Tag: law

CISPA IS Dead, For Now

Cross posted from The Stars Hollow Gazette

CISPA Kitty photo blog_cispacat_zps96b502e5.jpgThe Senate will not vote on the Cyber Intelligence Sharing and Protection Act, CISPA, that was passed by the House last week.

Sen. Jay Rockefeller (D-W.V.), who is chairman of the Senate Commerce Committee, “believes that information sharing is a key component of cybersecurity legislation, but the Senate will not take up CISPA,” a committee staffer told HuffPost.

A staffer for the Senate Intelligence Committee said the committee also is working on an information-sharing bill and will not take up CISPA.

“We are currently drafting a bipartisan information sharing bill and will proceed as soon as we come to an agreement,” Sen. Dianne Feinstein (D-Calif.), chairwoman of the Senate Intelligence Committee, said in a statement Thursday.

CISPA Is ‘Dead for Now,’ Thanks to a Left-Right Coalition for Online Privacy

by John Nichols, The Nation

What brings the most seriously libertarian Republican in the US House, Michigan’s Justin Amash, together with Congressional Progressive Caucus co-chair Keith Ellison, D-Minnesota?

What unites long-time Ronald Reagan aide Dana Rohrabacher, R-California, with liberal firebrand Alan Grayson, D-Florida?

What gets steadily conservative former House Judiciary Committee chair James Sensenbrenner, R-Wisconsin, together with progressive former House Judiciary Committee chair John Conyers Jr., D-Michigan?

The Fourth Amendment to the Constitution, which has for 222 years promised that “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

That’s an old commitment that members of Congress swear an oath to uphold. [..]

CISPA actually won 288 “yes” votes in the House, but the 127 “no” votes-coming from principled members on both sides of the aisle-sent a strong message to the more deliberative Senate. In combination with a grassroots campaign spearheaded by tech-savvy privacy activists and a threatened veto by President Obama, the bipartisan House opposition appears to have convinced Senate leaders have signaled that they plan to put the legislation on hold. The American Civil Liberties Union on Thursday suggestion that CISPA looks to be “dead for now.”

ACLU: CISPA Is Dead (For Now)

By Jason Koebler, US News

The Senate will not take up the controversial cybersecurity bill, is drafting separate legislation

“I think it’s dead for now,” says Michelle Richardson, legislative council with the ACLU. “CISPA is too controversial, it’s too expansive, it’s just not the same sort of program contemplated by the Senate last year. We’re pleased to hear the Senate will probably pick up where it left off last year.”

That’s not to say Congress won’t pass any cybersecurity legislation this year. Both Rockefeller and President Obama want to give American companies additional tools to fight back against cyberattacks from domestic and foreign hackers.

But cybersecurity legislation in the Senate, such as the Cybersecurity and American Cyber Competitiveness Act of 2013, has greater privacy protections than CISPA does. Richardson says that bill makes it clear that companies would have to “pull out sensitive data [about citizens]” before companies send it to the government and also puts the program under “unequivocal civilian control,” something CISPA author Rep. Mike Rogers, R-Mich., was unwilling to do.

Even if the Senate gets something done, Rogers and other CISPA supporters will likely have to compromise more than they’ve been willing to over the past year as Obama has made it clear he will veto legislation that doesn’t have more privacy protections.

CISPA Is Dead. Now Let’s Do a Cybersecurity Bill Right

by Julian Sanchez, Wired

Americans have grown so accustomed to hearing about the problem of “balancing privacy and security” that it sometimes feels as though the two are always and forever in conflict – that an initiative to improve security can’t possibly be very effective unless it’s invading privacy. Yet the conflict is often illusory: A cybersecurity law could easily be drafted that would accomplish all the goals of both tech companies and privacy groups without raising any serious civil liberties problems.

Few object to what technology companies and the government say they want to do in practice: pool data about the activity patterns of hacker-controlled “botnets,” or the digital signatures of new viruses and other malware. This information poses few risks to the privacy of ordinary users. Yet CISPA didn’t authorize only this kind of narrowly limited information sharing. Instead, it gave companies blanket immunity for feeding the government vaguely-defined “threat indicators” – anything from users’ online habits to the contents of private e-mails – creating a broad loophole in all federal and state privacy laws and even in private contracts and user agreements.

Given that recent experience has shown companies shielded by secrecy often err on the side of oversharing with the government, that loophole was a key concern. So why the gap between what the law permits and its supporters’ aims?

It’s a principle wonks call tech neutrality. Nobody wants to write a bill that refers too specifically to the information needed to protect current networks (like “Internet Protocol addresses” or “Netflow logs”) since technological evolution would render such language obsolete over time.

The World Is a Battlefield

Cross posted from The Stars Hollow Gazette

Since after 9/11, the United States has been engaged in a global war on terror (GWOT). Even as the illegal was in Iraq has allegedly ended and the one in Afghanistan finally begins to wind down almost 2 years after Osama bin Laden’s assassination, the US has widened its war in East Asia to the Arabian Peninsula and Africa sending in military on the ground as “advidsors” and unmanned armed drones to carry out “targeted strikes.” The world is now the battlefield for the US military and its contractors who are bleeding the American tax payer under the guise os keeping us safe. But are they keeping us safe? The reality is starting to surface. According to news sources the alleged Boston Marathon bombing suspect told investigators that the attack was spurred by their anger at America’s continued wars and its assault in Islam.

Yemeni journalist Farea Al-Muslimi testified before the Senate Judiciary’s subcommittee on the Constitution, civil rights and human rights. He told the committee what American’s need to hear:

“Just six days ago, my village was struck by a drone, in an attack that terrified thousands of simple, poor farmers.

“The drone strike and its impact tore my heart, much as the tragic bombings in Boston last week tore your hearts and also mine.

“What radicals had previously failed to achieve in my village, one drone strike accomplished in an instant: there is now an intense anger and growing hatred of America.”

We needed to hear this a very long time ago, long before 9/11.

Jeremy Scahill, author and National Security Correspondent for The Nation magazine, joined Amy Goodman in an interview on Democracy Now to discuss the his project Dirty Wars which has produced a documentary and soon to be released book,“Dirty Wars: The World Is a Battlefield.”

The book is based on years of reporting on U.S. secret operations in Yemen, Somalia and Afghanistan. While the Obama administration has defended the killing of Anwar, it has never publicly explained why Abdulrahman was targeted in a separate drone strike two weeks later. Scahill reveals CIA Director John Brennan, Obama’s former senior adviser on counterterrorism and homeland security, suspected that the teenager had been killed “intentionally.” “The idea that you can simply have one branch of government unilaterally and in secret declare that an American citizen should be executed or assassinated without having to present any evidence whatsoever, to me, is a – we should view that with great sobriety about the implications for our country,” says Scahill, national security correspondent for The Nation magazine. Today the U.S. Senate is preparing to hold its first-ever hearing on the Obama administration’s drone and targeted killing program. However, the Obama administration is refusing to send a witness to answer questions about the program’s legality.

The Secret Story Behind Obama’s Assassination of Two Americans in Yemen

Bending to Paranoia and Fear

Cross posted from The Stars Hollow Gazette

Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.

   Benjamin Franklin, Historical Review of Pennsylvania, 1759

Ben would not be pleased with the government he helped create. Since before 9/11/2001, our rights had been slowly eroding, since then the notion of the rule of law and the Constitution seems quaint. “American’s don’t believe in shredding the Constitution to fight terror,” that was the headline of an article written by Greg Sargeant in the Washington Post‘s Plum Line. he points out a poll done by the Post that asked respondents:

Q: Which worries you more: that the government will not go far enough to investigate terrorism because of concerns about constitutional rights, or that it will go too far in compromising constitutional rights in order to investigate terrorism?

48% were more concerned the government would go too far; while 41% said it would not go far enough. While not a majority, it is still encouraging that there is a plurality that would like to see our Constitutional rights protected. Yet there are still those who would throw those rights away for false feeling of security. Fueled by the rhetoric of a terrorist in every Muslim community, some of our elected representatives and voices in the mainstream media have called for stripping the Constitutional rights of Dzhokhar Tsarnaev, now charged with the bombings and deaths that resulted.

But the government and the media seem to be hung up on calling this incident, terrorism and labeling Tsarnaev a terrorist even before there was a motive or a connection to any terrorist organization. Writing at The Guardian, Glenn Greenwald wonders why Boston is ‘terrorism’ but not Aurora, Sandy Hook, Tucson and Columbine:

Over the last two years, the US has witnessed at least three other episodes of mass, indiscriminate violence that killed more people than the Boston bombings did: the Tucson shooting by Jared Loughner in which 19 people (including Rep. Gabrielle Giffords) were shot, six of whom died; the Aurora movie theater shooting by James Holmes in which 70 people were shot, 12 of whom died; and the Sandy Hook elementary school shooting by Adam Lanza in which 26 people (20 of whom were children) were shot and killed. The word “terrorism” was almost never used to describe that indiscriminate slaughter of innocent people, and none of the perpetrators of those attacks was charged with terrorism-related crimes. A decade earlier, two high school seniors in Colorado, Eric Harris and Dylan Klebold, used guns and bombs to murder 12 students and a teacher, and almost nobody called that “terrorism” either.

In the Boston case, however, exactly the opposite dynamic prevails. Particularly since the identity of the suspects was revealed, the word “terrorism” is being used by virtually everyone to describe what happened. After initially (and commendably) refraining from using the word, President Obama has since said that “we will investigate any associations that these terrorists may have had” and then said that “on Monday an act of terror wounded dozens and killed three people at the Boston Marathon”. But as (Ali) Abunimah notes, there is zero evidence that either of the two suspects had any connection to or involvement with any designated terrorist organization.

New York City Mayor Michael Bloomberg added his opinion that in light of the Boston bombing, the Constitution needs to be “reinterpreted”:

“The people who are worried about privacy have a legitimate worry,” Mr. Bloomberg said during a press conference in Midtown. “But we live in a complex word where you’re going to have to have a level of security greater than you did back in the olden days, if you will. And our laws and our interpretation of the Constitution, I think, have to change.” [..]

“Look, we live in a very dangerous world. We know there are people who want to take away our freedoms. New Yorkers probably know that as much if not more than anybody else after the terrible tragedy of 9/11,” he said.

“We have to understand that in the world going forward, we’re going to have more cameras and that kind of stuff. That’s good in some sense, but it’s different from what we are used to,” he said.

A noun, a verb and 9/11? Mr. Bloomberg wants us to fear those who would “take away our freedoms.” We should fear the Michael Bloombergs and Rudolph Guilianis of the world.

At a bedside hearing, Tsarnaev was advised of his rights and was appointed a lawyer. He freely answered questions in writing, denying that there was a connection with any terrorist organization and the idea was his brother’s. He also told the court that they were motivated by extremist Islamic beliefs. But does that justify calling this terrorist act and labeling the brothers terrorists? Even so, is there ever a justification for denying a person their Constitutional rights?

Glenn joined Amy Goodman on Monday’s Democracy Now to discuss the issues that surround this case.



Transcript can be read here.

Earth Day 2013: Bidder #70

Cross posted by The Stars Hollow Gazette

Today is Earth Day and the fight to protect our environment continues with a focus on global climate change, stopping fracking and the KeystoneXL pipeline that will carry the dirtiest oil on earth across the US. One of the heroes of the fight against the oil industries’ zeal to drill for oil on public lands, is environmental activist Tim DeChristopher has been released from custody after serving 21 months in federal prison.

DeChristopher was arrested after an attempt to buy more than 22,000 acres of land in a 2008 oil and gas lease auction. His act of civil disobedience (done while he was still enrolled at the University of Utah) led to charges of making false statements and violating the Federal Onshore Oil and Gas Leasing Reform Act. He was sentenced to two years in prison and a $10,000 fine.

The auction was later negated and leases revoked after the Obama administration found that the land should have never even gone up for sale.

His trial lasted for over two years and his lawyers weren’t allowed to use a defense that his actions were a lesser evil than allowing for oil and gas development and environmental harm. [..]

A documentary about his trial, “Bidder 70,” will be screened around the country on Monday in celebration of Earth Day. DeChristopher will make his first public appearance at a screening and Q-and-A in Salt Lake City, which will be streamed over the Internet at 9 p.m. EDT on April 22.

Tim was interviewed today by Amy Goodman on Democracy Now

In a Democracy Now! exclusive on Earth Day, climate change activist Tim DeChristopher joins us for his first interview since being released from federal custody after serving 21 months in detention. DeChristopher was convicted of interfering with a 2008 public auction when he disrupted the Bush administration’s last-minute move to sell off oil and gas exploitation rights in Utah. He posed as a bidder and won drilling lease rights to 22,000 acres of land in an attempt to save the property from oil and gas extraction. The auction itself was later overturned and declared illegal, a fact that DeChristopher’s defense attorneys were prevented from telling the jury. His case is the subject of the documentary, “Bidder 70,” which will screen all over the country today to mark his release and Earth Day. The founder of the climate justice group Peaceful Uprising, Tim DeChristopher joins us to discuss his ordeal, his newfound freedom, and his plans to continue his activism in the climate justice movement.

Transcript can be read here.

Stop CISPA Moves to the Senate

Cross posted from The Stars Hollow Gazette

Stop CISPA The controversial data sharing bill, Cyber Intelligence Sharing and Protection Act (CISPA) was passed by the House by a vote of 288 – 127, as 92 Democrats voted for the bill, while 29 Republicans voted against it. The bill passed without the privacy protections that civil liberties advocates felt were necessary, an objection that was echoed by the White House with a veto threat earlier this week. An attempt by the lead sponsors of the bill, Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.), offered an amendment to mollify the objections but privacy advocates stated that it fell short of what was needed to safeguard an individual’s right to privacy.

Amendments that were proposed to protect Fourth Amendment rights were not even allowed debate by the rules committee:

Rep. Alan Grayson, a Florida Democrat, proposed a one-sentence amendment (PDF) that would have required the National Security Agency, the FBI, Homeland Security, and other agencies to secure a “warrant obtained in accordance with the Fourth Amendment” before searching a database for evidence of criminal wrongdoing.

Grayson complained this morning on Twitter that House Republicans “wouldn’t even allow debate on requiring a warrant before a search.” [..]

CISPA is controversial because it overrules all existing federal and state laws by saying “notwithstanding any other provision of law,” including privacy policies and wiretap laws, companies may share cybersecurity-related information “with any other entity, including the federal government.” It would not, however, require them to do so. [..]

Because Grayson’s amendment was not permitted, CISPA will allow the federal government to compile a database of information shared by private companies and search that information for possible violations of hundreds, if not thousands, of criminal laws. [..]

“The government could use this information to investigate gun shows” and football games because of the threat of serious bodily harm if accidents occurred, Polis said. “What do these things even have to do with cybersecurity?… From football to gun show organizing, you’re really far afield.”

At the heart of CISPA is warrantless searches a clear violation of the Fourth Amendment which reads:

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

This has had a strange effect of uniting the left and right in the opposition to the bill. The Tea Party aligned group Freedom Works issued this statement:

CISPA would allow for more information sharing between the private sector and the federal government regarding cyber security. Although this year’s CISPA is a net improvement over last year’s bill, it still leaves open concerns about private information being shared in the name of national security.

There are grave Fourth Amendment concerns with CISPA. The bill would override existing privacy laws to allow companies to share “cyber threat information” with the federal government without making any reasonable effort to strip out any personal information from the file.

They even have a site to actively Stop CISPA along with the ACLU and the Electronic Freedom Foundation. Strange bedfellows, indeed.

Passage in the Senate without addition of privacy protections is doubtful but one never knows:

The discussion now shifts to the Democrat-controlled Senate, which appears unlikely to act on the legislation in the wake of a presidential veto threat earlier this week, and an executive order in January that may reduce the need for new legislation. Today’s House vote, on the other hand, could increase pressure on the Senate to enact some sort of legislation.

Sen. John Rockefeller, a West Virginia Democrat who was involved in last year’s cybersecurity debate, said after today’s vote that “CISPA’s privacy protections are insufficient.” Still, Rockefeller said, “I believe we can gain bipartisan agreement on bills that we can report out of our committees and allow [Majority Leader Harry Reid] to bring them to the Senate floor as early as possible.”

We urge everyone to keep the pressure on the Senate and the White House by calling and e-mailing your objections:

The White House switchboard is 202-456-1414.

The comments line is 202-456-1111.

The White House email address is here

Numbers for the Senate are here.

E-mail addresses for the Senate are here

Please be polite and on point.

The late internet activist Aaron Swartz called CISPA the “The Patriot Act of the Internet”.

Contact the White House and your Senators to protect your privacy rights.

They Did Torture and They Should Be Prosecuted

Cross posted from The Stars Hollow Gazette

While we were mostly fixed on the aftermath of explosion at the Boston Marathon, a non-partisan 11-member panel, that had been convened by the  legal research and advocacy group, Constitution Project to look into the treatment of detainees after 9/11, released a 577 page report (pdf) on Tuesday.

The report relying solely on public records, interviews with detainees, military officers and interrogators, concluded that “it is indisputable that the United States engaged in the practice of torture” under the Bush administration:

The use of torture, the report concludes, has “no justification” and “damaged the standing of our nation, reduced our capacity to convey moral censure when necessary and potentially increased the danger to U.S. military personnel taken captive.” The task force found “no firm or persuasive evidence” that these interrogation methods produced valuable information that could not have been obtained by other means. While “a person subjected to torture might well divulge useful information,” much of the information obtained by force was not reliable, the report says.

At emptywheel, Marcy Wheeler points out the report contains a “number of errors, repetition of dangerous misinformation, and incomplete reporting” but it is still important and comprehensive and its conclusion valuable:

Because even this cautious, bipartisan, institutionalist report concludes the following (among other findings):

   Finding #1: U.S. forces, in many instances, used interrogation techniques on detainees that constitute torture. American personnel conducted an even larger number of interrogations that involved “cruel, inhuman, or degrading” treatment. Both categories of actions violate U.S. laws and international treaties. Such conduct was directly counter to values of the Constitution and our nation.

   Finding #2: The nation’s most senior officials, through some of their actions and failures to act in the months and years immediately following the September 11 attacks, bear ultimate responsibility for allowing and contributing to the spread of illegal and improper interrogation techniques used by some U.S. personnel on detainees in several theaters. Responsibility also falls on other government officials and certain military leaders.

   Finding #3: There is no firm or persuasive evidence that the widespread use of harsh interrogation techniques by U.S. forces produced significant information of value. There is substantial evidence that much of the information adduced from the use of such techniques was not useful or reliable.

   Finding #16: For detainee hunger strikers, DOD operating procedures called for practices and actions by medical professionals that were contrary to established medical and professional ethical standards, including improper coercive involuntary feedings early in the course of hunger strikes that, when resisted, were accomplished by physically forced nasogastric tube feedings of detainees who were completely restrained.

   Finding #19: The high level of secrecy surrounding the rendition and torture of detainees since September 11 cannot continue to be justified on the basis of national security.

   Finding #21: The Convention Against Torture requires each state party to “[c]riminalize all acts of torture, attempts to commit torture, or complicity or participation in torture,” and “proceed to a prompt and impartial investigation, wherever there is reasonable ground to believe that an act of torture has been committed in any territory under its jurisdiction.” The United States cannot be said to have complied with this requirement.

The panel was formed after Pres. Barack Obama decided in 2009 not to support a national commission to investigate the post-9/11 counterterrorism programs, as proposed by Senator Patrick J. Leahy (D-VT) and others. “Look forward, not backward”, the president said. included former Senator Asa Hutchinson (R-AL), who served in President George W. Bush’s administration from 2003-2005 as the Under Secretary for Border and Transportation Security in the Department of Homeland Security, and former Representative James Jones (D-OK) who served as the U.S. Ambassador to Mexico from 1993-1997.  Among the other members were a three-star general and former president of the American Bar Association.

Significantly the New York Times article notes this:

The United States is a signatory to the International Convention Against Torture, which requires the prompt investigation of allegations of torture and the compensation of its victims. [..]

While the Constitution Project report covers mainly the Bush years, it is critical of some Obama administration policies, especially what it calls excessive secrecy. It says that keeping the details of rendition and torture from the public “cannot continue to be justified on the basis of national security” and urges the administration to stop citing state secrets to block lawsuits by former detainees. [..]

The core of the report, however, may be an appendix: a detailed 22-page legal and historical analysis that explains why the task force concluded that what the United States did was torture. It offers dozens of legal cases in which similar treatment was prosecuted in the United States or denounced as torture by American officials when used by other countries.

The report compares the torture of detainees to the internment of Japanese Americans during World War II. “What was once generally taken to be understandable and justifiable behavior,” the report says, “can later become a case of historical regret.”

Laura Pitter, counterterrorism adviser at Human Rights Watch, joined Democracy Now‘s Amy Goodman and Nermeen Shaikh to discuss the report,s “indisputable” evidence that the Bush administration tortured.

What Marcy said:

In short: it was torture, it was illegal, it was not valuable, and it still needs to be prosecuted.

Instead, The Justice Department instead chose to prosecute Central Intelligence Agency (CIA) whistleblower John Kiriakou, who refused to participate in torture and helped exposed the torture program. Mr. Kiriakou was sentenced to prison while the torturers he exposed walk free. Nice job, Barack.

52 hours left to stop CISPA

Cross posted Messing With the Wrong City] from [The Stars Hollow Gazette

Stop CISPATime to take action. As I reported last week the Cyber Intelligence Sharing and Protection Act(CISPA) was sent to the House for a vote.

From an e-mail that Joan McCarter at Daily Kos posted the e-mail from the White House issuing a veto threat of the bill as it currently stands:

The Administration recognizes and appreciates that the House Permanent Select Committee on Intelligence (HPSCI) adopted several amendments to H.R. 624 in an effort to incorporate the Administration’s important substantive concerns. However, the Administration still seeks additional improvements and if the bill, as currently crafted, were presented to the President, his senior advisors would recommend that he veto the bill. The Administration seeks to build upon the continuing dialogue with the HPSCI and stands ready to work with members of Congress to incorporate our core priorities to produce cybersecurity information sharing legislation that addresses these critical issues.

H.R. 624 appropriately requires the Federal Government to protect privacy when handling cybersecurity information. Importantly, the Committee removed the broad national security exemption, which significantly weakened the restrictions on how this information could be used by the government. The Administration, however, remains concerned that the bill does not require private entities to take reasonable steps to remove irrelevant personal information when sending cybersecurity data to the government or other private sector entities. Citizens have a right to know that corporations will be held accountable-and not granted immunity-for failing

to safeguard personal information adequately. [emphasis in original]

House Democrats are now rallying in opposition to the bill:

Four Democratic members say the Cyber Intelligence Sharing and Protection Act, or CISPA, as written “would undermine the interests of citizens and their privacy” despite the addition of five privacy-focused amendments adopted to the bill last week. They argue that the amendments do not go far enough to ease their concerns.

“Without further amendments to protect privacy and civil liberties, we cannot support the bill,” the House Democratic lawmakers write in the “Dear Colleague” letter.

“The bill has improved from earlier versions, but even with the amendments adopted, CISPA unacceptably and unnecessarily compromises the privacy interests of Americans online,” they add.

Reps. Adam Schiff (D-Calif.), Jan Schakowsky (D-Ill.), Anna Eshoo (D-Calif.) and Rush Holt (D-N.J.) signed the letter.

The House Rules Committee will meet on Tuesday afternoon to approve the rule for the bill, which will determine what amendments will be voted on in the House later this week. House members have until Tuesday morning to file their proposed amendments to the bill.

There are twelve Democratic co-sponsors to the bill. We need to send tell them to withdraw their support:

Ruppersberger, A. Dutch [D-MD2]

Costa, Jim [D-CA16]

Cuellar, Henry [D-TX28]

Enyart, William [D-IL12]

Gutierrez, Luis [D-IL4]

Hastings, Alcee [D-FL20]

Kilmer, Derek [D-WA6]

Lipinski, Daniel [D-IL3]

Peters, Scott [D-CA52]

Sewell, Terri [D-AL7]

Sinema, Kyrsten [D-AZ9]

Vargas, Juan [D-CA51]

The Electronic Freedom Foundation (EEF) is urging action:

The Cyber Intelligence Sharing and Protection Act (CISPA) is supposed to promote cybersecurity- a goal EFF wholeheartedly supports – but it doesn’t address common-sense network security issues. Instead, it creates a new, dangerous exception to existing privacy laws. That’s why hundreds of thousands of concerned Internet users have joined EFF and other civil liberties groups in opposing the bill. This is our last chance to stop it in the House.

Despite recent amendments, CISPA still features vague language that could put your personal information in the hands of military organizations like the National Security Agency.

Can you call your representative and tell him or her to oppose this bill?  We’ll give you the phone number for your representative and a very brief suggested script. Click here to call Congress now.

Not in the United States? Click here to sign our petition.

We want to generate thousands of calls between now and the vote-likely on Thursday.  Please call now and then tell your friends to speak out on this important issue. It’s as easy as posting this on your social networking accounts:

   Congress is about to vote on CISPA. If you care about online privacy, you’ve got to speak out now:  https://eff.org/r.5bPw

You can also use Twitter tool to tell key members of Congress to stand up for your privacy and vote NO on CISPA.

The White House switchboard is 202-456-1414.

The comments line is 202-456-1111.

Numbers for the Senate are here.

Numbers for the House are here.

The late internet activist Aaron Swartz called CISPA the “The Patriot Act of the Internet”.

Call the White House and your representatives to protect your privacy rights.

Stop CISPA: Bill Headed For Vote

Cross posted from The Stars Hollow Gazette

Stop CISPA Last month the controversial Cyber Intelligence Sharing and Protection Act (CISPA) was resurrected in the House by Reps. Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.).

Following a closed-door meeting, the bill was voted out of the House Intelligence Committee Wednesday afternoon by a vote of 18-to-2 and privacy experts are up in arms over the lack of privacy protection that were stripped from the bill. Only two Democrats voted against the bi;;, Rep. Jan Schakowsky (D-IL) and  Rep. Adam Schiff (D-CA).

Stopping short of a veto threat, the White House said it was unlikely to support the bill

by Leigh Beadon, Techdirt

Here’s the full text of the statement from {Caitlin Hayden, a National Security Council spokeswoman):

“We continue to believe that information sharing improvements are essential to effective legislation, but they must include privacy and civil liberties protections, reinforce the roles of civilian and intelligence agencies, and include targeted liability protections. The Administration seeks to build upon the productive dialogue with Chairman Rogers and Ranking Member Ruppersberger over the last several months, and the Administration looks forward to continuing to work with them to ensure that any cybersecurity legislation reflects these principles. Further,

we believe the adopted committee amendments reflect a good faith-effort to incorporate some of the Administration’s important substantive concerns, but we do not believe these changes have addressed some outstanding fundamental priorities

.”

Where have we heard this before? FISA? The Patriot Act?

CISPA Amendment Proves Everyone’s Fears Were Justified While Failing To Assuage Them

Just this week, Rep. Rogers flatly stated this is not a surveillance bill. Still, in an attempt to placate the opposition, they backed an amendment (pdf and embedded below) from Rep. Hines replacing that paragraph, which passed in the markup phase. Here’s the new text:

   PRIVACY AND CIVIL LIBERTIES.-

   (A) POLICIES AND PROCEDURES.-The Director of National Intelligence, in consultation with the Secretary of Homeland Security and the Attorney General, shall establish and periodically review policies and procedures governing the receipt, retention, use, and disclosure of non-publicly available cyber threat information shared with the Federal Government in accordance with paragraph (1). Such policies and procedures shall, consistent with the need to protect systems and networks from cyber threats and mitigate cyber threats in a timely manner-

   (i) minimize the impact on privacy and civil liberties;

   (ii) reasonably limit the receipt, retention, use, and disclosure of cyber threat information associated with specific persons that is not necessary to protect systems or networks from cyber threats or mitigate cyber threats in a timely manner;

   (iii) include requirements to safeguard non-publicly available cyber threat information that may be used to identify specific persons from unauthorized access or acquisition;

   (iv) protect the confidentiality of cyber threat information associated with specific persons to the greatest extent practicable; and

   (v) not delay or impede the flow of cyber threat information necessary to defend against or mitigate a cyber threat.

It seems to me they are hoping that by making the section longer and more complicated, people will miss the fact that very little has changed. But what’s truly astonishing is that this new text reads like a confession that CISPA does involve all the stuff that they’ve been insisting it has nothing to do with.

The big thing, of course, is that this oversight now involves civilian agencies, which is really the only meaningful change – and its impact has been rather minimized. Rather than putting the DHS or another agency in between the public and military agencies like the NSA, they’ve simply given them some input – and it’s hard to say how meaningful that input will be.

The Privacy Risks of CISPA

by Michelle Richardson, Legislative Counsel, ACLU Washington Legislative Office

Reports of significant data breaches make headlines ever more frequently, but lost in the cloak and dagger stories of cyberespionage is the impact proposed cybersecurity programs can have on privacy. The same Internet that terrorists, spies and criminals exploit for nefarious purposes is the same Internet we all use daily for intensely private but totally innocuous purposes.

Unfortunately, in their pursuit to protect America’s critical infrastructure and trade secrets, some lawmakers are pushing a dangerous bill that would threaten Americans’ privacy while immunizing companies from any liability should that cyberinformation-sharing cause harm. [..]

Here’s what needs to happen. First, CISPA needs to be amended to clarify that civilians are in charge of information collection for cybersecurity purposes, period. Anything short of that is a fundamental failure. Second, the bill needs to narrow the definition of what can be shared specifically to say that companies can only share information necessary to address cyberthreats after making reasonable efforts to strip personally identifiable information. Industry witnesses before the House Intelligence and Homeland Security committees testified this year that this is workable, and such information isn’t even necessary to combat cyberthreats. Third, after sharing, CISPA information should be used only by government and corporate actors for cybersecurity purposes. As a corollary to that, there should be strict and aggressive minimization procedures to protect any sensitive data that slips through.

The ACLU and the Electronic Freedom Foundation (EFF) have banded together to Stop CISPA. The petitions with over 100,000 signatures has been delivered to the White House. Now we need to get to the phones.

The White House switchboard is 202-456-1414.

The comments line is 202-456-1111.

Numbers for the Senate are here.

Numbers for the House are here.

The late internet activist Aaron Swartz called CISPA the “The Patriot Act of the Internet”. Call the White House and your representatives to protect your privacy rights.

Foreclosures: a Nationwide Crime Scene

Cross posted from The Stars Hollow Gazette

The foreclosure fraud perpetrated by the banks and private mortgage companies that was given a pass by the Obama Department of Justice.

Foreclosure Review Finds Potentially Widespread Errors

by  Shahien Nasiripour, Huffington Post

Nearly a third of all foreclosed borrowers who faced proceedings brought by the biggest U.S. mortgage companies during the height of the housing crisis came to the brink of losing their homes due to potential bank errors or under now-banned practices, regulators have revealed. [..]

The estimates, disclosed Tuesday, far exceed projections made over the past few years after document abuses known as robosigning gained widespread attention in late 2010. [..]

They reveal that nearly 700 borrowers who faced foreclosure proceedings had actually never defaulted on their loans (pdf).

More than 28,000 households that faced foreclosure proceedings were protected under federal bankruptcy laws, while roughly 1,100 had been meeting all the requirements of so-called forbearance plans that their mortgage companies had agreed to, which allow for delayed payments.

Some 1,600 borrowers who faced foreclosure proceedings were protected by the Servicemembers Civil Relief Act of 2003, which forces mortgage companies to cap interest rates and follow special procedures when foreclosing on homes belonging to active-duty members of the armed forces and their families.

4 million people wrongfully foreclosed on. Can they get their houses back?

Banks are foreclosing on military members, on people who had been approved for a loan modification, and even on people who were never behind in their payments–all part of an astounding settlement that shortchanged millions of homeowners and left hundreds of thousands wrongfully ejected from their homes.  Former Governor Elliot Spitzer; Alexis Goldstein, former Vice President at Merrill Lynch and Deutsche Bank, now an Occupy Wall Street activist ; and Faith Bautista, who was the victim of wrongful home foreclosure in 2009, join Chris Hayes and paint a stark picture of what happened, who is responsible and why there isn’t more justice from the government.

The big banks continue to receive %83 billion a year in tax payer money to bail them out. Where is the justice for these homeowners?

The Myth of Equal Justice

Cross posted from The Stars Hollow Gazette

March 18 marked the fiftieth anniversary of Gideon v. Wainwright, the landmark case by the Supreme Court that required states under the 14th amendment to provide counsel in criminal cases for defendants who are unable to afford to pay their own attorneys, extending the identical requirement made on the federal government under the 6th Amendment.

But is justice now equal?

The Legacy of Gideon v. Wainwright

by John Light, Moyers & Company

Anthony Lewis, The New York Times journalist whose masterwork chronicled the Supreme Court’s landmark Gideon v. Wainwright decision, died earlier this week at the age of 85. The court’s ruling, handed down 50 years ago last week, established a criminal defendant’s right to an attorney, even if that defendant cannot afford one. [..]

Here are some resources on Anthony Lewis and the legacy of Gideon v. Wainwright.

1. Gideon’s Trumpet

In 1964, Lewis, a two-time Pulitzer Prize winner, published his book Gideon’s Trumpet. In it, he described Clarence Earl Gideon as a wrongly convicted Florida man convinced that he was entitled to legal representation even though the state of Florida said otherwise. [..]

2. Defending Gideon

A new documentary from The Constitution Project and the New Media Advocacy Project examines the impact of Gideon v. Wainwright and includes a recent interview with Anthony Lewis as well as an archival interview from the 1960s with Gideon, who explains that he was surprised to hear from the trial judge that he was not entitled to a lawyer. [..]

3. “The Silencing of Gideon’s Trumpet”

Ten years ago, on the 40th anniversary of Gideon v. Wainwright, Lewis described in The New York Times Magazine the “endless failures to bring the promise of Gideon to life.” He wrote, “Even more alarming is the assertion by the Bush administration that in a whole new class of cases it can deny the right to counsel altogether. [..]

4. Adam Liptak on Lewis’s Transformative Journalism

Adam Liptak, one of Lewis’s successors as Supreme Court correspondent for The New York Times, wrote the paper’s obituary of its former reporter and columnist. He noted that Gideon’s Trumpet has never been out of print from the day it was published, and that Lewis’s knowledgeable and thorough coverage of the court during the years Earl Warren served as its chief justice made him almost as essential to its history as the judges themselves. [..]

5. Andrew Cohen on Lewis and Gideon today

Writing in The Atlantic earlier this month, legal scholar Andrew Cohen described how, in the story of Gideon v. Wainwright, Lewis found material for one of the “best nonfiction works written about the Supreme Court and the American legal system.” [..]

But the thrust of Cohen’s essay is that Gideon’s legacy has not fared so well. A Brennan Center for Justice report found that many court appointed lawyers are overworked and spend less than six minutes per case at hearings where they counsel their clients to plead guilty. Lawmakers haven’t funded public defenders adequately, Cohen says, and the Supreme Court has not required them to do so.

On March 29th’s Moyers & Company, host Bill Moyers discussed the system’s failures, and ongoing struggles at the crossroads of race, class and justice with attorney and legal scholar Bryan Stevenson. Then Mr. Moyers is joined by journalists Martin Clancy and Tim O’Brien, authors of Murder at the Supreme Court, to examine the fatal flaws of the death penalty.

The broadcast closes with a Bill Moyers Essay on the hypocrisy of “justice for all” in a society where billions are squandered for a war born in fraud while the poor are pushed aside.



Full transcript can be read here

Two Justices for the “Haves” and “Have Nots”

Cross posted from The Stars Hollow Gazette

Noam Chomsky Glenn Greenwald with Liberty and Justice For Some

Former constitutional rights lawyer Glenn Greenwald contends that the United States has a two-tiered judicial system, one for the “haves” and one for the “have-nots.” Mr. Greenwald presents his argument by tracing the evolution of judicial inequality, from President Richard Nixon’s pardon for the Watergate scandal to what the author deems were economic and political crimes committed during the George W. Bush administration. The author posits that both political parties and the media are culpable for creating an unequal judicial system. Glenn Greenwald presented his thoughts in conversation with political activist Noam Chomsky. They also responded to questions from members of the audience. This was a special event of the Harvard Book Store, held at the Brattle Theatre in Cambridge, Massachusetts.

I’m including the article below by Glenn because the tactics that are employed by the powers that be and their adherents need to be exposed. Those of us who dissent from the CW are told to “sit down and shut up” because the president’s “got this.” Now, after Barack Obama has been reelected his true colors are really shining through with his appointments of torture advocates to even higher office and the revolving door of Wall St. and banking shills to protect the super wealthy. Much of what Glenn says about Noam Chomsky has also been applied to Glenn, himself, and many of us who expose the true agenda of this government. These are the tactics of the right wing used to silence the dissent during the Bush regime now being directed at those of us who have not been fooled by promise of change that will never come unless we expose it.

How Noam Chomsky is discussed

by Glenn Greenwald, The Guardian

The more one dissents from political orthodoxies, the more the attacks focus on personality, style and character

One very common tactic for enforcing political orthodoxies is to malign the character, “style” and even mental health of those who challenge them. The most extreme version of this was an old Soviet favorite: to declare political dissidents mentally ill and put them in hospitals. In the US, those who take even the tiniest steps outside of political convention are instantly decreed “crazy”, as happened to the 2002 anti-war version of Howard Dean and the current iteration of Ron Paul (in most cases, what is actually “crazy” are the political orthodoxies this tactic seeks to shield from challenge).

This method is applied with particular aggression to those who engage in any meaningful dissent against the society’s most powerful factions and their institutions. Nixon White House officials sought to steal the files from Daniel Ellsberg’s psychoanalyst’s office precisely because they knew they could best discredit his disclosures with irrelevant attacks on his psyche. Identically, the New York Times and partisan Obama supporters have led the way in depicting both Bradley Manning and Julian Assange as mentally unstable outcasts with serious personality deficiencies. The lesson is clear: only someone plagued by mental afflictions would take such extreme steps to subvert the power of the US government.

A subtler version of this technique is to attack the so-called “style” of the critic as a means of impugning, really avoiding, the substance of the critique. Although Paul Krugman is comfortably within mainstream political thought as a loyal Democrat and a New York Times columnist, his relentless attack against the austerity mindset is threatening to many. As a result, he is barraged with endless, substance-free complaints about his “tone”: he is too abrasive, he does not treat opponents with respect, he demonizes those who disagree with him, etc. The complaints are usually devoid of specifics to prevent meaningful refutation; one typical example: “[Krugman] often cloaks his claims in professional authority, overstates them, omits arguments that undermine his case, and is a bit of a bully.” All of that enables the substance of the critique to be avoided in lieu of alleged personality flaws.

Nobody has been subjected to these vapid discrediting techniques more than Noam Chomsky. [..]

Like any person with a significant political platform, Chomsky is fair game for all sorts of criticisms. Like anyone else, he should be subjected to intense critical and adversarial scrutiny. Even admirers should listen to his (and everyone else’s) pronouncements with a critical ear. Like anyone who makes prolific political arguments over the course of many years, he’s made mistakes.

But what is at play here is this destructive dynamic that the more one dissents from political orthodoxies, the more personalized, style-focused and substance-free the attacks become. That’s because once someone becomes sufficiently critical of establishment pieties, the goal is not merely to dispute their claims but to silence them. That’s accomplished by demonizing the person on personality and style grounds to the point where huge numbers of people decide that nothing they say should even be considered, let alone accepted. It’s a sorry and anti-intellectual tactic, to be sure, but a brutally effective one.

CIA Drones War Shift To Pentagon

Cross posted from The Stars Hollow Gazette

Earlier this week it was leaked to the press by those “anonymous White House sources” that the CIA’s drone program would be gradually transferred to the Pentagon supposedly making oversight by Congress more transparent and according to Daniel Klaidman, who first reported the shift at the Daily Beast it would also toughen the “criteria for drone” strikes and “strengthen the program’s accountability:”

Currently, the government maintains parallel drone programs, one housed in the CIA and the other run by the Department of Defense. The proposed plan would unify the command and control structure of targeted killings and create a uniform set of rules and procedures. The CIA would maintain a role, but the military would have operational control over targeting. Lethal missions would take place under Title 10 of the U.S. Code, which governs military operations, rather than Title 50, which sets out the legal authorities for intelligence activities and covert operations. [..]

Officials anticipate a phased-in transition in which the CIA’s drone operations would be gradually shifted over to the military, a process that could take as little as a year. Others say it might take longer but would occur during President Obama’s second term. [..]

uring that time, CIA and DOD operators would begin to work more closely together to ensure a smooth hand-off. The CIA would remain involved in lethal targeting, at least on the intelligence side, but would not actually control the unmanned aerial vehicles. Officials told The Daily Beast that a potential downside of the agency’s relinquishing control of the program was the loss of a decade of expertise that the CIA has developed since it has been prosecuting its war in Pakistan and beyond. At least for a period of transition, CIA operators would likely work alongside their military counterparts to target suspected terrorists.

Spencer Ackerman at The Wire, doesn’t think that this is much of a change. The CIA will still be involved telling military personnel what and who to target. Nor does Ackerman think that the program will be more transparent:

The congressional reporting requirements for so-called Title 50 programs (stuff CIA does, to be reductive) are more specific than those for Title 10 (stuff the military does, to be reductive). But the armed services committees tend to have unquestioned and broader oversight functions than the intelligence committees enjoy, not to mention better relationships with the committees: Witness the recent anger in the Senate intelligence committee that the CIA lied to it about its torture programs. The military is more likely than the CIA to openly testify about future drone operations, allow knowledgeable congressional staff into closed-door operational briefings and allow members of Congress to take tours of drone airbases.

As, Klaidman pointed out this could lead to even less transparency since there is nothing in the law that requires the military to account for its lethal operations while the CIA is obligated to report its activities.

Sen. Diane Feinstein (D-CA), the chair of the Senate Intelligence Committee which has oversight of the CIA, expressed her concerns

Feinstein told reporters her “mind, certainly, is not made up.” But she quickly added she has reservations about turning over to the military the CIA’s armed drone fleet and the missions they conduct.

   During the last few years, she said, “We’ve watched the intelligence aspect of the drone program: how they function. The quality of the intelligence. Watching the agency exercise patience and discretion,” Feinstein said.

   “The military [armed drone] program has not done that nearly as well,” she said. “That causes me concern. This is a discipline that is learned, that is carried out without infractions…. It’s not a hasty decision that’s made. And I would really have to be convinced that the military would carry it out that way.”

Sen. John McCain (R-AZ) preferred the program be transferred to Defense bringing it under the House and Senate Armed Services Committees:

“I believe the majority of the responsibility for this should rest with the military,” McCain told reporters Tuesday. [..]

“The majority of it can be conducted by the Department of Defense,” McCain said. “It’s not the job of the Central Intelligence Agency. … It’s the military’s job.”

Transferring the program to the Pentagon — and under the auspices of the House and Senate Armed Services committees — would create more “openness” and “oversight” and public hearings about the program, he said.

In reality, the Obama administration would still be running a secretive and questionably legal program.

Rachel Maddow, host of MSNBC’s “The Rachel Maddow Show,” gives a a short history of the CIA and talks with former congressman and now MSNBC contributor, Patrick Murphy, who served on the House Armed Services Committee, about oversight of the drone program.

Load more