. Snowden.
Where then can we find the skeptical oversight that such a radical challenge to our freedom demands? Presidents beholden to their own bureaucracies seem disinclined to play the skeptic or even to create an elite independent commission, like the Warren Commission, which examined the assassination of President John F. Kennedy, to assess the conflict between liberty and security and point the way to reasonable balance.
Despite the predilections of federal judges to defer to the executive branch, I think in the long run we have no choice but to entrust our freedom to them. But the secret world of intelligence demands its own special, permanent court, like the United States Tax Court, whose members are confirmed by the Senate for terms that allow them to become real experts in the subject. Such a court should inform the public about the nature of its cases and its record of approvals and denials. Most important, it should summon special attorneys to test the government’s secret evidence in every case, so that a full court hears a genuine adversarial debate before intruding on a citizen’s civil rights. That, too, might cost a little time in some crisis. There’s no escaping the fact that freedom is expensive.
Silicon Valley long has had ties to military, intelligence agencies
Source
Silicon Valley long has had ties to military, intelligence agencies
By Brandon Bailey
bbailey@mercurynews.com
Posted: 06/22/2013 03:00:00 PM PDT
Disclosures about a secret government intelligence effort called Prism have rocked some of Silicon Valley's leading Internet companies, but the program is hardly the first instance of U.S. military and intelligence officials turning to the tech industry for help.
"The industry has always tried to make it seem like it was all venture capitalists and free thinkers. And it does include those people," said longtime Silicon Valley watcher Lenny Siegel, who runs the nonprofit Pacific Studies Center in Mountain View. "But there's no question that the government, particularly the military, was a driving force in the development of the computer technology that we use today."
Experts say the government has had good
An illustration picture shows the logo of the U.S. National Security Agency on the display of an iPhone in Berlin, June 7, 2013. The debate over whether the U.S. government is violating citizens' privacy rights while trying to protect them from terrorism escalated dramatically on Thursday amid reports that authorities have collected data on millions of phone users and tapped into servers at nine internet companies. REUTERS/Pawel Kopczynski ( PAWEL KOPCZYNSKI )
reason to cultivate ties with Silicon Valley companies. The valley has what U.S. military and intelligence agencies want: cutting-edge technology and online services -- from social networks to Web-based email and video chat rooms -- that people all over the world use to communicate and share information.
And despite its libertarian bent, Silicon Valley, in turn, has benefited over the years from federal research funding, supply contracts and even regulators' good will.
Silicon Valley's ties to the government are decades old. Back in the 1980s, the valley's biggest employer was Sunnyvale's Lockheed Missiles and Space, which developed weapons and spy satellites for the Defense Department. The Internet itself started as a defense
research project. And military contracts helped support the famed SRI think tank in Menlo Park, where researchers have developed and in some cases spun off pioneering technology used in robotics, mapping and the voice-recognition software that powers Apple's (AAPL) Siri personal assistant.
Today, the CIA has its own venture capital fund, In-Q-Tel, to help finance promising tech startups. Software-makers such as Palo Alto's Palantir Technologies sell sophisticated programs that law enforcement and intelligence agencies use to analyze vast amounts of data. Mainline companies such as Cisco Systems (CSCO), Oracle (ORCL) and Hewlett-Packard (HPQ) have multimillion-dollar contracts to supply computer hardware and tech services to the military and other government offices.
But while there has always been a government presence in the valley, most people don't associate those efforts with the more widely known commercial and consumer tech industry. That's why it was a surprise, at least to some, when a former National Security Agency contractor leaked details of the Prism program. Details are still murky, but the program appears to give U.S. spy agencies, while investigating overseas terror plots, access to information about the online activities of certain individuals who use Internet services operated by Silicon Valley companies.
"These worlds coexisted, but one was hidden in plain sight. They never collided until today," said Steve Blank, a serial tech entrepreneur and Stanford University lecturer who has studied Silicon Valley history.
The valley's leading Internet companies say they supply user information only in response to specific legal demands. Google (GOOG), Facebook, Apple and Yahoo (YHOO) have all said they review government data requests carefully and reject those that don't follow the law. In recent days, they have pressed the government for permission to disclose more about those requests, so they can reassure customers that they aren't handing over information on a broad scale.
Silicon Valley's relationship with the federal government is complex: Companies such as Google, Facebook and Apple are frequently scrutinized by regulators for compliance with antitrust and consumer protection laws. And the tech industry pours millions of dollars into lobbying on legislation and policies that affect it.
Civil liberties activists worry that those interactions, especially the threat of regulatory action, make it all the more difficult for tech companies to resist when the National Security Agency or FBI come asking for customer data.
"The government has its thumb on their rate of return for investment," said attorney Shayana Kadidal of the nonprofit Center for Constitutional Rights. "They have no incentive to fight the government back on any of this stuff."
Others note that at least one company fought a secret legal battle to challenge information requests made under the Foreign Intelligence Surveillance Act, or FISA, which governs Prism. The name of the company, which lost its appeal in the federal court that handles FISA matters, has been classified. But The New York Times, citing unnamed sources, has reported it was Yahoo.
The court's 2008 ruling in that case sent a strong message to other Internet companies that future legal challenges would be difficult, said Mark Rumold, an attorney with the Electronic Frontier Foundation.
Prism is not the only instance where authorities have used a Silicon Valley company's products to collect information. Networking equipment-maker Cisco, for example, says it's legally required to build a technical feature known as "lawful intercept" capability into some of the products it sells to phone and cable providers, so their systems can be accessible to court-ordered wiretaps by police or other authorities.
Tech companies have also collaborated voluntarily with U.S. authorities in areas such as computer security. In recent years, Intel's (INTC) McAfee unit and other security firms have shared information and advised government officials about computer viruses and other malicious Internet attacks.
The government, in turn, has provided access to some of its knowledge on the subject: A few years ago, according to Bloomberg News, U.S. authorities gave Google co-founder Sergey Brin a top-secret briefing on a Chinese army unit that was linked to an attack on Google's network.
Staff writer Troy Wolverton contributed to this report. Contact Brandon Bailey at 408-920-5022. Follow him at Twitter.com/BrandonBailey.
You can bet that Big Brother is watching you
Source
You can bet that Big Brother is watching you
Mon Jun 24, 2013 7:30 PM
Let me get this straight: If you use a wireless phone or the Internet, the Obama administration (aka Big Brother) is tracking you.
If you call a suicide hotline, Big Brother knows. If you buy guns, Big Brother knows. If you want an abortion, Big Brother knows. If you are a newspaper reporter contacting a source, Big Brother knows. If you call your tax adviser, Big Brother knows. When you call your doctor, Big Brother knows.
Big Brother didn’t stop the Boston bombing. But California Democrats Barbara Boxer, Dianne Feinstein and many Republicans say that they knew your personal calls and e-mails were being tracked, so they approved the unreasonable searches. Only a terrorist would object.
Big Brother rules. Resistance is futile. And I will be tracked for sending this letter.
— Gerry Walsh, Surprise
2 sent to prison for creation, sale of machine guns
Many legal experts say any and all of these laws making machine guns illegal are unconstitutional per the 10th Amendment.
In fact one of the first cases on which involved a sawed off shotgun (which is subjected to the same laws a machine guns) was United States v. Miller ruled that the National Firearms Act of 1934 (NFA) was unconstitutional at in the lower court.
That case was appealed directly to the Supreme Court by the Federal government. That was allowed in those days.
Oddly nobody showed up to represent Miller in the Supreme Court and the Supreme Court reversed the decision because only the Federal government was represented in the case and the National Firearms Act of 1934 (NFA) was constitutional.
"Neither the defendants nor their legal counsel appeared at the Supreme Court. A lack of financial support and procedural irregularities prevented counsel from traveling. Miller was found shot to death in April, before the decision was rendered."
United States v. Miller
Source
2 sent to prison for creation, sale of machine guns
By Lindsey Collom The Republic | azcentral.com Wed Jun 26, 2013 10:33 PM
Two licensed gun dealers have been imprisoned for their roles in an illegal machine-gun manufacturing and sales operation that went undetected by authorities for nearly 15 years.
A U.S. District Court judge in Phoenix recently sentenced Randolph Benjamin Rodman, 60, of Maryland, and Idan C. Greenberg, 59, of Glendale, to prison terms of 121 months, or nearly a decade, and 33 months, or nearly three years, respectively, in connection with the bicoastal enterprise.
Authorities said Rodman, Greenberg and four other licensed dealers — three in Arizona and one in Maryland — conspired to make newly manufactured machine guns in violation of a 1986 ban and transferred them using paperwork for different firearms.
More than 30 such weapons were accounted for by agents with the federal Bureau of Alcohol, Tobacco, Firearms and Explosives, court records show.
Federal law defines a machine gun as any weapon that automatically shoots more than one bullet with a single trigger pull. In 1986, Congress banned the possession and transfer of all machine guns except for those legally owned before May 19, 1986, (meaning the firearms are federally registered) and machine guns possessed or manufactured for governmental entities.
Once the ban was implemented, the price of legally available machine guns, which stands at about 196,000 firearms, skyrocketed. Alan Korwin, a Scottsdale-based gun-law expert, said they can easily fetch $15,000 to $20,000 apiece in today’s market.
“They’re coveted by enthusiasts,” Korwin said. “You might find one for $10,000 that is in poor condition.”
George Clark, a defendant-turned-federal witness from the Kingman area, testified in November that he used a hacksaw to harvest serial numbers from less desirable, federally registered machine guns. Clark, a licensed gun maker, said he then welded the numbers onto new, custom-made, fully automatic weapons made at the request of other licensed dealers or for himself.
Clark’s advertisement for a MAC-style machine gun on subguns.com first piqued the ATF’s interest in October 2006, according to a search warrant. “MAC” stands for Military Armament Corp. The description of the MAC-style gun didn’t match what was actually being sold: a Model 1919 .30-caliber machine gun, a belt-fed firearm popular for infantry use during the 20th century.
Clark told agents he had been doing similar work since 1993, when he made his first M1919 using another serial number for a retired veteran who wanted the gun for sentimental reasons but couldn’t afford any on the market. Clark testified to having made similar guns for other licensed dealers, including Rodman and Greenberg, all of whom he claimed were in on the scheme.
Anyone who wants to own or transfer a registered machine gun must apply for a tax stamp, pay the tax and get ATF approval for the transfer or possession.
In addition to creating the new machine guns, authorities said, Clark and others failed to properly register the firearms with the ATF, instead passing them off as the originals.
Greenberg’s attorney did not return a call for comment. According to a court transcript of Greenberg’s testimony in August 2012, he has held a federal firearms license since 1980 and, in 1985, became a licensed dealer of weapons regulated by the National Firearms Act, which includes machine guns and short-barreled rifles and shotguns.
He ran his business, Firearms Adviser, from an address at 1001 S. Fifth St. in Phoenix, according to AFT licensing records. Greenberg’s attorney told the court that his client also trained members of the Israeli military and conducts firearms workshops for law enforcement.
A federal jury in December found Greenberg guilty of conspiracy, illegal possession of a machine gun, and receipt and possession of a firearm made in violation of the National Firearms Act.
The same jury convicted Rodman of 22 charges, including conspiracy; the manufacturing, possession, receipt and transfer of machine guns in violation of the act; and making false entries on applications and records.
NYC to police the police - Probably not!!!!
We certainly don't want to make the police accountable for their actions.
Well at least that's how the cops feel, and the elected officials that
cater to the police unions like Mayor Michael R. Bloomberg.
On the other hand I doubt any new laws will make the police obey the law. After all we currently have the US Bill of Rights and the police at the city, county, state and Federal levels routinely flush those constitutional rights down the toilet. Yea, sure every once in a while a cop gets more then a slap on the wrist for violating our rights but that is the exception rather then the rule.
Just two days ago I was falsely arrested by the police in Chandler, Arizona for unknown reason. When I took the 5th and refused to answer their questions the pigs did as they always do and told me the 5th Amendment didn't apply in this case. What rubbish. The pigs that arrested me were G. Peterson or G. Patterson #200, L.J. Morris badge #270 and piggy B Lucas, who refused to give me his badge and made it almost impossible to get this name.
I am not going to waste my time filing a complain with the Chandler Police Department because like most police departments they are corrupt.
I do plan to file a lawsuit in Federal Court suing the pigs for false arrest and civil rights violations, but I don't expect to win it. Not because my civil rights weren't violated or because I wasn't falsely arrested, but because it is THEIR SYSTEM and it is also corrupt.
Source
New York City Council Votes to Increase Oversight of Police Dept.
By J. DAVID GOODMAN
Published: June 27, 2013
Over the strident objections of the mayor and police commissioner, the New York City Council early Thursday morning approved by veto-proof majorities a pair of bills aimed at increasing oversight of the Police Department and expanding New Yorkers’ ability to sue over racial profiling by officers.
The two bills, known together as the Community Safety Act, passed during a late-night meeting of the Council that began after 11 p.m., lasted more than three hours and in which members also voted to pass the city’s budget and override a mayoral veto of a law on paid sick leave.
But it was the two policing bills that for months have stirred a heated public debate between its supporters, who are seeking a legal means to change the Police Department’s stop-and-frisk program, and Mayor Michael R. Bloomberg and Commissioner Raymond W. Kelly, who have warned that the measures would hamstring police officers and lead to a dangerous spike in crime.
One, known as Intro 1079, would create an independent inspector general to monitor and review police policy, conduct investigations and recommend changes to the department. The monitor would be part of the city’s Investigation Department alongside the inspectors general for other city agencies.
The law would go into effect Jan. 1, 2014, leaving the matter of choosing the monitor to the next mayor.
The other bill, Intro 1080, would expand the definition of bias-based profiling to include age, gender, housing status and sexual orientation. It also would allow individuals to sue the Police Department in state court — not only for individual instances of bias, but also for policies that disproportionately affect people in any protected categories without serving a significant law enforcement goal.
Both measures passed the 51-member Council with the votes needed to override a mayoral veto. As that threshold was passed just after 2:20 a.m., scores of supporters who had filled the chamber’s gallery and waited hours through the debate erupted into cheers.
Mr. Bloomberg, who has promised to veto both measures and this week called his opposition to them a matter of “life and death,” released a statement after the vote. “I will veto this harmful legislation and continue to make our case to Council members over the coming days and weeks,” he said.
An attempt to override his veto would extend the protracted clash between the mayor and the Council over policing. The process could take more than two months, putting the override vote only weeks before the mayoral primary.
The legislation has already been a nettlesome issue in the Democratic race for mayor, especially for Christine C. Quinn, the Council speaker, who has faced a growing challenge to her early front-runner status. She supported the measure creating an independent inspector general for the Police Department, which passed by a vote of 40 to 11, but she opposed the other, on police profiling, which received 34 votes in favor and 17 against.
“I worry about having too much judicial involvement,” she said before casting her vote, explaining that she did not believe the profiling bill would make New Yorkers less safe.
Despite her earlier stated opposition, she allowed both bills to move forward, and on Monday presided over a so-called discharge vote — the first since the current structure of the Council was established in 1989 — to bring the legislation out of committee, where it had stalled.
The two bills were first introduced as a package last year by Councilmen Jumaane D. Williams and Brad Lander.
Mr. Bloomberg has 30 days to veto the bills. If he does so, the City Council then has 30 days from its next full meeting to hold an override vote. The mayor and the Police Department have lobbied hard against the bills in public and behind the scenes, and they appeared likely to keep up the pressure between the veto and the override vote in an effort to change the minds of supporters.
Mr. Kelly sent a letter on Tuesday to each of the Council members, arguing that the profiling bill could be used to force the removal of surveillance cameras and urging them to vote against it. “The bill would allow virtually everyone in New York City to sue the Police Department and individual police officers over the entire range of law enforcement functions they perform,” Mr. Kelly wrote.
Mr. Williams, responding to Mr. Kelly’s letter, said: “If the cameras were put in high crime neighborhoods as a response, that’s good policing. If he put them there because black people live there, that’s a problem.”
At least one Council member received a call from his local police station commander to protest the legislation ahead of the vote.
“They were deeply concerned about 250s and said they would be unable to perform them because of the profiling part of the reform,” said Councilman Daniel Dromm of Queens, referring to the police form used for street stops. “But for me, it’s the teeth of the reform; it’s the needed piece.” He voted for both bills.
In voting against the two measures early Thursday morning, Peter F. Vallone Jr., the chairman of the public safety committee, said, “New Yorkers went to bed a long time ago, safe in their beds. But they are going to wake up in a much more dangerous city.”
Papers Please - Bill to Expand U.S. Database to Verify Hires
Source
Bill to Expand U.S. Database to Verify Hires
By JULIA PRESTON and ASHLEY PARKER
Published: June 26, 2013 245 Comments
WASHINGTON — The sweeping immigration measure advancing rapidly in the Senate goes far beyond much-debated border security measures and a path to citizenship for undocumented immigrants with a crucial requirement that could affect every American who takes a new job in the future.
The provision, a linchpin of the legislation, would require all employers in the country within five years to use a federal electronic system to verify the legal eligibility to work of every new hire, including American citizens.
The verification plan has united an unusual array of supporters — including Democrats protective of workers’ rights and Republicans normally skeptical of government intrusion — who say it is essential for preventing illegal immigration in the future because it would remove the jobs magnet that attracts migrants to this country.
But there has been little debate up to now about the provision to expand the federal system, which is known as E-Verify, and critics of the measure as well as some proponents worry that most Americans are unaware of the mandate’s broad scope. The system relies on imperfect federal databases that contain errors, and when it goes national, some Americans are likely to face unexpected bureaucratic headaches and could even lose new jobs.
“I don’t think people really understand that this creates a regulation not just for every employer, or for every immigrant, but also for every citizen in this country,” said David Bier, an immigration policy analyst at the Competitive Enterprise Institute, a conservative research group that favors limited government and opposes mandatory employee verification.
Now, with the bill headed for a final vote in the Senate as early as Thursday, the E-Verify mandate has become the focus of intense last-minute deal making.
Senator Rob Portman, Republican of Ohio, has demanded a separate vote on an amendment that would make the requirements even tougher by ordering employers to comply sooner and tightening antifraud measures. Sponsors of the overhaul, which seems headed for passage, are negotiating with Mr. Portman, hoping to win his support to maximize the Republican votes in the final tally.
One American who has been watching the progress of the E-Verify provisions with a growing sense of dread is David Borris, the owner of Hel’s Kitchen Catering, a small business in Northbrook, Ill. While he agrees with the path to citizenship in the bill, Mr. Borris said he worried that the requirement to check all new employees with E-Verify would bring a host of costly and time-consuming troubles.
Mr. Borris said he needed to spend his time finding new customers who are planning banquets and bar mitzvahs, and perfecting the eggplant timbale that is a signature dish of his service.
“Businesses like mine don’t have the resources to be catching up with bureaucratic snafus,” he said. Mr. Borris is a leader of the Main Street Alliance network, one of many small business organizations opposing the E-Verify mandate.
On Wednesday, talks were still under way between Democratic and Republican leaders in the Senate to try to hold a vote on a several additional amendments, which would likely include the proposal on E-Verify that Mr. Portman offered, together with Senator Jon Tester, Democrat of Montana.
The measure would speed up the dates when employers would have to start using the system. It would also increase the use of photograph technology to eliminate a flaw in the system, which can fail to detect unauthorized immigrants who present employers with valid documents belonging to someone else.
“No matter how many miles of fence we build and how many agents we station on the border, I truly believe people will come to this country illegally as long as they believe America offers a better life and a better job,” Mr. Portman said on the Senate floor. Speaking on Wednesday, the senator said, “I believe strongly that if we do not have a stronger employee verification system at the workplace, this legislation is not going to work.”
Even without Mr. Portman’s vote, the overhaul bill appears almost certain to pass. It gathered new momentum Wednesday, when the Senate voted 69 to 29 to formally add a border security plan by two Republican senators, Bob Corker of Tennessee and John Hoeven of North Dakota, to the legislation. Fifteen Republicans supported the proposal, which would cost roughly $40 billion and create what some senators have described as a “border surge,” adding 20,000 new border patrol agents and erecting 700 miles of fencing at the southern border, among other measures.
In the Republican-controlled House of Representatives, the Judiciary Committee on Wednesday approved, 22 to 9, a stand-alone bill that includes a nationwide E-Verify mandate similar to the one in the Senate legislation.
The need for worker verification to prevent unauthorized immigrants from taking jobs was one of the early agreements the eight senators who wrote the overhaul bill came to, aides said. The E-Verify mandate is one of the hard “triggers” in the legislation: under its terms, the system must be in use nationwide before any immigrants who had been here illegally can apply for permanent resident green cards, a crucial step on the path to citizenship.
Up to now the E-Verify system, which is run by Citizenship and Immigration Services, an agency within the Department of Homeland Security, has been mostly voluntary and has earned surprisingly few detractors. With more than 411,000 employers currently participating, the system is reporting an accuracy rate of 99.7 percent in confirming that newly hired employees were authorized to work.
Of more than 20.2 million workers run through the system in 2012, only 0.26 percent turned out to be legally authorized after an initial erroneous denial, according to official figures. The system identified 221,155 new hires who did not have legal documents to work in this country. Officials said those figures proved the system was effective.
But under the proposed immigration changes, the system would quickly grow to include all of the nation’s 7.3 million employers and more than 156 million workers. “As you expand it out to the entire work force, even if the agency has worked hard to increase their accuracy, there is still a real problem with errors,” said Emily Tulli, a lawyer at the National Immigration Law Center, a legal assistance organization in Los Angeles.
The system matches identity information provided by newly hired employees against Social Security and Homeland Security records. Errors can occur when, for example, a newlywed adopts a spouse’s name and forgets to advise Social Security or when an employer misspells a foreign name.
In many cases, it takes a trip to a Social Security office to fix mistakes in the records. If the error is not speedily resolved, the worker can lose the job.
Homeland Security officials insist those cases are rare, and say they are confident the system can handle the expansion. A recently added tool improves accuracy by allowing employers to match a photo in the E-Verify system with a document presented by the new employee. Another tool allows people to check themselves before starting a job search.
A spokesman for the Homeland Security Department, Peter Boogaard, said new employees would not be providing any more personal information than was already required on standard hiring forms. “So mandatory verification will likely go unnoticed by the majority of Americans,” Mr. Boogaard said.
But Mr. Borris, the caterer, is unconvinced. His full-time staff of 25 employees grows during busy times with about 80 seasonal workers, including many Latinos. He has one staff member to fill out employee forms, handle his payroll, manage his e-mail list and make all-important choices about which customers will get holiday gifts. Most companies now using the voluntary program have human resources staff, he said.
“That error rate is just a small number unless it’s your business or your brother or your sister,” Mr. Borris said.
NSA collected Americans' email data for a decade under Bush and Obama
I have said many times that Emperor Obama is a carbon copy clone of Emperor Bush.
Source
NSA collected Americans' email data for a decade under Bush and Obama, new report details
By Jeremy C. Owens
jowens@mercurynews.com
Posted: 06/27/2013 09:07:46 AM PDT
The National Security Agency began tracking email and Internet-use data after the September 11, 2001, terrorist attacks, continuing and expanding the program through 2011, according to new documents published by The Guardian on Thursday.
The Guardian, a British newspaper, received records about the NSA's Prism program -- which collected similar "metadata" on Americans' cellphone usage from top carrier Verizon Wireless -- from Edward Snowden, a security contractor with Booz Allen who fled the U.S. after passing on the information.
Thursday's report involves a different NSA program, a warrantless surveillance program code-named Stellar Wind that was begun in 2001, under President George W. Bush. The Guardian
Activists of Ukraine's Internet party, one of them acting as a CIA agent making telephone taps, demand the American authorities stop the pursuit of National Security Agency leaker Edward Snowden at an action of protest near the US Embassy in Kiev, Ukraine, Thursday, June 27, 2013. ((AP Photo/Efrem Lukatsky))
obtained a 2009 draft report by the NSA's inspector general and a 2007 Justice Department memo detailing the program, but did not reveal a source for the information.
President Barack Obama's administration confirmed that the program existed and was discontinued in 2011.
"The Internet metadata collection program authorized by the FISA court was discontinued in 2011 for operational and resource reasons and has not been restarted," Shawn Turner, director of communications for national intelligence, told the Guardian. "The program was discontinued by the executive branch as the result of an interagency review."
According to the report, the NSA received details about whom emails were directed to and IP addresses of the senders,
which can provide physical locations, but could not see the content of the emails. In the beginning, the program only received such data when the communication involved a party outside the United States, but the 2007 memo shows that it eventually began to analyze data on communications between Americans.
Another document, created in 2008 and signed by the then-defense secretary and attorney general, says that the information provided through the program included "the information appearing on the 'to,' 'from' or 'bcc' lines of a standard email or other electronic communication," The Guardian reported.
Authorities used the information to analyze communications of targeted individuals in terrorism investigations, looking for whom was being contacted by suspects and also the contacts of those contacts, which the NSA refers to as "contact chaining."
When the program began under President Bush in 2001, it had no legal authority, according to the documents, and Justice Department and FBI officials -- including then-deputy Attorney General James Comey, Obama's nominee for FBI director -- rebelled against the program in 2004 and had it shut down. However, Bush then took the program to the court created under the Foreign Intelligence Surveillance Act, or FISA, and received official clearance for the activity ; the court renewed its order every 90 days until it was shut down in 2011, according to The Guardian.
Contact Jeremy C. Owens at 408-920-5876; follow him at Twitter.com/mercbizbreak.
The Criminal N.S.A.
Source
The Criminal N.S.A.
By JENNIFER STISA GRANICK and CHRISTOPHER JON SPRIGMAN
Published: June 27, 2013
THE twin revelations that telecom carriers have been secretly giving the National Security Agency information about Americans’ phone calls, and that the N.S.A. has been capturing e-mail and other private communications from Internet companies as part of a secret program called Prism, have not enraged most Americans. Lulled, perhaps, by the Obama administration’s claims that these “modest encroachments on privacy” were approved by Congress and by federal judges, public opinion quickly migrated from shock to “meh.”
It didn’t help that Congressional watchdogs — with a few exceptions, like Senator Rand Paul, Republican of Kentucky — have accepted the White House’s claims of legality. The leaders of the Senate Intelligence Committee, Dianne Feinstein, Democrat of California, and Saxby Chambliss, Republican of Georgia, have called the surveillance legal. So have liberal-leaning commentators like Hendrik Hertzberg and David Ignatius.
This view is wrong — and not only, or even mainly, because of the privacy issues raised by the American Civil Liberties Union and other critics. The two programs violate both the letter and the spirit of federal law. No statute explicitly authorizes mass surveillance. Through a series of legal contortions, the Obama administration has argued that Congress, since 9/11, intended to implicitly authorize mass surveillance. But this strategy mostly consists of wordplay, fear-mongering and a highly selective reading of the law. Americans deserve better from the White House — and from President Obama, who has seemingly forgotten the constitutional law he once taught.
The administration has defended each of the two secret programs. Let’s examine them in turn.
Edward J. Snowden, the former N.S.A. contract employee and whistle-blower, has provided evidence that the government has phone record metadata on all Verizon customers, and probably on every American, going back seven years. This metadata is extremely revealing; investigators mining it might be able to infer whether we have an illness or an addiction, what our religious affiliations and political activities are, and so on.
The law under which the government collected this data, Section 215 of the Patriot Act, allows the F.B.I. to obtain court orders demanding that a person or company produce “tangible things,” upon showing reasonable grounds that the things sought are “relevant” to an authorized foreign intelligence investigation. The F.B.I. does not need to demonstrate probable cause that a crime has been committed, or any connection to terrorism.
Even in the fearful time when the Patriot Act was enacted, in October 2001, lawmakers never contemplated that Section 215 would be used for phone metadata, or for mass surveillance of any sort. Representative F. James Sensenbrenner Jr., a Wisconsin Republican and one of the architects of the Patriot Act, and a man not known as a civil libertarian, has said that “Congress intended to allow the intelligence communities to access targeted information for specific investigations.” The N.S.A.’s demand for information about every American’s phone calls isn’t “targeted” at all — it’s a dragnet. “How can every call that every American makes or receives be relevant to a specific investigation?” Mr. Sensenbrenner has asked. The answer is simple: It’s not.
The government claims that under Section 215 it may seize all of our phone call information now because it might conceivably be relevant to an investigation at some later date, even if there is no particular reason to believe that any but a tiny fraction of the data collected might possibly be suspicious. That is a shockingly flimsy argument — any data might be “relevant” to an investigation eventually, if by “eventually” you mean “sometime before the end of time.” If all data is “relevant,” it makes a mockery of the already shaky concept of relevance.
Let’s turn to Prism: the streamlined, electronic seizure of communications from Internet companies. In combination with what we have already learned about the N.S.A.’s access to telecommunications and Internet infrastructure, Prism is further proof that the agency is collecting vast amounts of e-mails and other messages — including communications to, from and between Americans.
The government justifies Prism under the FISA Amendments Act of 2008. Section 1881a of the act gave the president broad authority to conduct warrantless electronic surveillance. If the attorney general and the director of national intelligence certify that the purpose of the monitoring is to collect foreign intelligence information about any nonAmerican individual or entity not known to be in the United States, the Foreign Intelligence Surveillance Court can require companies to provide access to Americans’ international communications. The court does not approve the target or the facilities to be monitored, nor does it assess whether the government is doing enough to minimize the intrusion, correct for collection mistakes and protect privacy. Once the court issues a surveillance order, the government can issue top-secret directives to Internet companies like Google and Facebook to turn over calls, e-mails, video and voice chats, photos, voiceover IP calls (like Skype) and social networking information.
Like the Patriot Act, the FISA Amendments Act gives the government very broad surveillance authority. And yet the Prism program appears to outstrip that authority. In particular, the government “may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States.”
The government knows that it regularly obtains Americans’ protected communications. The Washington Post reported that Prism is designed to produce at least 51 percent confidence in a target’s “foreignness” — as John Oliver of “The Daily Show” put it, “a coin flip plus 1 percent.” By turning a blind eye to the fact that 49-plus percent of the communications might be purely among Americans, the N.S.A. has intentionally acquired information it is not allowed to have, even under the terrifyingly broad auspices of the FISA Amendments Act.
How could vacuuming up Americans’ communications conform with this legal limitation? Well, as James R. Clapper Jr., the director of national intelligence, told Andrea Mitchell of NBC, the N.S.A. uses the word “acquire” only when it pulls information out of its gigantic database of communications and not when it first intercepts and stores the information.
If there’s a law against torturing the English language, James Clapper is in real trouble.
The administration hides the extent of its “incidental” surveillance of Americans behind fuzzy language. When Congress reauthorized the law at the end of 2012, legislators said Americans had nothing to worry about because the surveillance could not “target” American citizens or permanent residents. Mr. Clapper offered the same assurances. Based on these statements, an ordinary citizen might think the N.S.A. cannot read Americans’ e-mails or online chats under the F.A.A. But that is a government fed misunderstanding.
A “target” under the act is a person or entity the government wants information on — not the people the government is trying to listen to. It’s actually O.K. under the act to grab Americans’ messages so long as they are communicating with the target, or anyone who is not in the United States.
Leave aside the Patriot Act and FISA Amendments Act for a moment, and turn to the Constitution.
The Fourth Amendment obliges the government to demonstrate probable cause before conducting invasive surveillance. There is simply no precedent under the Constitution for the government’s seizing such vast amounts of revealing data on innocent Americans’ communications.
The government has made a mockery of that protection by relying on select Supreme Court cases, decided before the era of the public Internet and cellphones, to argue that citizens have no expectation of privacy in either phone metadata or in e-mails or other private electronic messages that it stores with third parties.
This hairsplitting is inimical to privacy and contrary to what at least five justices ruled just last year in a case called United States v. Jones. One of the most conservative justices on the Court, Samuel A. Alito Jr., wrote that where even public information about individuals is monitored over the long term, at some point, government crosses a line and must comply with the protections of the Fourth Amendment. That principle is, if anything, even more true for Americans’ sensitive nonpublic information like phone metadata and social networking activity.
We may never know all the details of the mass surveillance programs, but we know this: The administration has justified them through abuse of language, intentional evasion of statutory protections, secret, unreviewable investigative procedures and constitutional arguments that make a mockery of the government’s professed concern with protecting Americans’ privacy. It’s time to call the N.S.A.’s mass surveillance programs what they are: criminal.
Jennifer Stisa Granick is the director of civil liberties at the Stanford Center for Internet and Society. Christopher Jon Sprigman is a professor at the University of Virginia School of Law.
Uncle Sam spying on people that buy fireworks??? Probably.
In the article Uncle Sam's in the FBI and Homeland Security want you to snitch on people that are buying fireworks.
I think a better idea would be to take all the guns and explosives away from Uncle Sam. Uncle Sam would no longer be able to terrorize and murder brown skinned folks in third world countries. And of course Uncle Sam's goons in the FBI, Homeland Security, BATF, DEA and other government police forces would no longer be able to terrorize Americans on the home front.
Source
Feds urge fireworks sellers to watch for suspicious buyers
Donna Leinwand, USA TODAY 11:10 a.m. EDT June 29, 2013
A federal task force says that fireworks sellers should keep a close eye out for suspicious people buying fireworks.
As the frenzy for fireworks peaks in the runup to Independence Day, a federal task force is warning fireworks retailers to keep watch for suspicious purchasers.
The National Explosives Task Force issued an industry advisory Thursday warning that consumer fireworks are a "common component used in improvised explosive devices." It advised retailers to look for possible signs of suspicious activity, including customers who ask about how to take apart or modify the fireworks or who seek to purchase commercial-grade fireworks.
The advisory comes in the wake of the Boston Marathon bombing that killed three people and injured more than 250 on April 15. In an indictment made public Thursday, a grand jury charged Dzhokhar Tsarnaev with detonating bombs made from pressure cookers, low-explosive powder and shrapnel at the marathon. The indictment says his brother, Tamerlan Tsarnaev, purchased 48 mortars containing 8 pounds of low-explosive powder from Phantom Fireworks, a retail store in Seabrook, N.H., on Feb. 6.
This is the second time in recent years that fireworks have been used in a terror plot. Pakistani-American Faisal Shahzad, who confessed to a failed attempt to bomb Times Square in 2010, purchased fireworks from a Phantom store in Matamoros, Pa.
But the use of fireworks for nefarious acts has not dampened demand among consumers or prompted backlash from state or federal regulators. Last year, consumers purchased more than 185 million pounds of fireworks, according to data from the Commerce Department and the U.S. International Trade Commission.
All but four states — Delaware, Massachusetts, New York and New Jersey — allow the sale of some types of fireworks or sparklers. No state has tightened restrictions on fireworks since the bombing, says Julie Heckman, executive director of the American Pyrotechnics Association, a trade group based in Bethesda, Md.
Now is peak fireworks season: 90% of everyday consumer pyrotechnics is sold between April 15 to July 15, Heckman says.
"I think most Americans realize that bad things can be made out of many common materials," Heckman said.
Consumer fireworks individually do not mass detonate because they contain low levels of explosive mixed with other chemicals to make the firework colorful, says Phantom CEO Bruce Zoldan. The Boston bombers, using a technique recommended by al-Qaeda, appear to have cut open the pyrotechnics to remove the powder and put it in the pressure cooker, Zoldan said.
"It's possible to get enough powder together to do something, but there are easier ways to do that," Zoldan said.
The industry, which is tightly regulated by the Consumer Product Safety Commission, Department of Transportation, the Bureau of Alcohol, Tobacco, Firearms and Explosives, and state authorities, is willing to work on ways to prevent products from being used improperly or assist law enforcement when needed, Zoldan said.
Phantom Fireworks maintains a database of customers for marketing so the company was able to identify Tsarnaev's purchase, Zoldan said.
"I think the industry will have to gather together and come up with something that will protect the industry's interests by working hand in hand with Homeland Security," he said. "If we're selling a product that's capable of being dissected, then we as an industry will have to get together to do what's right."
The industry has taken such steps before, he said. Decades ago, the industry created and funded the American Fireworks Standards Laboratory to safety test products to prevent fireworks-related injuries, he said.
"Now we need to make a proactive effort to help monitor individuals who might come in to buy fireworks for not honorable reasons," Zoldan said. "We help Americans celebrate America's birthday. We're not going to let criminals ruin that."
Syria could become another American military failure
Source
Letter: Syria could become another American military failure
Posted: Monday, July 1, 2013 11:59 am
Letter to the Editor
America hasn’t “won” a war since 1945. Korean War cost a billion dollars and didn’t change a thing. 36,574 Americans died and 103,284 were wounded.
During the 1967 Israel/Arab War, 34 American Sailors were killed and 171 wounded by the Israel Air Force.
The Vietnam War cost more than a trillion dollars and the Viet Cong and North Vietnamese Army ended up taking over South Vietnam anyway, at a cost of 58,200 American military deaths and 303,644 wounded.
In Lebanon, 241 marines were killed and 60 wounded in 1983 and Hezbollah runs Lebanon today.
The Bosnian War saw a Serbian out-of-date missile battery shoot down our stealth bomber, a billion of America’s state-of-the-art technology ended up in the hands of the Russians and communist Chinese.
Our military went into Somalia to take out a local warlord and we saw on television the horrific murdering of American warriors in the “Black Hawk Down” fiasco.
The Iraq War cost 4,487 American lives and 32,226 wounded and cost hundreds of billions of dollars. The Afghanistan War has cost a trillion dollars and the lives of 2,235 American military men and women, and 17,700 were wounded.
For what, none of deaths of American military or the wounded have changed these countries into upstanding democracies. The same political, ethnic and religious divisions still exist in the Korean Peninsula, Lebanon, Somalia, Israel, Vietnam, Iraq and Afghanistan that existed before America squandered its treasure and sacrificed the lives of its military men and women.
And now it looks like Syria will be the next fiasco.
Leon Ceniceros
Mesa
Bolivian president’s plane forced to land in Austria in hunt for Snowden
Bolivian president’s plane forced to land in Austria in hunt for Snowden
American tyrants search Bolivian President's plane for Edward Snowden
And I thought my civil rights were violated when the jackbooted
Chandler Police thugs falsely arrested me last week. (See this
URL)
Emperor Obama really is a tyrant who thinks he is above international law and can do whatever he wants to destroy his enemies of which freedom fighter Edward Snowden is one of.
Source
Bolivian president’s plane forced to land in Austria in hunt for Snowden
By Kathy Lally and Juan Forero, Updated: Wednesday, July 3, 8:12 AM E-mail the writers
MOSCOW — Bolivian President Evo Morales’s plane, forced to land in Austria because of suspicions that American fugitive Edward Snowden was on board, was permitted to fly home Wednesday, Bolivian and European authorities said.
The search for Snowden turned into a major diplomatic fiasco, with Bolivia, Venezuela and several other Latin American countries lashing out at the United States and accusing it of having strong-armed European countries into redirecting the official Bolivian presidential plane.
Snowden, who revealed secret U.S. surveillance programs and fled to Hong Kong, then Moscow, to stay beyond American reach, was not aboard the plane, an irate David Choquehuanca, Bolivia’s foreign minister, told reporters after the Bolivian delegation landed in Vienna.
“We don’t know who invented this lie,” he said from Bolivia’s capital, La Paz.
Morales’s plane, ferrying him home from a conference in Moscow, was redirected to Vienna late Tuesday after France and Portugal refused to allow it to enter their airspace, Bolivian and Venezuelan officials said.
Authorities in Austria confirmed that the plane was searched and that Snowden, 30, was not on the flight. There was no indication that he had left Moscow, where he has been in diplomatic limbo for more than a week.
“Our airport staff have checked it over and can assure you that no one is on board who is not a Bolivian citizen,” Austrian Foreign Minister Michael Spindelegger told reporters at the Vienna airport, Reuters news agency reported. He called it a “voluntary examination.” But Morales had told reporters that no Austrians had been on board.
Bolivia’s government responded angrily to the incident. Vice President Alvaro Garcia announced that the ambassadors of France and Italy and the consul for Portugal would be summoned to the Foreign Ministry in La Paz on Wednesday to explain what he called “the abuse” of redirecting Morales’s plane.
He said the representatives of those countries need to explain “these disagreeable, terrible and abusive events.”
The incident also raised the ire of governments and organizations across Latin America, which cast Morales’s troubles as a dire violation against a small country orchestrated by Washington. Even Colombia’s leftist rebel group, the Revolutionary Armed Forces of Colombia (FARC), called the rerouting of the plane “an infamy.”
Jose Miguel Insulza, secretary general of the Organization of American States, which is based in Washington and is made up of governments across the Western Hemisphere, called for an explanation from the European countries that Morales’s government accused of blocking his plane’s flight path.
“Nothing justifies an action of such disrespect from the highest authorities of a country,” said Insulza, who is from Chile.
Choquehuanca said Morales’s plane was an hour from French airspace when it was told it could not enter. “Portugal has to explain to us,” he said. “France has to explain to us why they canceled” flight authorization.
The Portuguese Foreign Ministry said in a statement Wednesday that Portugal informed the Bolivians on Monday afternoon, a full day before Morales’s flight, that it would not allow the Bolivian plane to land in the country for unspecified “technical reasons” but that it would allow an overflight.
The Associated Press reported Wednesday that two officials with the French Foreign Ministry said that Morales’s plane also had authorization to fly over France. They would not comment on why Bolivian officials said otherwise. They spoke on condition of anonymity because they were not authorized to be publicly named, according to ministry policy.
The wire service, citing an unidentified official in Vienna, reported that the flight crew on Morales’s aircraft asked controllers at the Vienna airport for permission to land because the plane needed more fuel to continue its journey.
The aircraft took off from Vienna shortly before noon Wednesday, AP reported. Spain said the plane would be allowed to refuel in the Canary Islands, although a Foreign Ministry official declined to comment on a claim by Bolivia that the permission was contingent on allowing authorities to search the plane, the wire service said.
The White House, CIA and State Department all declined to comment on the situation involving the Bolivian aircraft. But the latest twist seemed to signal that U.S. authorities have been able to marshal support from European countries in what has been a feverish pursuit of the former National Security Agency contractor.
It also underscored how Snowden has settled still deeper into isolation as one country after another has rejected his appeals for asylum since his disclosure of a trove of highly secret documents.
The diverting of Morales’s plane is sure to fan anger against the United States, which is trying to play down new revelations of spying against European allies while trying to win support to corral Snowden even from countries such as Russia, Bolivia and Venezuela, which are sharply at odds with the Obama administration.
Venezuelan Foreign Minister Elias Jaua called the incident over Austria “an attempt on Evo Morales’s life.” He said it was a sign of how far “the empire” — a reference to the United States — and its “lackeys” would go “to hunt down a young man who has only said the truth.”
Bolivia’s defense minister, Ruben Saavedra, who was on the flight, also blamed the United States, telling Bolivian media that “this proves with clarity an attitude of sabotage and plotting by the United States, pressuring European government.” He said that Italy, too, had barred Morales’s plane from its airspace.
For the United States, Bolivia clearly emerged as a possible sanctuary for Snowden, who was stuck in Russia after the United States revoked his passport before his arrival in Moscow on a flight from Hong Kong on June 23.
In an interview earlier Tuesday in Moscow on the state-financed RT news channel, Morales said he would consider asylum for Snowden. “Yes, why not?” he said. “Bolivia is there to welcome personalities who denounce — I don’t know if it’s espionage or control. But we are here.”
After living unseen in the transit zone of Moscow’s Sheremetyevo International Airport for a week, Snowden sent out 19 asylum requests Sunday night, according to WikiLeaks, the anti-secrecy organization that has been advising him. On Monday, Russian President Vladimir Putin said he could stay here if he stopped leaking information harmful to the United States, an odd offer that Snowden refused, a presidential spokesman said Tuesday morning.
That left a list of countries, from Austria to Venezuela, to which Snowden had sent appeals. By Tuesday evening, at least eight of them — including Ecuador and Iceland, which had been asked earlier — had said an applicant must be in the country to be considered. At least three had said no, and others had not replied.
Some countries avoided him out of friendship with the United States, others for political or economic reasons. Ecuador, which at first had appeared enthusiastic, grew less so after Vice President Biden made a call to the president. To be granted asylum, Snowden would have to count on a country to defy the United States. Of those on his list, Bolivia and Venezuela were looking like the best possibilities. Both are hostile to the United States, and the presidents of both countries have heaped praise on Snowden.
Morales, who said his government had not received a formal request for asylum, in 2008 expelled the U.S. ambassador from his country and ended anti-drug cooperation with Washington.
“Bolivia, as well as Venezuela and Ecuador,” he said, “are exposed to constant surveillance from the U.S. empire.”
Venezuela’s president, Nicolás Maduro, was also in Moscow, which had convened a meeting of gas-exporting countries, and Russian media speculated that he would take Snowden to Venezuela on his official plane.
Maduro smiled at that suggestion. “We will take with us numerous agreements on investments in the oil and gas sector,” he said. He defended the former National Security Agency contractor, however, saying that Snowden had neither killed anyone nor planted a bomb and that he deserved protection. “He only told the world a large truth to prevent war,” Maduro said. “The U.S. capitalist elite are trying to control the world and are spying on friends, foes and the entire planet.”
The Obama administration on Tuesday acknowledged contacting foreign governments on Snowden’s asylum list, but a State Department spokeswoman dismissed the leaker’s claims that Washington has mounted a campaign to pressure anyone against offering him sanctuary.
“We have been in touch, as we have been for several days now, with a broad range of countries that could serve as either transit spots or final destinations,” said the spokeswoman, Jennifer Psaki. “And what we’ve been communicating is, of course, what we’ve been communicating publicly — that Mr. Snowden has been accused of leaking classified information. He is somebody that we would like to see returned to the United States.”
Late Tuesday, Maduro was preparing to fly on to Belarus — without Snowden, a member of his entourage told the Interfax news agency. Nothing could be done, the official told Interfax — the Venezuelan plane was at a different airport.
After his nine days in limbo, Snowden’s situation looked desperate. Officials here have portrayed themselves as powerless in the case because Snowden is outside their jurisdiction in the transit zone and needs a passport or other document before he can travel onward, but some Russians find that disingenuous. Russian officials always find a way to do exactly what they want, they say.
And that has raised questions about what is going on behind the scenes. Pavel Felgenhauer, a longtime military analyst and observer of the KGB’s successor, the Federal Security Service, or FSB, offered this speculative scenario: Russia must be trying to see whether it can recruit Snowden.
In an interview Tuesday, Felgenhauer said that when Putin told reporters that Snowden could stay if he stopped talking about the United States, Putin was saying that Snowden had to make a choice. Putin was telling Snowden that he would be working for Russia, not for one of the newspapers publishing his leaks, Felgenhauer said.
The reason Snowden has not been seen is that border guards, who stand at the door when an international flight lands and who work for the FSB, would have hustled him off to a safe room in the airport, or even a safe house elsewhere, Felgenhauer said. Snowden probably did not use a ticket he had to Havana on June 24, the analyst said, because his minders told him the United States would force the Aeroflot flight down when it flew over U.S. territory.
“He’s cornered psychologically,” Felgenhauer said. “You bring the guy to the breaking point to see if he’s real. By now he’s probably afraid of everything, convinced he’ll be hunted down like bin Laden if he leaves here.”
As Felgenhauer put it in a Novaya Gazeta article this week, “Snowden remained in Sheremetyevo like a suitcase with a broken-off handle: a pain to carry and a shame to throw away.”
Forero reported from Bogota, Colombia. Joby Warrick in Washington contributed to this report.
U.S. Postal Service Logging All Mail for Law Enforcement
US Post Office is spying on you for Uncle Sam
Remember all the times we have been told that despite being a government entity the US Postal Service is run like a private business.
That is a big lie. In this article it certainly sounds like the the US Postal Service is a government entity that is helping the FBI, NSA, Homeland Security, CIA, DEA, BATF and other alphabet of police agencies spy on the American public.
Source
U.S. Postal Service Logging All Mail for Law Enforcement
By RON NIXON
Published: July 3, 2013
WASHINGTON — Leslie James Pickering noticed something odd in his mail last September: A handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home.
“Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green.
“It was a bit of a shock to see it,” said Mr. Pickering, who owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. Postal officials subsequently confirmed they were indeed tracking Mr. Pickering’s mail but told him nothing else.
As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service.
Mr. Pickering was targeted by a longtime surveillance system called mail covers, but that is only a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images.
Together, the two programs show that snail mail is subject to the same kind of scrutiny that the National Security Agency has given to telephone calls and e-mail.
The mail covers program, used to monitor Mr. Pickering, is more than a century old but is still considered a powerful tool. At the request of law enforcement officials, postal workers record information from the outside of letters and parcels before they are delivered. (Actually opening the mail requires a warrant.) The information is sent to whatever law enforcement agency asked for it. Tens of thousands of pieces of mail each year undergo this scrutiny.
The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001 that killed five people, including two postal workers. Highly secret, it seeped into public view last month when the F.B.I. cited it in its investigation of ricin-laced letters sent to President Obama and Mayor Michael R. Bloomberg. It enables the Postal Service to retroactively track mail correspondence at the request of law enforcement. No one disputes that it is sweeping.
“In the past, mail covers were used when you had a reason to suspect someone of a crime,” said Mark D. Rasch, the former director of the Justice Department’s computer crime unit, who worked on several fraud cases using mail covers. “Now it seems to be ‘Let’s record everyone’s mail so in the future we might go back and see who you were communicating with.’ Essentially you’ve added mail covers on millions of Americans.”
Bruce Schneier, a computer security expert and an author, said whether it was a postal worker taking down information or a computer taking images, the program was still an invasion of privacy.
“Basically they are doing the same thing as the other programs, collecting the information on the outside of your mail, the metadata, if you will, of names, addresses, return addresses and postmark locations, which gives the government a pretty good map of your contacts, even if they aren’t reading the contents,” he said.
But law enforcement officials said mail covers and the automatic mail tracking program are invaluable, even in an era of smartphones and e-mail.
In a criminal complaint filed June 7 in Federal District Court in Eastern Texas, the F.B.I. said a postal investigator tracing the ricin letters was able to narrow the search to Shannon Guess Richardson, an actress in New Boston, Tex., by examining information from the front and back images of 60 pieces of mail scanned immediately before and after the tainted letters sent to Mr. Obama and Mr. Bloomberg showing return addresses near her home. Ms. Richardson had originally accused her husband of mailing the letters, but investigators determined that he was at work during the time they were mailed.
In 2007, the F.B.I., the Internal Revenue Service and the local police in Charlotte, N.C., used information gleaned from the mail cover program to arrest Sallie Wamsley-Saxon and her husband, Donald, charging both with running a prostitution ring that took in $3 million over six years. Prosecutors said it was one of the largest and most successful such operations in the country. Investigators also used mail covers to help track banking activity and other businesses the couple operated under different names.
Other agencies, including the Drug Enforcement Administration and the Department of Health and Human Services, have used mail covers to track drug smugglers and Medicare fraud.
“It’s a treasure trove of information,” said James J. Wedick, a former F.B.I. agent who spent 34 years at the agency and who said he used mail covers in a number of investigations, including one that led to the prosecution of several elected officials in California on corruption charges. “Looking at just the outside of letters and other mail, I can see who you bank with, who you communicate with — all kinds of useful information that gives investigators leads that they can then follow up on with a subpoena.”
But, he said: “It can be easily abused because it’s so easy to use and you don’t have to go through a judge to get the information. You just fill out a form.”
For mail cover requests, law enforcement agencies simply submit a letter to the Postal Service, which can grant or deny a request without judicial review. Law enforcement officials say the Postal Service rarely denies a request. In other government surveillance program, such as wiretaps, a federal judge must sign off on the requests.
The mail cover surveillance requests are granted for about 30 days, and can be extended for up to 120 days. There are two kinds of mail covers: those related to criminal activity and those requested to protect national security. The criminal activity requests average 15,000 to 20,000 per year, said law enforcement officials who spoke on the condition of anonymity because they are prohibited by law from discussing the requests. The number of requests for antiterrorism mail covers has not been made public.
Law enforcement officials need warrants to open the mail, although President George W. Bush asserted in a signing statement in 2007 that the federal government had the authority to open mail without warrants in emergencies or foreign intelligence cases.
Court challenges to mail covers have generally failed because judges have ruled that there is no reasonable expectation of privacy for information contained on the outside of a letter. Officials in both the George W. Bush and Obama administrations, in fact, have used the mail-cover court rulings to justify the N.S.A.’s surveillance programs, saying the electronic monitoring amounts to the same thing as a mail cover. Congress briefly conducted hearings on mail cover programs in 1976, but has not revisited the issue.
The program has led to sporadic reports of abuse. In May 2012, Mary Rose Wilcox, a Maricopa County supervisor, was awarded nearly $1 million by a federal judge after winning a lawsuit against Sheriff Joe Arpaio, known for his immigration raids in Arizona, who, among other things, obtained mail covers from the Postal Service to track her mail. The judge called the investigation into Ms. Wilcox politically motivated because she had been a frequent critic of Mr. Arpaio, objecting to what she considered the targeting of Hispanics in his immigration sweeps. The case is being appealed.
In the mid-1970s the Church Committee, a Senate panel that documented C.I.A. abuses, faulted a program created in the 1950s in New York that used mail covers to trace and sometimes open mail going to the Soviet Union from the United States.
A suit brought in 1973 by a high school student in New Jersey, whose letter to the Socialist Workers Party was traced by the F.B.I. as part of an investigation into the group, led to a rebuke from a federal judge.
Postal officials refused to discuss either mail covers or the Mail Isolation Control and Tracking program.
Mr. Pickering says he suspects that the F.B.I. requested the mail cover to monitor his mail because a former associate said the bureau had called with questions about him. Last month, he filed a lawsuit against the Postal Service, the F.B.I. and other agencies, saying they were improperly withholding information.
A spokeswoman for the F.B.I. in Buffalo declined to comment.
Mr. Pickering said that although he was arrested two dozen times for acts of civil disobedience and convicted of a handful of misdemeanors, he was never involved in the arson attacks the Earth Liberation Front carried out. He said he became tired of focusing only on environmental activism and moved back to Buffalo to finish college, open his bookstore, Burning Books, and start a family.
“I’m no terrorist,” he said. “I’m an activist.”
Mr. Pickering has written books sympathetic to the liberation front, but he said his political views and past association should not make him the target of a federal investigation. “I’m just a guy who runs a bookstore and has a wife and a kid,” he said.
Web’s Reach Binds N.S.A. and Silicon Valley Leaders
I suspect that Google gives ALL the data it's search engine cataloging robots find on the web to the Feds.
When you create a web page and you want to keep the information private from the world you can put a tag like this in the HTML
<META name="ROBOTS" CONTENT="NOINDEX, NOFOLLOW">
That tag tells the robots that Google and other search engine vendors sent out not to copy the information from that web page into it's database.
I suspect when Google's robots gather information for the local police, FBI, Homeland Security, TSA, DEA, BATF and other alphabet soup of Federal police forces that the robots ignore the meta tag.
Or perhaps they do honor the meta tag for the information they allow the general public to search for, but give ALL the information to the American police state.
Also I have also wondered if Google's robots index and catalog the comments put on their web pages. Browsers don't display the comments in web pages but are used to document the web pages by programmers and web masters.
I suspect Google's robots index and catalog the comments in web pages and give them to Uncle Sam's spies at the NSA and other Federal agencies.
Last I suspect that NSA or other Federal agencies now has their own robots that routinely scan the internet like Google's robots do.
I know on several of my web pages I get a daily visit or two from several IP addresses in Shady Side, Maryland (76.114.149.166 and 76.114.145.234) which I suspect is a government agency spying on me. Also I get visits from several other IP address, on a less frequent basis which I also suspect are police agencies spying on me. Maybe that Shady Grove, Maryland. I always get the names mixed up.
You can put a sign on your yard and home that says
"No Trespassing"
while most cops arrogantly think they are above the law and ignore signs like that I suspect signs might have a legal basis to keep the police criminals from using evidence against you that they obtained illegally when trespassing on your property.
I wonder if you could put a sign like that you your web pages that said something like
"Police keep out - No trespassing"
Sure the crooked cops will ignore the signs, but I wonder could the signs keep the police who from using any evidence they obtained on you web page against you or other people??? I don't know. I am just throwing out a question.
Source
Web’s Reach Binds N.S.A. and Silicon Valley Leaders
By JAMES RISEN and NICK WINGFIELD
Published: June 19, 2013
WASHINGTON — When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency.
Spy agencies invest in Silicon Valley start-ups, award classified contracts and recruit technology experts like Max Kelly.
Mr. Kelly’s move to the spy agency, which has not previously been reported, underscores the increasingly deep connections between Silicon Valley and the agency and the degree to which they are now in the same business. Both hunt for ways to collect, analyze and exploit large pools of data about millions of Americans.
The only difference is that the N.S.A. does it for intelligence, and Silicon Valley does it to make money.
The disclosure of the spy agency’s program called Prism, which is said to collect the e-mails and other Web activity of foreigners using major Internet companies like Google, Yahoo and Facebook, has prompted the companies to deny that the agency has direct access to their computers, even as they acknowledge complying with secret N.S.A. court orders for specific data.
Yet technology experts and former intelligence officials say the convergence between Silicon Valley and the N.S.A. and the rise of data mining — both as an industry and as a crucial intelligence tool — have created a more complex reality.
Silicon Valley has what the spy agency wants: vast amounts of private data and the most sophisticated software available to analyze it. The agency in turn is one of Silicon Valley’s largest customers for what is known as data analytics, one of the valley’s fastest-growing markets. To get their hands on the latest software technology to manipulate and take advantage of large volumes of data, United States intelligence agencies invest in Silicon Valley start-ups, award classified contracts and recruit technology experts like Mr. Kelly.
“We are all in these Big Data business models,” said Ray Wang, a technology analyst and chief executive of Constellation Research, based in San Francisco. “There are a lot of connections now because the data scientists and the folks who are building these systems have a lot of common interests.”
Although Silicon Valley has sold equipment to the N.S.A. and other intelligence agencies for a generation, the interests of the two began to converge in new ways in the last few years as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data — at the same time that the value of the data for use in consumer marketing began to rise. “These worlds overlap,” said Philipp S. Krüger, chief executive of Explorist, an Internet start-up in New York.
The sums the N.S.A. spends in Silicon Valley are classified, as is the agency’s total budget, which independent analysts say is $8 billion to $10 billion a year.
Despite the companies’ assertions that they cooperate with the agency only when legally compelled, current and former industry officials say the companies sometimes secretly put together teams of in-house experts to find ways to cooperate more completely with the N.S.A. and to make their customers’ information more accessible to the agency. The companies do so, the officials say, because they want to control the process themselves. They are also under subtle but powerful pressure from the N.S.A. to make access easier.
Skype, the Internet-based calling service, began its own secret program, Project Chess, to explore the legal and technical issues in making Skype calls readily available to intelligence agencies and law enforcement officials, according to people briefed on the program who asked not to be named to avoid trouble with the intelligence agencies.
Project Chess, which has never been previously disclosed, was small, limited to fewer than a dozen people inside Skype, and was developed as the company had sometimes contentious talks with the government over legal issues, said one of the people briefed on the project. The project began about five years ago, before most of the company was sold by its parent, eBay, to outside investors in 2009. Microsoft acquired Skype in an $8.5 billion deal that was completed in October 2011.
A Skype executive denied last year in a blog post that recent changes in the way Skype operated were made at the behest of Microsoft to make snooping easier for law enforcement. It appears, however, that Skype figured out how to cooperate with the intelligence community before Microsoft took over the company, according to documents leaked by Edward J. Snowden, a former contractor for the N.S.A. One of the documents about the Prism program made public by Mr. Snowden says Skype joined Prism on Feb. 6, 2011.
Microsoft executives are no longer willing to affirm statements, made by Skype several years ago, that Skype calls could not be wiretapped. Frank X. Shaw, a Microsoft spokesman, declined to comment.
In its recruiting in Silicon Valley, the N.S.A. sends some of its most senior officials to lure the best of the best. No less than Gen. Keith B. Alexander, the agency’s director and the chief of the Pentagon’s Cyber Command, showed up at one of the world’s largest hacker conferences in Las Vegas last summer, looking stiff in an uncharacteristic T-shirt and jeans, to give the keynote speech. His main purpose at Defcon, the conference, was to recruit hackers for his spy agency.
N.S.A. badges are often seen on the lapels of officials at other technology and information security conferences. “They’re very open about their interest in recruiting from the hacker community,” said Jennifer Granick, the director of civil liberties at Stanford Law School’s Center for Internet and Society.
But perhaps no one embodies the tightening relationship between the N.S.A. and the valley more than Kenneth A. Minihan.
A career Air Force intelligence officer, Mr. Minihan was the director of the N.S.A. during the Clinton administration until his retirement in the late 1990s, and then he ran the agency’s outside professional networking organization. Today he is managing director of Paladin Capital Group, a venture capital firm based in Washington that in part specializes in financing start-ups that offer high-tech solutions for the N.S.A. and other intelligence agencies. In effect, Mr. Minihan is an advanced scout for the N.S.A. as it tries to capitalize on the latest technology to analyze and exploit the vast amounts of data flowing around the world and inside the United States.
The members of Paladin’s strategic advisory board include Richard C. Schaeffer Jr., a former N.S.A. executive. While Paladin is a private firm, the American intelligence community has its own in-house venture capital company, In-Q-Tel, financed by the Central Intelligence Agency to invest in high-tech start-ups.
Many software technology firms involved in data analytics are open about their connections to intelligence agencies. Gary King, a co-founder and chief scientist at Crimson Hexagon, a start-up in Boston, said in an interview that he had given talks at C.I.A. headquarters in Langley, Va., about his company’s social media analytics tools.
The future holds the prospect of ever greater cooperation between Silicon Valley and the N.S.A. because data storage is expected to increase at an annual compound rate of 53 percent through 2016, according to the International Data Corporation.
“We reached a tipping point, where the value of having user data rose beyond the cost of storing it,” said Dan Auerbach, a technology analyst with the Electronic Frontier Foundation, an electronic privacy group in San Francisco. “Now we have an incentive to keep it forever.”
Social media sites in the meantime are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own. “You willingly hand over data to Facebook that you would never give voluntarily to the government,” said Bruce Schneier, a technologist and an author.
James Risen reported from Washington, and Nick Wingfield from Seattle. Kitty Bennett contributed reporting.
Kyrsten Sinema shovels the BS???
Remember Kyrsten Sinema
is the Arizona Senator who introduced a 300 percent tax on medical marijuana.
Kyrsten Sinema
is now a US Congresswoman.
I guess the title of this article should have been "Vote for me and I will give you free stuff"
Source
Into the mind of ... Kyrsten Sinema
The Republic | azcentral.com Fri Jul 5, 2013 6:27 PM
The first-term congresswoman reflects on her first six months in Washington.
After six months in Congress, what’s the No. 1 thing you’ve learned about the place?
I’ve learned I can still get a lot done for Congressional District 9 even though leaders in Congress aren’t accomplishing much.
In our district office, social workers help constituents solve problems every day. In our D.C. office, we help businesses access federal agencies, support local groups seeking federal grant funding, and advocate for the issues important to CD9 residents and businesses.
What’s the biggest difference between the Legislature and Congress?
I’ve always believed that relationships are key to solving problems.
In the Legislature, my relationships with Republicans and Democrats alike helped me serve my constituents well. In Congress, I’m working to build bipartisan relationships as well, though it’ll take a bit longer to make friends with all 537 of my colleagues!
What’s the biggest frustration? The biggest satisfaction?
Unfortunately, issues that shouldn’t be partisan, like military sexual trauma and college affordability, have been stymied by political posturing in Congress. Leaders in Congress should stop playing games and get to work solving our country’s challenges.
However, our office has been able to make a tremendous difference in the lives of CD9 residents.
For example, we recently helped Glen in Phoenix, who has a brain tumor. Last month, Glen had to choose to either buy expensive medicine to treat his tumor or buy a replacement bed for his home.
We worked with local charities and the pharmaceutical company to help him get both a bed and his life-saving medication.
As a member of the minority party, it’s hard to get a bill passed. What have you been able to accomplish?
Congress is pretty divided right now and sadly, they’re not getting much done.
I’m proud to be one of the founding members of the United Solutions Caucus. We’re a group of 38 freshmen, Democrats and Republicans, working together to solve our fiscal crisis and reduce our debt and deficit.
We’ve introduced the SAVE Act, which cuts $200 billion in wasteful spending. Earlier this year, I helped pass the Violence Against Women Act.
Are there any issues you’re working on with other Arizona members?
I’m working with Reps. Matt Salmon and Raul Grijalva on a bill to prevent the NSA from gathering innocent civilians’ private data.
Reps. Ron Barber, Ann Kirkpatrick and I are working on legislation to help veterans get quicker and better access to VA services.
You and Salmon, a Republican, have made several joint appearances. What’s the connection?
Our offices work closely together on constituent cases, and Matt and I share similar views on issues like global competitiveness, increasing foreign investment in Arizona companies, and increasing trade and exports. Plus, he’s a good guy and we get along.
What will immigration reform look like when the House is finished with it?
It’s too early to predict, but I’m committed to a bill that secures our border
,
creates a workable plan for a future flow of workers into the United States, and settles the status of “dreamers” and hard-working families living in the U.S. Compromise must be a part of any viable solution, and I hope the House is ready to get to “yes.” I certainly am!
Critics of immigration bill say pork was added
A government welfare program for police officers???
Think of it as a government welfare program for police departments, a welfare program for corporations in the military industrial complex and a jobs program for cops.
The bill hires 20,000 NEW BP cops, increasing the number of cops in the Border Patrol from 20,000 to 40,000
Source
Critics of immigration bill say pork was added
By Dan Nowicki The Republic | azcentral.com Fri Jul 5, 2013 11:23 PM
As debate rages over the sweeping immigration-reform package passed last month by the Senate, critics of the bill are accusing its backers of adding pork-barrel giveaways to win votes, an age-old complaint about Capitol Hill lawmaking.
They’re calling a provision that benefits Alaska’s fishing industry “the Alaska Seafood Special,” singling out its aid for Las Vegas tourism, and denigrating billions in border-security enhancements in southern Arizona as pork for Sens. John McCain and Jeff Flake.
One politician’s pork, however, is another’s prudent or even essential spending.
Backers of the bipartisan “Gang of Eight” bill say this line of attack is an attempt to paint it as a rerun of President Barack Obama’s controversial health-care overhaul of 2010, which remains infamous in Republican circles for parochial provisions such as the so-called “Cornhusker Kickback” inserted at the behest of then-Sen. Ben Nelson, D-Neb.
Supporters say, for example, that it is unfair to portray the bill’s $46.3 billion in border-security measures as pork because that spending relates directly to a central responsibility of the federal government.
Any backroom deal-making, they say, is minor by historical standards.
Still, the criticism has put McCain and Flake — Arizona Republicans with reputations as two of Capitol Hill’s fiercest foes of earmarks and wasteful spending — in the awkward position of defending the legislation against charges of pork. McCain and Flake were two of the Gang of Eight’s four Republican members and helped negotiate the bipartisan compromise, which would provide a pathway to citizenship for many of the estimated 11 million undocumented immigrants already settled in the United States.
“Let’s be honest: There was some of the old-style politics,” Flake told The Arizona Republic. “I can tell you, though, I’ve been around this process, and it’s very rare that you get a bill that is this all-encompassing with so few parochial provisions like that.”
Questioned provisions
The landmark immigration bill, which the Senate passed June 27 on a 68-32 vote, picked up support last month after its proposed spending on U.S.-Mexican border security was dramatically increased.
An amendment by Republican Sens. John Hoeven of North Dakota and Bob Corker of Tennessee would add, among other things, 350 miles of pedestrian fencing to the 350 miles already in place on the border and nearly double the number of U.S. Border Patrol agents, from about 20,000 to 40,000.
The bill also orders the purchase of certain kinds of border technology and equipment, such as certain makes and models of the Sikorsky Aircraft Corp.’s Black Hawk helicopter, leaving Homeland Security Secretary Janet Napolitano with limited flexibility to choose alternatives.
Sen. Patrick Leahy, D-Vt., quipped on the Senate floor that “there are federal contracting firms high-fiving at the prospect of all of the spending.”
Other parochial additions also have drawn scrutiny. Sens. Lisa Murkowski, R-Alaska, and Mark Begich, D-Alaska, pressed for and received special consideration for the Alaska seafood industry. The legislation identifies fish-processing in the state as a “shortage occupation,” giving it an advantage under the bill’s proposed new W-Visa program for lesser-skilled workers.
“We might as well call this the Alaska Seafood Special,” said Sen. John Cornyn, R-Texas, a critic of the Alaska provision and the overall immigration bill.
In a written statement, Begich said he and Murkowski worked together “to make sure this bill protects Alaska seafood processors by ensuring a steady source of seasonal staffing in order to keep our Alaska economy strong.”
Attention also has focused on a $1.5 billion, two-year job program for unemployed 16- to 24-year-olds that Sen. Bernie Sanders, I-Vt., got included in the immigration bill.
Opponents characterized it as more ill-advised spending reminiscent of Obama’s 2009 economic-stimulus package.
Flake said the Sanders program is paid for by revenue generated by the bill.
Senate Majority Leader Harry Reid, D-Nev., an immigration-reform supporter, got funding extended for national travel-promotion efforts that benefit Las Vegas.
Other items in the legislation have been linked to Gang of Eight members.
Republican Sen. Lindsey Graham secured more visas for the meat industry in his home state of South Carolina; and Sens. Marco Rubio, R-Fla., and Michael Bennet, D-Colo., made sure the cruise-ship and ski industries important to their respective home states also received special consideration under the bill’s new visa system.
In an interview, McCain said he doesn’t view the immigration bill as containing any traditional pork. Some of the provisions that have drawn criticism were attempts to fairly address bona fide needs of unique labor forces, he said.
“There may have been a little of that (parochialism and making deals for votes), but overall, they were legitimate requirements,” McCain told The Republic. “Honestly, I was not involved in any of that, because of my principles. But, for example, the Alaska one was sold to me based on the unique circumstances concerning them. Then, there were a couple of other provisions that had to do with groups of unique people.”
‘It’s not pork’
Cornyn, the Senate minority whip, decried the bill as “a litany of de facto earmarks, carve-outs and pet spending initiatives” and seemed to suggest that McCain and Flake were hypocrites for accepting $250 million to boost immigration-related prosecutions in the Border Patrol’s Tucson Sector in Arizona.
“There are nine Border Patrol sectors, but the Tucson Sector is the surprise beneficiary of $250 million in a special earmark in this bill,” Cornyn said on the Senate floor.
“I would just ask the simple question: Don’t all of the border sectors need increased funding for prosecutions? Well, I believe the answer is yes, and so carving out the Tucson Sector for special treatment, I believe, is entirely inappropriate. So, we see that even longtime opponents of earmarks are now co-sponsoring legislation that is filled with de facto earmarks, including one that benefits their states alone.”
McCain and Flake flatly rejected the argument that the border measures are pork for Arizona. The two have long stressed that the Tucson Sector is the nation’s busiest for undocumented immigration and covers the part of the border most in need of attention.
“It’s the federal government’s responsibility to secure the border, and these appropriations and the items that are put on the border are to fulfill that purpose,” said Flake, who while serving in the House was instrumental in enacting a moratorium on earmarks. “It’s not pork.”
Steve Ellis, vice president of the budget watchdog group Taxpayers for Common Sense, agreed that the Senate-passed flood of border spending, although it may be overkill, doesn’t fit the classic definitions of earmarks or pork. However, the makers of the bill’s mandated technology, such as Northrop Grumman Corp.’s Vehicle and Dismount Exploitation Radar, or VADER system, clearly would come out as big winners if the bill became law, he said.
The bill would require the purchase of six VADER systems, which rely on aerial drones, at an estimated total price of $55.8 million.
“This isn’t really being done by Corker and Hoeven to benefit their constituents, per se,” Ellis said. “They’re not bringing back the bacon to Tennessee and North Dakota.”
‘It’s political cover’
But Mark Krikorian, executive director of the Center for Immigration Studies, which opposes the bill, suggested that the border-security amendment is a different kind of payoff for senators. The Washington, D.C.-based center backs more enforcement and overall reductions in immigration.
“They were buying votes there, too, but in a different way,” Krikorian said. “This was so Corker and Hoeven and a couple of others could posture about how tough they are on border security. In other words, it’s political cover.”
Other provisions clearly were intended to win over specific senators, such as the Alaska one critics have been calling the “Crab-husker Kickback” and “the Alaska Purchase,” Krikorian said.
“When you have a 1,200-page bill, it’s going to be full of that kind of junk,” he said.
“The amnesty bill is based on these kinds of corrupt bargains. There’s really no other way to put it.”
Immigrant-rights advocates, who support the bill even though they believe its border-security elements are excessive, aren’t buying the pork criticism.
Foes of the bill, which still must pass the Republican-controlled House in some form, are trying to fuel conservative skepticism by emphasizing the legislation’s length, as Krikorian did, and claiming it is stuffed with sweetheart deals, said Frank Sharry, executive director of the pro-reform organization America’s Voice.
“They’re doing everything they can to equate this bill to ‘Obamacare,’ ” Sharry said. “It’s such a tired strategy.”
Android security flaw gives Homeland Security easy access to your phone????
Android security flaw gives Homeland Security easy access to your phone????
Android security flaw gives NSA, CIA, Homeland Security, FBI, BATF, DEA, TSA, IRS, ICE, La Migra, ATF and a whole slew of other alphabet police agencies easy access to your phone????
Source
Android security flaw affects 99 percent of phones, researcher says
By Hayley Tsukayama, Published: July 5 E-mail the writer
Security researchers believe they have found a major security flaw in the Google’s Android mobile operating system, which could affect up to 99 percent of Android phones now in consumers’ hands.
In results published Wednesday by the Bluebox Security research firm, chief technology officer Jeff Forristal said the flaw gave hackers a “master key” into the Android system.
Google declined to comment on the report.
The problem lies in the security verification process that has been used on the Google Play applications store since the release of Android 1.6. It could leave up to 900 million devices open to hackers. The flaw, the research firm said, is a weakness in the way that Android applications verify changes to their code. The weakness would allow hackers to “turn any legitimate application into a malicious Trojan” without flagging the attention of Google’s app store, a mobile phone or the person using an application.
The result, researchers said, would be that anyone who breaks into an app this way would have access to the data that app collects and — if an app made by the device manufacturer gets exploited — could even “take over normal functioning of a phone.”
In the post, Forristal said that Bluebox reported the security flaw to Google in February. In an interview with CIO, he said that some manufacturers have already released fixes for the problem, specifically naming the Samsung Galaxy S4.
Security is a common concern on Android phones, in part because the open nature of the system also means that it’s easy for anyone to find out how it works. Android is the OS of choice for 75 percent of the world’s smartphones, IDC reported in May. But a report released in March from the F-Secure security firm found that 79 percent of all mobile malware found in 2012 was running on Android phones.
This problem is exacerbated by the fact that so many smartphone manufacturers use their own versions of the Android operating system, making it more difficult to get system updates that may include security fixes out to customers.
Related stories:
As smartphone market matures, makers race to wow consumers
‘Fragmentation’ leaves Android phones vulnerable to hackers, scammers
Majority of mobile malware on Android phones, security firm says
Sign up today to receive #thecircuit, a daily roundup of the latest tech policy news from Washington and how it is shaping business, entertainment and science.
Lincoln’s Surveillance State
President Lincoln was reading our telegraphs????
President Lincoln was reading our telegraphs????
Don't laugh, at the time it was considered a high-tech police state.
Source
Lincoln’s Surveillance State
By DAVID T. Z. MINDICH
Published: July 5, 2013
COLCHESTER, Vt. — BY leaking details of the National Security Agency’s data-mining program, Edward J. Snowden revealed that the government’s surveillance efforts were far more extensive than previously understood. Many commentators have deemed the government’s activities alarming and unprecedented. The N.S.A.’s program is indeed alarming — but not, from a historical perspective, unprecedented. And history suggests that we should worry less about the surveillance itself and more about when the war in whose name the surveillance is being conducted will end.
In 1862, after President Abraham Lincoln appointed him secretary of war, Edwin M. Stanton penned a letter to the president requesting sweeping powers, which would include total control of the telegraph lines. By rerouting those lines through his office, Stanton would keep tabs on vast amounts of communication, journalistic, governmental and personal. On the back of Stanton’s letter Lincoln scribbled his approval: “The Secretary of War has my authority to exercise his discretion in the matter within mentioned.”
I came across this letter in the 1990s in the Library of Congress while researching Stanton’s wartime efforts to control the press, which included censorship, intimidation and extrajudicial arrests of reporters. On the same day he received control of the telegraphs, Stanton put an assistant secretary in charge of two areas: press relations and the newly formed secret police. Stanton ultimately had dozens of newspapermen arrested on questionable charges. Within Stanton’s first month in office, a reporter for The New York Herald, who had insisted that he be given news ahead of other reporters, was arrested as a spy.
Having the telegraph lines running through Stanton’s office made his department the nexus of war information; Lincoln visited regularly to get the latest on the war. Stanton collected news from generals, telegraph operators and reporters. He had a journalist’s love of breaking the story and an autocrat’s obsession with information control. He used his power over the telegraphs to influence what journalists did or didn’t publish. In 1862, the House Judiciary Committee took up the question of “telegraphic censorship” and called for restraint on the part of the administration’s censors.
When I first read Stanton’s requests to Lincoln asking for broad powers, I accepted his information control as a necessary evil. Lincoln was fighting for a cause of the utmost importance in the face of enormous challenges. The benefits of information monitoring, censorship and extrajudicial tactics, though disturbing, were arguably worth their price.
But part of the reason this calculus was acceptable to me was that the trade-offs were not permanent. As the war ended, the emergency measures were rolled back. Information — telegraph and otherwise — began to flow freely again.
So it has been with many wars: a cycle of draconian measures followed by contraction. During the First World War, the Supreme Court found that Charles T. Schenck posed a “clear and present danger” for advocating opposition to the draft; later such speech became more permissible. During the Second World War, habeas corpus was suspended several times — most notably in Hawaii after the Pearl Harbor attack — but afterward such suspensions became rare.
This is why, if you are a critic of the N.S.A.’s surveillance program, it is imperative that the war on terror reach its culmination. In May, President Obama declared that “this war, like all wars, must end.” If history is any guide, ending the seemingly endless state of war is the first step in returning our civil liberties.
Until then, we will continue to see acts of governmental overreach that would make even Stanton blush. “I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge or even the President, if I had a personal e-mail,” Mr. Snowden told The Guardian. And unlike Stanton’s telegraph operation, which housed just a handful of telegraphers, the current national security apparatus is huge. An estimated 483,000 government contractors had top-secret security clearances in 2012. That’s a lot of Snowdens to trust with your information.
David T. Z. Mindich, a professor of media studies, journalism and digital arts at Saint Michael’s College, is the author of “Tuned Out: Why Americans Under 40 Don’t Follow the News.”
Arizona court ruling upholds DUI test for marijuana
Even thought the article is dated Feb 14, I saw this in a free magazine
I found on Mill Avenue last night called "Cannabis TimesOnline.com"
Source
Arizona court ruling upholds DUI test for marijuana
Posted on February 14, 2013 by admin
Associated Press Wed Feb 13, 2013 5:10 PM
PHOENIX — An appeals court has issued a ruling that upholds the right of authorities to prosecute pot smokers in Arizona for driving under the influence even when there is no evidence that they are actually high.
The ruling by the Court of Appeals focuses on the chemical compounds in marijuana that show up in blood and urine tests after people smoke pot. One chemical compound causes drivers to be impaired; another is a chemical that stays in people’s systems for weeks after they’ve smoked marijuana but doesn’t affect impairment.
The court ruled that both compounds apply to Arizona law, meaning a driver doesn’t have to actually be impaired to get prosecuted for DUI. As long as there is evidence of marijuana in their system, they can get a DUI, the court said.
The ruling overturns a decision by a lower court judge who said it didn’t make sense to prosecute a person with no evidence they’re under the influence.
The lower court judge cited the proliferation of states easing their marijuana laws, but the Court of Appeals ruling issued Tuesday dismissed that by saying Arizona’s medical marijuana law is irrelevant regarding DUI.
The Legislature adopted the decades-old comprehensive DUI law to protect public safety, so a provision on prohibited substances and their resulting chemical compounds should be interpreted broadly to include inactive compounds as well as active ones, the Court of Appeals said.
The case stems from a 2010 traffic stop in Maricopa County. The motorist’s blood test revealed only a chemical compound that is found in the blood after another compound produced from ingesting marijuana breaks down.
According to testimony by a prosecution criminalist, the compound found in the man’s blood doesn’t impair the ability to drive but can remain detectable for four weeks.
The man’s lawyer argued Arizona’s DUI law bars only marijuana and “its metabolite,” so only the first derivative compound that actually impairs drivers is prohibited.
Two lower court judges agreed, with one upholding the other’s dismissal of the case against the motorist, Hrach Shilgevorkyan.
Superior Court Commissioner Myra Harris’ ruling noted that several states have decriminalized pot, and that a growing number of states, including Arizona, have legalized medical marijuana.
“Residents of these states, particularly those geographically near Arizona, are likely to travel to Arizona,” Harris said in her 2012 ruling upholding the dismissal. “It would be irrational for Arizona to prosecute a defendant for an act that might have occurred outside of Arizona several weeks earlier.”
However, the Court of Appeals sided with prosecutors who appealed, saying that allowing the testing for marijuana’s active compound would unduly restrict law enforcement.
The ruling said it serves the Legislature’s intention to have a flat ban on driving under the influence to interpret the DUI law’s reference to a prohibited substance and “its metabolite” as covering both a substance’s active and inactive compounds.
Michael Alarid III, a lawyer for Shilgevorkyan, said he’ll ask the Arizona Supreme Court to consider an appeal.
He added the testing issue is increasingly important because people legally using pot in two Western states — Washington and Colorado — that last year approved marijuana decriminalization laws could be convicted of DUI if arrested while driving in Arizona weeks later.
Feds planned to arm drones
Feds to murder dope dealers & Mexicans with drones????
Feds planned to arm drones
Feds to murder dope dealers & Mexicans with drones????
I have posted a number of articles where I made snide comments like "I wonder when the police will start using drone air strikes on American soil to murder drug dealers and blow up suspect drug houses"
Looks like that part of the American police state could be just around the corner.
Sadly the Feds may also use drones against brown skinned folks who sneak across the border too.
Here is a quote from the article:
"According to the document, titled 'Concept of Operations for CBP’s Predator B Unmanned Aircraft System,' the weapons would be used against “targets of interest,” described as people or vehicles carrying smugglers or undocumented migrants"