Tag Archives: surveillance

U.S. Government Sues Snowden Over Memoir Release

Note: links in this post include affiliate links.

The U.S. government took swift legal action against famed NSA whistleblower Edward Snowden after the release of his memoir, “Permanent Record.”

The government’s complaint, filed September 17th, alleges that Snowden, a former CIA employee and former contractor for the NSA, violated non-disclosure agreements with the NSA and CIA by publishing his book without first submitting it for prepublication review “in violation of his express obligations under the agreements he signed.” The government also claims that Snowden has violated NDAs by giving speeches without first providing materials for prepublication review. The book’s publishers are also named in the lawsuit.

The lawsuit does not seek a halt in publication, but it argues that all profits from “Permanent Record” belong to the government.

“Intelligence information should protect our nation, not provide personal profit,” G. Zachary Terwilliger, U.S. Attorney for the Eastern District of Virginia, said in a statement. “This lawsuit will ensure that Edward Snowden receives no monetary benefits from breaching the trust placed in him.”

The ACLU responded to the suit criticizing the prepublication review, claiming that it’s “a process that prohibits millions of former intelligence-agency employees and military personnel from writing or speaking about topics related to their government service without first obtaining government approval.”

“This book contains no government secrets that have not been previously published by respected news organizations. Had Mr. Snowden believed that the government would review his book in good faith, he would have submitted it for review. But the government continues to insist that facts that are known and discussed throughout the world are still somehow classified,” said Ben Wizner, an attorney for Snowden.

Snowden himself responded via Twitter that “It is hard to think of a greater stamp of authenticity than the US government filing a lawsuit claiming your book is so truthful that it was literally against the law to write.”

Snowden also wrote that “the very book the government does not want you to read just became the #1 best-selling book in the world.”

“Permanent Record” is available to purchase by clicking here.

Trump Wants U.S. Military to Guard U.S.-Mexico Border Until Wall Is Complete

Update, April 4, 7:03 p.m.: The Associated Press has reported that “President Donald Trump will be signing a proclamation directing the departments of Defense and Homeland Security to work together with governors to deploy the National Guard to the southwest border.” The AP also noted that “Texas Gov. Greg Abbott’s office says he will add more National Guard members to the roughly 100 already deployed to the U.S.-Mexico border in the state. Abbott said in a statement Wednesday that he welcomed the Trump administration’s announcement that it will ‘immediately’ deploy guardsmen to the southwest border.”

Original article:

President Donald Trump has announced that his administration plans to use the military to secure the U.S.-Mexico border until a new border wall is built. The comments came from Trump during a lunch with world leaders and then again during a press conference; Trump originally claimed to have spoken about the plan with Secretary of Defense Jim Mattis. “We’re going to be doing things militarily until we can have a wall and proper security,” Trump said.

“Until we can have a wall and proper security, we’re going to be guarding our border with the military. That’s a big step, we really haven’t done that before, or certainly not very much before.”

When questioned about the plan, Trump explained that the U.S. does not have laws, but instead has “catch-and-release.” Trump said that even when people are caught, they are immediately released and rarely come back to face court cases. Trump is ramping up his calls for border control following the recent omnibus budget bill, which failed to provide adequate funding for his multi-billion dollar vision. Trump was also upset about recent reports of a caravan of immigrants from across Latin America traveling through Mexico. Trump demanded Mexican officials take action and seemed to dare the caravan to try to cross the U.S. border.

According to the Associated Press, “Mexico routinely stops and deports Central Americans, sometimes in numbers that rival those of the United States. Deportations of foreigners dropped from 176,726 in 2015 to 76,433 in 2017, in part because fewer were believed to have come to Mexico, and more were requesting asylum in Mexico.”

As far as what Trump could actually order the military to do, his options may be a bit limited. Fox News reported that according to a memo obtained by Fox as well as discussions with officials, one area which the military could contribute patrols is at the Air Force’s Barry Goldwater live-fire range, along the Arizona-Mexico border.

Vox noted that Trump could follow the Obama and George W. Bush administrations by ordering the National Guard to the border. However, this practice has been ineffective and a financial waste in the past. In addition, The Posse Comitatus Act prevents the military from being involved in civilian law enforcement operations.

Still, despite any of these apparent legal or constitutional limitations, it should be noted that the U.S. government has been lurching further and further into surveillance of American citizens. Widespread mass surveillance via the internet, cellphones, closed-circuit cameras, automatic license plate readers, facial recognition cameras, and more have been pervading daily lives with increasing urgency, including under the Trump administration.

[RELATED: Civil Liberties Groups Warn CLOUD Act In Spending Bill Erodes Privacy]

In February, The Austin-American Statesman reported the U.S. Customs and Border Protection announced plans for a new pilot program that will test out biometric facial recognition technology as part of an effort to identify fugitives or terror suspects:

Thanks to quantum leaps in facial recognition technology, especially over the past year, the future is arriving sooner than most Americ, the future is arriving sooner than most Americans realize. As early as this summer, CBP will set up a pilot program to digitally scan the faces of drivers and passengers — while they are in moving vehicles — at the busy Anzalduas Port of Entry outside of McAllen, the agency announced Thursday.

The Texas-Mexico border is being used as testing grounds for the technology. The results of the pilot program will be used to help roll out a national program along the entire southern and northern borders. Additionally, it was recently reported that the U.S. Immigration and Customs Enforcement (ICE) agency now has access to a nationwide license plate recognition database after finalizing a contract with the industry’s top license plate data collection company. This database allows ICE to search a vehicle’s whereabouts over the last five years, as well as developing “hot lists” that can track particular vehicles indefinitely.

In February, it was revealed that the U.S. Immigration and Customs Enforcement (ICE) agency has access to a nationwide license plate recognition database after finalizing a contract with the industry’s top license plate data collection company. A copy of the contract shows that ICE finalized the deal in early January. The contract makes ICE the latest of several federal agencies who have access to billions of license plate records which can used for real-time location tracking.

In August 2017, Activist Post reported on the plans to launch a national program scan the faces of all airline passengers in the U.S. Customs and Border Protection launched a “Traveler Verification Service” (TVS) that intends to use facial recognition on all airline passengers, including U.S. citizens, boarding flights exiting the United States. That same month, it was reported that thirty-one sheriffs along the U.S.-Mexico border voted unanimously to adopt tools that will allow the collection and storing of iris scans.

When taken together, each of these pieces of information indicate a push towards a militarized border— one full of facial recognition cameras, license plate readers, biometric databases, social media monitoring, and ultimately, complete access to formerly private details.

Editor’s note, April 4, 2018, 7:03 p.m.: This article has been updated to reflect new information from the Associated Press regarding adding National Guard members to the U.S.-Mexico border in Texas.

Bipartisan Coalition of Lawmakers Introduce Anti-Surveillance Bills

The American Civil Liberties Union and the Tenth Amendment Center have partnered with lawmakers from 16 states to introduce counter-surveillance legislation. On January 20, Anthony D. Romero, executive director of the ACLU, and Michael Boldin, executive director of the Tenth Amendment Center, released an op-ed through Time announcing the new legislation and calling for a partnership between conservatives and progressives.

Boldin and Romero discussed the increase in cell phone surveillance from tools like Stingrays and tracking from automatic license plate readers which track the public’s driving habits. Their concern extends not only to government institutions but corporations who are willing to capture and sell personal data of customers.

The legislation comes from both political parties spread across the United States, including the District of Columbia, Hawaii, North Carolina, Minnesota, Alabama, New Hampshire and New Mexico. The ACLU is supporting the bills as part of their campaign “#TakeCTRL: Nationwide Privacy Push.” The campaign offers a map showing the participating states and explanations of each bill introduced.

The bills deal with personal data privacy, location tracking through Stingray cell site simulators, Automatic License Plate Readers, employee and student social media privacy, and protection for students personal technology on campus. Each bill offers protections that guarantee the right for each individual to be in control of maintaining their private, personal information.

Boldin and Romero wrote, “Americans have grown tired of hearing stories like that of former college hockey player Megan Donahue, who quit her team because she did not want to give her coaches access to her social media accounts, or high school student Blake Robbins, whose school remotely accessed the webcam on the laptop it issued him and took pictures of him while he undressed.”

Another focus of the bills is to force law enforcement agencies to get a warrant if they desire to use new technologies to access someone’s private communications. When it comes to corporate access to Americans’ data, the coalition is calling for corporations to get “clear and express permission to do so.”

As the ACLU and Tenth Amendment Center recognize, the laws have not kept up to pace with technology that is being employed by the military and law enforcement. If every state passed their legislation and enacted privacy protections such as warrants it would still not stop invasions by federal agencies which are also known to have similar technology.

The coalition ends their letter with a call for unity and action.

“We know that this is a fight that will continue, but with conservatives and progressives standing united, it’s a fight we can win.”

Apple’s Tim Cook Opposes More Federal Access To Customer Data

WASHINGTON – Opposition to back door access to encrypted information by intelligence agencies was defended by Apple CEO Tim Cook.

In an interview for “60 Minutes” broadcast, Cook said “There have been people that suggest that we should have a back door. But the reality is if you put a back door in, that back door’s for everybody, for good guys and bad guys.”

A renewed push by politicians and law enforcement has come in the wake of the November 13 terrorist attacks on Paris, when attackers were said to have used encrypted devices to coordinate and execute attacks outside the purview of government surveillance.

While the interview with Cook had been filmed prior to the Paris attack, the CEO has since emphasized his support for protecting encryption, saying the choice between privacy and national security was a false one.

“I don’t believe the tradeoff here is privacy versus national security,” he said, adding that’s an “overly simplistic view…We’re America. We should have both.”

The Cybersecurity Information Sharing Act of 2015 (CISA) has been a contentious issue in the tech community over the past year. The measure allows for direct sharing of consumer data and information with the surveillance community. Many provisions in previous versions of the bill which called for anonymity of that data were stripped out of the version of the bill which passed as a part of the omnibus budget.

“Organizations can now directly share raw data with several agencies with no protection or anonymity,” said engineer Joseph Pizzo with Norse Security. “There may have been a small cost associated with anonymizing the data, but now that this requirement has been removed and organizations may feel that they’re helping, I don’t foresee any work moving forward to protect consumer data.”

Candidates including Donald Trump and Sen. Marco Rubio (R-Fla.) have advocated for the ability for intelligence agencies to circumvent encryption during the 2016 presidential campaign.

FOLLOW MICHAEL LOTFI ON Facebook, Twitter & LinkedIn.

Reps. Amash, Massie Blast Congressional Spending Bill for ‘Unconstitutional’ Surveillance Measures

The last-minute addition of the Cybersecurity Act of 2015 to a massive Congressional spending bill has drawn criticism from Representatives who call the provisions unconstitutional, and say that they are an excuse for the U.S. government to expand warrantless domestic cyber surveillance.

In a statement to Truth In Media on Thursday, Rep. Justin Amash (R-Mich.) said he does not support the bill, and he sees it as possibly the “worst anti-privacy vote” since the Patriot Act in 2001.

[pull_quote_center]A vote for the omnibus is a vote to support unconstitutional surveillance on all Americans. It’s probably the worst anti-privacy vote in Congress since the Patriot Act.[/pull_quote_center]

Rep. Thomas Massie (R-Ky.) released a statement on his Facebook page on Wednesday, claiming that he learned of the addition of the “completely unrelated legislation to expand warrantless domestic cyber surveillance” on Tuesday night.

[pull_quote_center]We learned last night that in addition to unsustainable spending, the giant omnibus includes completely unrelated legislation to expand warrantless domestic cyber surveillance and to repeal country of origin labeling for meat sold in the U.S. I will be voting no on Thursday.[/pull_quote_center]

The Cybersecurity Act of 2015 brings together provisions from other bills that have been passed in either the House or the Senate in 2015, such as the Cyber Intelligence Sharing and Protection Act (CISPA) and the Cybersecurity Information Sharing Act (CISA), which both give the U.S. government access to Internet traffic information from technology and manufacturing companies.

[RELATED: Surveillance Bill Masked As ‘Cybersecurity’ Close to Completion]

As previously reported, while “sharing of intelligence is supposed to be voluntary,” critics of the bill say the provisions “will only increase the indiscriminate monitoring of legal activity by giving companies immunity from lawsuits for sharing information with the government.”

Amash told Truth in Media he believes the surveillance provisions were “quietly slipped” into the massive spending bill in an attempt to “avoid full scrutiny.”

[pull_quote_center]These provisions were quietly slipped into the omnibus to avoid full scrutiny. We take an oath to defend the Constitution, and our Fourth Amendment privacy protections are as important as anything.[/pull_quote_center]

U.S. Police Chiefs Demand Access to Encrypted Communications Following Paris Attacks

As the world heals from the recent terror attacks in Paris, we are witnessing a range of reactions from heads of state and media pundits. The corporate media is doing its part to repeat the mistakes witnessed following 9/11, including support for curtailing of the rights of Muslim-Americans and an increase in surveillance and violations of constitutional freedoms.

The attacks in Paris, which claimed the lives of 130 people, have ignited a call from police chiefs and prosecutors who seek to pass legislation which would give investigators access to encrypted communications in an attempt to stop terrorism.

On Tuesday, the International Association of Chiefs of Police (IACP) and the National District Attorneys Association (NDAA) announced in a press release that they were joining forces to “press for immediate action to address this critical threat.” The statement reads:

[pull_quote_center]The proliferation of sophisticated encryption technology and other technological barriers have increasingly hindered law enforcement’s ability to lawfully access criminal and terrorist related communications.[/pull_quote_center]

The groups also state that encryption has led to numerous instances where police could not access encrypted information “that could have allowed them to successfully investigate and apprehend criminals or prevent terrorists from striking.”

Although there is not yet evidence that ISIS member used encrypted communication programs to plan their attacks, lawmakers are calling for legislation which would allow law enforcement to access a “backdoor” to encrypted data with a warrant.

The Information Technology Industry Council told the Hill that creating backdoors would “actually create vulnerabilities to be exploited by the bad guys, which would almost certainly cause serious physical and financial harm across our society and our economy.”

Still, the chiefs are seeking access to protected communications by updating laws such as the Communications Assistance for Law Enforcement Act and the Electronic Communications Privacy Act. The groups state that they are committed to finding a solution “which balances the needs of the law enforcement community with protecting the public’s right to privacy.”

Last week, The Washington Post reported that Manhattan District Attorney Cyrus R. Vance Jr., an outspoken critic of encrypted communications, asked Congress to pass a law requiring the unencrypted content of any smartphone made or sold in the United States to be accessible to law enforcement officers with a search warrant. Vance said the changes were necessary following the Paris attacks.

“Every tip will be investigated, every lead will be followed, but every time one of those trails leads to an encrypted cellphone, it may go cold,” Vance stated.

Whether or not Americans continue to be granted the right to privacy depends on how willing we are to accept these radical changes in the name of security. How can we strike a balance between freedom and security while knowing that the U.S. government is funding the same terrorists whom we are supposed to fear? Are Americans willing to give up their rights once more in the hopes that the U.S. government will keep us safe?

New Documents Reveal the NSA is Still Collecting Americans’ Emails

New records obtained by the New York Times via Freedom of Information Act requests reveal that the National Security Agency’s mass collection of email communications likely continues using different methods which are not restricted by the law.

The new details, part of a report from the NSA’s inspector general, reveal at least four reasons why the NSA ended the email program. Three of these reasons are redacted but the fourth states “other authorities can satisfy certain foreign intelligence requirements” that the bulk email records program “had been designed to meet.”

The report also details two other legal ways the government may acquire the data. First, the NSA may gather Americans’ data that has been gathered in other countries by examining the fiber optic cables which power the internet. As the New York Times writes, these activities “are largely not subject to regulation by the Foreign Intelligence Surveillance Act.” The NSA was previously not allowed to gather domestic data using this procedure, but that rule was changed in November 2010.

The other method for spying on Americans which the NSA may legally employ involves the Foreign Intelligence Surveillance Act Amendments Act of 2008, which allows for warrantless domestic surveillance.

These revelations come on the eve of the end of another program which allows the collection of Americans’ phone records. Under the recently passed USA Freedom Act the NSA can still access the records in the pursuit of terrorists, but the records remain with the telecommunications companies.

Timothy Edgar, a privacy official in the Office of the Director of National Intelligence with both the George W. Bush and Obama administrations who is now a teacher at Brown University, told the New York Times that “The document makes it clear that NSA is able to get all the Internet metadata it needs through foreign collection.”

If Americans were hopeful that the USA Freedom Act was going to stop the bulk collection of data, they are in for disappointment. As long as the state has the technology and the resources (funded via tax dollars), they will use whatever tools they have at their disposal to monitor innocent individuals as the march towards complete loss of civil liberties continues.

Federal Judge Issues New Rules for Use of Stingray Surveillance in Illinois

US Magistrate Judge Iain Johnston of Illinois recently announced three new requirements for government agencies that wish to deploy cell-site simulators, also known as Stingrays. For the moment, the order only applies to law enforcement agencies under the jurisdiction of Judge Johnston’s court in the Northern District of Illinois.

The Electronic Frontier Foundation describes Stingrays as:

[pull_quote_center]

A brand name of an IMSI (International Mobile Subscriber Identity) Catcher targeted and sold to law enforcement. A Stingray works by masquerading as a cellphone tower – to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not – and tricks your phone into connecting to it. 

As a result, the government can figure out who, when and to where you are calling, the precise location of every device within the range, and with some devices, even capture the content of your conversations.

[/pull_quote_center]

[Read More: A Guide to Stingray Cellphone Surveillance Technology]

During proceedings for an ongoing drug case, Judge Johnston issued three new requirements for prosecutors to fulfill before he will sign off on the future use of mass surveillance devices. The requirements are aimed at protecting the privacy of innocent individuals who may have their information collected via Stingray during the course of an investigation.

Judge Johnston’s requirements call on government agents to obtain a warrant, and not to make use of the devices when “an inordinate number of innocent third parties’ information will be collected.” This could include any large public event. The judge also requires the government to “immediately destroy” unrelated data within 48 hours and prove to the court the information has been deleted.

Judge Johnston’s final requirement states that officers cannot use the collected data in any way beyond what is necessary to determine the cell phone information of the target. In a powerful condemnation of the Stingray devices, Johnston states:

“A cell-site simulator is simply too powerful of a device to be used and the information captured by it too vast to allow its use without specific authorization from a fully informed court. Minimizing procedures, such as the destruction of private information the United States has no right to keep, are necessary to protect the goals of the Fourth Amendment.”

[RELATED: FBI Claims They Are Not Responsible for Secrecy on ‘StingRay’ Surveillance]

“As I’m sure you know, applications for court orders for Stingrays have often been fairly misleading, so as not to disclose that the devices being used,” Rachel Levinson-Waldman, an attorney and legal scholar at New York University, told Ars Technica. “So I think this is the first time, or close to it, that a judge has had a chance to address them directly in a published order. That alone is striking.”

Levinson-Waldman also said she believes the judge is using the order to “urge other judges to take the time to understand what stingrays really are.”

The secrecy surrounding the use of these devices has been a contentious topic of debate for several years. However, the use of open records requests and Freedom of Information Act requests has helped paint a clearer picture of how the tools are employed by local, state, and federal agencies.

Truth In Media recently reported that four members of the House Oversight Committee sent letters to 24 federal agencies including the Department of State and the Securities and Exchange Commission, demanding answers regarding policies for using the controversial surveillance technology.

House Oversight Committee Chairman Jason Chaf­fetz, ranking member Elijah Cummings, and Reps. Will Hurd (R-Texas) and Robin Kelly (D-Ill.), members of the committee’s IT subcommittee, issued requests for information related to the potential use of stingrays, also known as cell-site simulators.

Chaf­fetz also recently introduced the Stingray Privacy Act, which would expand newly established warrant requirements for the Department of Justice and Department of Homeland Security to all federal, state, and local agencies that use the cell-site simulators.

In September, the DHS joined the DOJ by announcing warrant requirements for the use of stingray equipment, but the rule changes have come under fire for possible loopholes which may allow the continued use of surveillance equipment without a warrant.

Lawmakers Demand Information on Federal Use of Stingray Surveillance

On Monday, four members of the House Over­sight Com­mit­tee sent letters to 24 federal agencies including the Department of State and the Securities and Exchange Commission, demanding answers regarding policies for using the controversial Stingray surveillance technology.

House Oversight Committee Chairman Jason Chaf­fetz, ranking member Elijah Cummings, and Reps. Will Hurd (R-Texas) and Robin Kelly (D-Ill.), members of the committee’s IT subcommittee, have issued requests for information related to the potential use of stingrays, also known as cell-site simulators.

The Electronic Frontier Foundation described the tracking tool:

[pull_quote_center]

The Stingray is a brand name of an IMSI (International Mobile Subscriber Identity) Catcher targeted and sold to law enforcement. A Stingray works by masquerading as a cellphone tower – to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not – and tricks your phone into connecting to it.

As a result, the government can figure out who, when and to where you are calling, the precise location of every device within the range, and with some devices, even capture the content of your conversations.

[/pull_quote_center]

[Read more: A Guide to Stingray Cellphone Surveillance Technology]

The House Over­sight Com­mit­tee is asking the agencies to provide “policies, guidance, or memoranda” on the use of cell-site simulator technology that may have been used in conjunction with law enforcement operations. The committee is also seeking information related to Stingray use at the state and local levels, as well as copies of the contentious nondisclosure agreements law enforcement must sign in order to operate the equipment. The letters give the agencies a two week deadline to report their findings.

Chaf­fetz recently introduced the Stingray Privacy Act, which would expand newly established warrant requirements for the Department of Justice and Department of Homeland Security to all federal, state, and local agencies that use the cell-site simulators.

In September, the DHS joined the DOJ by announcing warrant requirements for the use of stingray equipment, but the rule changes have come under fire for possible loopholes which may allow the continued use of surveillance equipment without a warrant.

Shortly after the changes were announced, the New York Observer reported that the rule change may have been written in a way which will allow continued tracking, as well as hinder the defense of individuals who suspect they have been monitored by the Stingrays without a warrant.

Nate Cardozo, a staff attorney at the Electronic Frontier Foundation, told the Observer that the use of “criminal investigation” only specifies one kind of work the DOJ performs while pursuing criminals. “For instance, when federal agents use cell-site simulators for ‘national security’ purposes, they won’t be required to obtain a warrant by the terms of this policy,” Mr. Cardozo wrote on the EFF blog.

Senator Patrick Leahy (D-Vt.), the ranking member on the Senate’s Judiciary Committee, also expressed concerns over the language used in the rules, specifically the exemptions to getting a warrant. According to the District Sentinel, Leahy stated, “I will press the Department to justify them.”

How many agencies are using these tools?

Last month Congress held its first hearing on stingray cellphone surveillance. Officials with the Department of Justice and Department of Homeland Security released new details about the federal government’s use of stingray surveillance, including admissions that the equipment does in fact spy on innocent bystanders’ cellphones.

During the hearing, Homeland Security Assistant Secretary Seth M. Stodder revealed a new policy that allows the Secret Service to use cell site simulators without a warrant if they believe there is a “nonspecific threat to the president or another protected person.

Stodder stated that under “exceptional circumstances,” exceptions would be made and use of the device would only require approval from“executive-level personnel” at Secret Service headquarters and the U.S. attorney for the relevant jurisdiction. Despite the exemption, Stodder said the Secret Service would not use the devices in routine criminal investigations.

Just days after the congressional hearing, The Guardian revealed the Internal Revenue Service (IRS) is also making use of the Stingray devices.

As of November 2015, the American Civil Liberties Union has identified at least 45 different local police departments, state and federal agencies who are using the tools. Known federal agencies employing the technology include the DHS, the DOJ, the IRS, the Secret Service, the NSA, and the FBI.

To read more about Truth In Media’s coverage of Stingray surveillance, click here.

Senate Approves CISA Surveillance Bill Masked as ‘Cyber-Security’

UPDATE: The U.S. Senate has officially approved the Cybersecurity Information Sharing Act (CISA) with a vote of 74 to 21. The Senate voted against four amendments aimed at adding consumer protections, including amendments from Sen. Dean Heller, Sen. Ron Wyden, Sen. Pat Leahy, and Sen. Al Franken.

CISA now heads to a conference committee to align the Senate bill with the House of Representatives version. If approved by the committee the bill would go to President Obama to be signed into law.

Last Thursday, with a vote of 83 to 14, the U.S. Senate approved a set of amendments related to CISA which is designed to allow private companies to easily share threat intelligence with government agencies. Critics of the bill say the provisions will only increase the indiscriminate monitoring of legal activity.

Before the vote, Senator Rand Paul introduced an amendment which would require companies to adhere to their own terms of service with customers. However, this amendment failed after only receiving 32 votes. Senator Paul’s presidential campaign website says that the bill “would transform websites into government spies.”

[RELATED: Activists To Bombard Congress With Faxes To Fight Cybersecurity Bill]

Following the vote, Senator Ron Wyden, a long-time opponent of CISA, told the Daily Dot, “We think that information sharing can be useful. But … information sharing without robust privacy protections—millions of Americans are going to say that’s a surveillance bill.”

As Truth In Media recently reported, the supposedly “voluntary” aspects of the bill are not voluntary at all and amount to surveillance of private customer information.

“Number one, it’s not voluntary for their customers, millions and millions of customers,” Wyden explained. “And number two, to get the liability protection, the companies have got to say that they didn’t find anything personal and unrelated in a knowing fashion. And that’s going to be a pretty easy bar because they don’t have to do much to look!”

[RELATED: BROZE: Privacy Advocates Prepare For Battle Over Cybersecurity Bill]

Attempting to pass surveillance measures veiled as “cybersecurity” bills is nothing new. In fact, CISA is seen as the “cousin” of another controversial cybersecurity bill, the Cyber Intelligence Sharing and Protection Act (CISPA), which was defeated by mass opposition in 2012.

Privacy advocates and digital rights groups have been equally vocal in their opposition to CISA. Just days before the vote the Washington Post reported Apple and Dropbox said they did not support the bill. The two companies join Yelp, Reddit, Twitter and the Wikimedia Foundation in their fight against the surveillance bill.

Senator Wyden says the opposition from tech companies has the sponsors of the bill concerned. “I don’t know how many times they kept coming back to the fact that the technology companies really weren’t acting in the interests of the country,” Wyden said. “You saw some of their comments—’There’s no reason for them to be opposed.’ [That] was because they know that these companies are experts in both cyber and privacy. They’re ones that are really knowledgeable about it, and they were opposed to the bill.”

While the bill still has several hurdles to pass before it could become law, privacy advocates and lovers of liberty should keep an eye on the measure as it progresses. It’s time for the free people of the United States, and the world at large, to decide whether or not privacy means anything in 2015.

New Documentary ‘Imminent Threat’ Calls for Alliance of Progressives and Libertarians

The documentary film Imminent Threat is hoping to increase dialogue regarding the impacts of the War on Terror and possibly foster alliances between the Progressive “Left” and Libertarian “Right.”

Imminent Threat examines Edward Snowden’s revelations about NSA spying, the drone war, the war on journalism and other threats to civil liberties. The film also aims to show how these threats to Americans’ rights were started during the Bush administration and expanded by the Democratic establishment under President Obama.

The film was released on September 4th and is directed by Janek Ambros and executive produced by Academy award nominee James Cromwell. Ambros has previously worked on documentaries covering current events, including 2012’s “Closing Bell”, which examined the 2008 financial collapse and bank bailout through the eyes of a Wall Street broker.

https://www.youtube.com/watch?v=CfTdLFo6QSM

Truth In Media’s Derrick Broze caught up with Ambros to discuss his film and what he hopes to achieve.

Broze: What was the biggest challenge to making this film?

Ambros: Logistically, the biggest challenge of the film was getting all the stock footage. I wanted to use archival footage as a creative asset to the film to experiment with fast cutting, mostly influenced by Sergei Eisenstein and Thelma Schoonmaker. From there, I went on to try to break conventions of editing by freeze frames, sped up shots, dropping frames, dissolves, and various editing techniques.

Content wise, the most challenging was creating a more broad approach to the War on Terror. This isn’t necessarily an investigative documentary, but more a macro look at the longest and most ambiguous War on U.S. history and the impact on civil liberties and law. For this reason, structure (similar to structure of a thesis statement or even a narrative screenplay for that matter) was absolutely key and had to convey the overall point of these issues not being left vs right, rather establishment vs non-establishment
politics.

Broze: The film looks at a possible alliance between left and right. What were the challenges in approaching that situation?

Ambros: The most challenging was to remain totally neutral in terms of ‘progressives’ and ‘libertarian.’  The film purposely has three interviewees who are unabashed progressives and three libertarians. This, once again, was essential to make the point that these two cohorts can work together because they have so much overlap in terms of civil liberties and foreign policy.

Broze: Many Americans are familiar with the topics in the film, including the failures of the United State’s foreign policy, the impact of the War on Terror, and the Surveillance State revealed by Edward Snowden. However, unlike other nations, we do not see millions Americans marching in the streets calling for reform. Do you think there is apathy towards awareness of the issues raised in your film?

Ambros: The film focuses on legalities rather than morals. It points out that the Bill of Rights is being abused – whether or not the audience cares about that is hard for me determine. However, through the use of archival, music, atmosphere, and tone, the definitely attempts to convey the importance of civil liberties, rule of law, and a more limited foreign policy. Of course, I was not attempting to make propaganda, but this movie definitely has a point of view and I’ll be the first to admit it.

Broze: If there was to be an alliance of activists and citizens on the left and
right of the political spectrum, what issues do you think would unite these
groups?

Ambros: This is the most important element of the film because this is not talked about much. Other than Ralph Nader’s book, I haven’t seen much on the idea of an alliance between progressives and libertarians on specific issues. The issues they overlap on are civil liberties and limited foreign policy. After that, there is not much they agree on and they’re extreme opposites with economics — one more fearful of government, the other more fearful of corporations.

Broze: Is there hope to reform the growing American police and surveillance
states?

Ambros: I think if there are more people willing to put aside differences and focus on specific issues on at a time, then there could be change. But until then, we’ll have the same monotonous argument between the left and right and nothing will ever get done, not just in terms of civil liberties and foreign policy, but in terms of a plan for the U.S. to move forward and
become a genuine leader in the world for peace and prosperity.

Imminent Threat is now available on iTunes and Amazon. 

Federal Trade Commission Seeks Warrantless Access To Americans’ Emails

On Wednesday, September 16th, members of the Federal Trade Commission (FTC) told Congress that the agency needs power to access emails of Americans without a warrant approved by a judge.

The comments came at a Senate Judiciary Committee hearing on electronic privacy reform related to the Electronic Communications Privacy Act of 2015 (ECPA), a bill with bipartisan support which would require government agencies to get warrants before accessing emails and chats, regardless of how old the content is. The EPCA was first passed in 1986 to help the FTC investigate fraudulent businesses. As of right now, the government can use a process known as administrative subpoena to access messages older than 180 days without a warrant.

The Daily Dot reported:

“The agency said in prepared testimony that it was “concerned that its robust anti-fraud program will suffer if copies of previously public commercial content that advertises or promotes a product or service cannot be obtained directly from the service provider.”

“Without further clarification to recent legislative proposals,” the agency said, “updates to ECPA would appear to prevent the FTC from compelling ECPA service providers to produce such previously public material.”

The U.S. Securities and Exchange Commission also testified against the EPCA. Andrew Ceresney, director of the SEC’s enforcement division, stated, “because the SEC and other civil law enforcement agencies cannot obtain criminal warrants, we would effectively not be able to gather evidence, including communications such as emails, directly from an [Internet Service Provider], regardless of the circumstances.”

The FTC is essentially arguing that without warrantless access to emails and chats, it might not be able to fully execute its mission. Despite the warnings from the FTC, the agency has been unable to list specific cases where warrantless surveillance was vital to an investigation. At the hearing Daniel Salsburg, an attorney with the FTC, said, “I can’t necessarily say it would produce emails that would dramatically further the investigation.”

FTC Commissioner Julie Brill was also critical of the agency’s request to be exempted from the EPCA. In a written statement Brill wrote:

“I am concerned that a judicial mechanism for civil law enforcement agencies to obtain content from ECPA providers could entrench authority that has the potential to lead to invasions of individuals’ privacy and, under some circumstances, may be unconstitutional in practice.”

The FTC was also concerned that under provisions of the EPCA it would not have the ability to access customers information even if they give consent. The FTC argued that:

“A defendant may want to authorize the FTC to obtain documents directly from its cloud computing account, if the records are voluminous, or the defendant’s only copies of the records are maintained on that service.”

The agency said the EPCA 2015 would impede this ability. However, Senator Richard Blumenthal was skeptical of the imagine scenario and asked Salsburg if the situation was common.

“There have been a couple of instances where this has occurred,” Salsburg said, “but it’s not common.”

Google was also critical of the FTC’s arguments. Richard Salgado, Google Inc.’s law enforcement and information security director, told the National Law Journal, “This committee is being asked by some today to jettison precisely the type of categorical rules that the Supreme Court held were imperative.” Salgado is referring to the a unanimous 2014 Supreme Court decision requiring police to obtain a warrant before searching the contents of a cell phone during an arrest.

Thankfully the claims made by the FTC are being met with skepticism and disdain. Unfortunately, the agency is only one of many agencies that are seeking surveillance abilities or already in possession of surveillance tools. Americans who value privacy and freedom should take notice and work to beat back the maneuvers of an increasingly oppressive government.

Federal Judge Lifts 11-Year Surveillance Gag Order on Internet Service Provider

In 2004, Nicholas Merrill, founder of internet service provider (ISP) Calyx Institute, was served a controversial national security letter (NSL) from the Federal Bureau of Investigation. Eleven years later, the NSL’s gag order- which prevented Merrill from discussing the letter he’d received- has been lifted by a federal judge in a historic decision which “marked the first time such a gag order has been fully lifted since the USA Patriot Act in 2001 expanded the FBI’s authority to unilaterally demand that certain businesses turn over records simply by writing a letter saying the information is needed for national security purposes,” according to the Intercept.

NSLs are a tool used by the government to force telecommunication companies to give customer information without the use of a warrant from a judge. While NSLs have been in use since at least the late 1970s, their use has exploded since the 9/11 attacks.

NSLs are generally issued by the FBI to gather information from companies when related to national security investigations. This information can include customer names, addresses, phone and internet records, and banking and credit statements.

According to the Electronic Frontier Foundation, at least 300,000 NSLs have been delivered over the last decade. The year 2004 saw over 56,000 NSLs issued. For comparison, in 2000 before the passage of the Patriot Act which relaxed standards to issue NSLs, there were about 8,500 NSLs sent.

The most contentious part of NSLs is the usage of gag orders. When a credit reporting agency, telecom company, bank or travel firm receive the letters requesting customer information, they are legally gagged and are prohibited from alerting anyone about the incident- not the customer, and not their families. The individual may seek help from a lawyer, but the lawyer then also becomes gagged.

Another alarming feature of NSLs are the fact that a judge is not needed to approve the letter or gag order.

[RELATED: Federal Appeals Court Begins Hearing Arguments on Government Surveillance Gag Order]

Image Credit: Leaksource.info
Image Credit: Leaksource.info

Eventually the FBI would withdraw the NSL because Merrill refused to comply, but Merrill continued to fight, partnering with the American Civil Liberties Union to launch a lawsuit against the FBI in the case Doe v. Ashcroft. In 2010 Merrill was finally able to disclose his identity but the fight against the gag order continued.

On August 28, U.S. District Court Judge Victor Marrero ruled that there was no “good reason” to force Merrill to remain silent about the NSL. After eleven years, the gag order has been lifted and Merrill is almost free to speak about the experience. He remains under gag order for 90 more days as the Justice Department weighs an appeal.

The Intercept reported: 

“‘If Merrill were only allowed to disclose details about the request ‘in a world in which no threat of terrorism exists,’ or in the case that the FBI disclosed the records itself — two extremely unlikely possibilities — it would effectively prevent ‘accountability of the government to the people,’ the judge wrote.”

Judge Marrero also stated that the FBI’s position was “extreme and overly broad,” and reminded the government that “Courts cannot, consistent with the First Amendment, simply accept the Government’s assertions that disclosure would implicate and create a risk.”

In a press release from the Calyx Institute, Merrill writes, “Judge Marrero’s decision vindicates the public’s right to know how the FBI uses warrantless surveillance to peer into our digital lives. I hope today’s victory will finally allow Americans to engage in an informed debate about proper the scope of the government’s warrantless surveillance powers.”

Jonathan Manes, supervising attorney in the Media Freedom and Information Access Clinic, commented on the ruling, stating, “Today’s decision will finally allow Mr. Merrill to shed light on the scope of the FBI’s claimed authority under the NSL statute, and to explain how the FBI’s interpretation is deeply problematic and potentially unlawful.”

Truth In Media has previously written about other efforts to reign in the use of National Security Letters. In October 2014, the Electronic Frontier Foundation (EFF) asked an appeals court to uphold a ruling that found the NSL provision of the Patriot Act to be unconstitutional.

In 2013, the unnamed company took their NSL to court to debate its constitutionality. U.S. District Judge Susan Illston in San Francisco ruled that the NSLs violated the First Amendment by removing the recipient’s ability to speak about the letter. The EFF and the company itself face federal prison time if they choose to reveal the names of the defendants.

What are your thoughts on National Security Letters? Do you believe this ruling will slow down the surveillance state? Leave your comments below.

Senator Patrick Leahy, Privacy Groups Question DOJ’s New Rules on Surveillance

A recent announcement by the U.S. Department of Justice regarding new rules for federal law enforcement agencies using cellphone tracking technology may not be as effective as originally touted by the DOJ.

Truth In Media’s Rachel Blevins reported on the new rules:

“The U.S. Department of Justice announced on Thursday that it will now require U.S. prosecutors and some federal law enforcement agencies to obtain a search warrant in order to use cellphone tracking technology.

In a statement, the DoJ said that the new policy “goes into effect immediately” and will “provide department components with standard guidance for the use of cell-site simulators in the department’s domestic criminal investigations,” and “establish new management controls for the use of the technology.”

Before the change in policy, U.S. government agencies were permitted to use cell-site simulators or “stingray” devices to replicate phone towers in order to track a phone’s location without applying for a warrant or giving probable cause.”

However, shortly after the announcement was published, The New York Observer reported that the rule change may have been written in a way which will allow continued tracking, as well as hinder the defense of individuals who suspect they have been monitored by the Stingrays without a warrant.

The Observer writes:

“The twist in a new Department of Justice guidance on tracking people using their cell phones is tucked in its first footnote. What looks like a positive step in terms of protecting Americans privacy in the ever deepening surveillance state might in fact be a sort of misdirection. The first footnote reads:

This policy applies to cell-site simulator technology inside the United States in furtherance of criminal investigations.”

Nate Cardozo, a staff attorney at the Electronic Frontier Foundation, told the Observer that the use of “criminal investigation” only specifies one kind of work the DOJ performs while pursuing criminals. “For instance, when federal agents use cell-site simulators for ‘national security’ purposes, they won’t be required to obtain a warrant by the terms of this policy,” Mr. Cardozo wrote on the EFF blog.

Senator Patrick Leahy (D-Vt.), the ranking member on the Senate’s Judiciary Committee, also expressed concerns over the language used in the rules, specifically the exemptions to getting a warrant. According to the District Sentinel, Leahy stated, “I will press the Department to justify them.”

The rule change states that in “exigent” and “exceptional” circumstances obtaining a warrant is not necessary. The department described exigent circumstances, including “the need to protect human life or avert serious injury; the prevention of the imminent destruction of evidence; the hot pursuit of a fleeing felon; or the prevention of escape by a suspect or convicted fugitive from justice.”

Although the department says the instances in which getting a warrant is “impractical” will be limited, no examples of circumstances that fit the bill were offered.

The American Civil Liberties Union released a statement calling the new rules a step in the right direction, but also commented on problematic areas.

Staff Attorney Nathan Freed Wessler writes:

“Disturbingly, the policy does not apply to other federal agencies or the many state and local police departments that have received federal funds to purchase these devices. In addition, the guidance leaves the door open to warrantless use of Stingrays in undefined ‘exceptional circumstances,’ while permitting retention of innocent bystander data for up to 30 days in certain cases.”

Cardozo also said for defendants who are arrested under evidence obtained in a warrantless use of a cell-site simulator, “You’re out of luck.”

Emily Pierce, a spokesperson for the Department of Justice, responded to The Observer’s questions about the language of the rules. Pierce wrote:

“When acting pursuant to national security authorities, such as the Foreign Intelligence Surveillance Act, Justice Department components will be required to make a probable-cause based showing as well as make appropriate disclosures to the court in a manner that is consistent with the Department’s cell-site simulator policy.”

The DOJ’s rules also promise that  “the Department must always use the technology in a manner that is consistent with the Constitution and all other legal authorities.”

Despite the DOJ’s promises, privacy advocates are likely not going to be won over by the rules. Truth In Media recently wrote about a report from the Center for Investigative Reporting which revealed that police in Chicago and Los Angeles are using advanced cell site simulators, or Stingray surveillance technology capable of breaking cellphone encryption.

Truth In Media has written extensively about how the devices are being used to track suspected criminals while largely operating without oversight from local, state, or federal authorities. Exactly how the devices operate and what data they collect and/or save has been unknown because of a vast amount of secrecy surrounding the tools.

Most of the available information been released through the efforts of intrepid investigative journalists and Freedom of Information Act (FOIA) activists has related specifically to the manufacturer of the Stingray – the Harris Corporation. The Harris Corporation has exercised a great amount of secrecy surrounding these tools. Truth In Media previously reported on documents which revealed the Harris Corp. worked with the Federal Communications Commission to maintain a high level of secrecy. I have also documented the fact that Harris Corp. lied to the FCC in their application for the use of cell site simulators.

[Read more about government involvement in stingrays here.]

Is the American public expected to believe that the new rules from the DOJ will actually reign in the surveillance state? The new rules do not change the law, so essentially the change amounts to promises from the federal government. Even if Americans take the feds on their word, what about the local police departments who are also using the devices without warrants? How can we ever trust that Big Brother is not watching or listening?

Leave your thoughts below.

Chicago, L.A. Police Using ‘Stingray’ Surveillance Capable of Breaking Encryption

A new report from the Center for Investigative Reporting reveals that police in Chicago and Los Angeles are using advanced cell site simulators, or “Stingray” surveillance technology capable of breaking cellphone encryption. Truth In Media has written extensively about how the devices are being used to track suspected criminals while largely operating without oversight from local, state, or federal authorities. Exactly how the devices operate and what data they collect and/or save has been unknown because of a vast amount of secrecy surrounding the tools.

[RELATED: Newly Released “StingRay” Manual Shows Company Asked FCC for Secrecy]

According to the Electronic Frontier Foundation:

“THE STINGRAY IS A BRAND NAME OF AN IMSI (INTERNATIONAL MOBILE SUBSCRIBER IDENTITY) CATCHER TARGETED AND SOLD TO LAW ENFORCEMENT.

A STINGRAY WORKS BY MASQUERADING AS A CELL PHONE TOWER—TO WHICH YOUR MOBILE PHONE SENDS SIGNALS TO EVERY 7 TO 15 SECONDS WHETHER YOU ARE ON A CALL OR NOT— AND TRICKS YOUR PHONE INTO CONNECTING TO IT. AS A RESULT, THE GOVERNMENT CAN FIGURE OUT WHO, WHEN AND TO WHERE YOU ARE CALLING, THE PRECISE LOCATION OF EVERY DEVICE WITHIN THE RANGE, AND WITH SOME DEVICES, EVEN CAPTURE THE CONTENT OF YOUR CONVERSATIONS.”

[RELATED: Company Behind Stingray Cell Phone Surveillance Tool Lied to the FCC]

Most of the information been released through the efforts of intrepid investigative journalists and Freedom of Information Act (FOIA) activists has related specifically to the manufacturer of the Stingray – the Harris Corporation. The Harris Corporation has exercised a great amount of secrecy surrounding these tools. Truth In Media previously reported on documents which revealed the Harris Corp. worked with the Federal Communications Commission to maintain a high level of secrecy. I have also documented the fact that Harris Corp. lied to the FCC in their application for the use of cell site simulators.

The Harris Corporation needs to be investigated and held accountable, but they are just one of the corporations producing cell site simulators. The devices being used by the Los Angeles and Chicago police departments are known as “dirt boxes”. They operate in the same fashion as the Stingray, however, these new documents reveal they are also capable of jamming transmissions, and breaking encryption. The CIR writes:

“The sophisticated surveillance equipment, manufactured by Digital Receiver Technology (DRT) Inc., a Maryland company acquired by The Boeing Co. in 2008, provides a more powerful class of cell-site simulator than the more widely used StingRay devices produced by Harris Corp., which require an upgrade to intercept communications and data transmissions. According to Digital Receiver Technology’s documentation, its devices are capable of breaking encryption on communications from 200 cellphones simultaneously across state-of-the-art 4G LTE frequencies used for rapid data transmission by the latest generation of smartphones.”

A cell site simulator from DRT
A cell site simulator from DRT

Digital Receiver Technology first did business with the Chicago police in 2005 with the purchase of a cell site simulator. The device was paid for with funds collected from asset forfeiture cases. Meanwhile cops in Los Angeles purchased a package from Digital Receiver Technology using $260,000 in homeland security grant funding. Both departments also use the Harris Corp’s Stingray device as well.

Procurement documents obtained by the CIR show that the United States Navy purchased  Digital Receiver Technology equipment to mount on drones at its China Lake research and development facility in Southern California. According to the CIR documents the technology is also used by the U.S. Special Operations Command, Drug Enforcement Administration, FBI and U.S. Customs and Border Protection.

The major difference between the Stingray and the DRT boxes is the ability of the more advanced DRT devices to break encryption. A 2011 purchase order for this equipment by the Washington Headquarters Services, a branch of the Pentagon, states the devices can retrieve the encryption session keys for a cellphone “in less than a second with success rates of 50 to 75% (in real world conditions).”

Chicago and Los Angeles police officials will not confirm or deny the use of or possession of the devices.

Freddy Martinez, the activist who sued the Chicago Police Department for records related to cell site simulators, says the potential for spying is unlimited. “With DRT, if you put one of these on an airplane and fly them around, you can find all sorts of info about potentially thousands of people. That includes voice content, who they’re calling, what data they’re sending. It’s like a StingRay on steroids.”

Martinez is not exaggerating. In late 2014, the Wall Street Journal revealed the existence of a cell-phone monitoring program being operated by the U.S. Marshals Service using small planes. The program involved the Marshals using Cessna planes mounted with cell-site simulators.

The so-called Dirtboxes are supposed to be used for criminal investigations, but the ACLU says they can collect data from tens of thousands of people on each flight. The Electronic Frontier Foundation filed a FOIA request with the Department of Justice and FBI but has yet to receive any additional information. The EFF has now filed suit against the DOJ and FBI.

In early March of 2015, it was also revealed that the CIA has been working with the Marshals on the program. Over the last ten years, the U.S. Marshal’s Technical Operations Group worked with the CIA’s Office of Technical Collection to develop the technology. The agencies have spent more than $1 million developing the technology.

In June it was revealed that agencies within the U.S. government operate fake, front companies to handle surveillance flights. Some of these flights included monitoring protesters in Baltimore.

With multiple agencies of the local, state, and federal governments operating devices capable of monitoring and storing your information, as well as cracking encryption, can it truly be said that the people are free? The freedom to have privacy is one of the greatest freedoms that humans have. If we are not free to our own private affairs, we are not free.

Check out this Guide to Stingray Technology for more information.

Audit of U.S. Postal Service Shows Extensive Use of Surveillance

The existence of a surveillance program exclusively focused on traditional “snail” mail has been known since at least the beginning of 2014. In December 2014, Truth In Media’s Barry Donegan wrote:

“At a hearing before the House of Representatives last month, USPS Deputy Inspector General Tammy Whitcomb exposed the fact that the mail carrier only rejected a fraction of a percent of thousands of requests for citizens’ mail records by law enforcement and government officials, including many queries that have been deemed unjustified.

Following leaks exposing the fact that the National Security Agency has been spying on Americans’ digital communications in an indiscriminate and warrantless fashion, SFGate is reporting that the United States Postal Service has also been compiling Americans’ mail records into a nationwide dragnet and giving those records to law enforcement agencies at all levels of government. Under the US Postal Service’s mail covers program, the cover of every piece of mail is photographed, and the subsequent image stored in a database just in case law enforcement might need it at a later date.”

Once the program was first exposed, a USPS watchdog performed an internal audit of the agency and its surveillance measures. That audit was released in May 2014 but several sections were heavily redacted. However, a recent report from the New York Times reveals new details on the program.

“An unredacted copy of the report was provided to a security researcher in response to a Freedom of Information Act request this year. The researcher, who goes by a single legal name, Sai, shared the report with The New York Times.

In a June 8 letter to Sai, the Postal Inspection Service — the Postal Service’s law enforcement arm — said it could not “confirm or deny the existence” of the national security mail cover program, even though it was mentioned in the audit.

“The Postal Service does not provide public comment on matters which could potentially involve national security interests,” Paul J. Krenn, a spokesman, said in an email. The Postal Inspection Service did tell the auditors that it had begun training its employees on handling classified materials.”

The report concerns requests for mail cover photos from 2011 to 2013. The report does not mention which federal agencies are behind the requests. The report did say that the largest users of mail covers were the FBI, the Internal Revenue Service, the Drug Enforcement Administration and the Department of Homeland Security.

Several interesting facts are revealed through the uncensored audit. First, about ten percent of requests do not include the dates covered by surveillance, making it impossible to know if law enforcement followed procedure. Another fifteen percent of inspectors handling the mail covers did not have the proper nondisclosure agreements which prevent them from discussing classified information. This might leave room open for whistleblowers who are technically not legally obligated to remain silent on mail cover surveillance.

The audit also found that in the 32 percent of the cases, law enforcement officers did not return documents to the Postal Inspection Service’s Office of Counsel within the allotted 60 days after cases are closed.

The new details of the audit show the USPS failing to maintain proper records and ensure that Americans are not haphazardly being spied upon, as is already the case with digital communications. Future investigations may reveal that the Postal Service is another agency of the government using taxpayer money to monitor innocent civilians.

What are your thoughts? Leave your comments below.

Supreme Court May Review U.S. Government’s Cellphone ‘Kill Switch’

On August 11, the Electronic Privacy Information Center (EPIC) filed a petition with the  U.S. Supreme Court in their latest effort to force the U.S. government to reveal information about a cellphone shutdown policy, also known as a “kill switch”.

EPIC has fought for records related to the program since July 2011, when it was revealed that Bay Area Rapid Transit (BART) officials in San Franscico shut down cellular networks during a protest of a murdered homeless man. BART denies blocking cell networks. In July 2012, EPIC submitted a FOIA request to the Department of Homeland Security to find out more about the procedures governing such actions.

The DHS initially claimed that they were “unable to locate or identify any responsive records.” However, on November 12, 2013, a District Court ruled that the DHS improperly withheld information, specifically information regarding something known as Standard Operating Procedure 303 or SOP 303. The DHS appealed this decision and was once again allowed to withhold records. Now EPIC is taking the fight to the Supreme Court.

In their petition to the Supreme Court, EPIC argues that, “[a]bsent Supreme Court review, the decision of the court of appeals could transform the FOIA from a disclosure to a withholding statute.”

Little is known about these programs, but EPIC writes that “a 2011 Report from the White House asserted that the National Security Council and the Office of Science and Technology Policy have the legal authority to control private communications systems in the United States during times of war or other national emergencies.

Also, on July 6, 2012, the White House approved an Executive Order seeking to ensure the continuity of government communications during a national crisis. As part of the Executive Order, DHS was granted the authority to seize private facilities, when necessary, effectively shutting down or limiting civilian communications.”

EPIC has asked the court for three specific pieces of information regarding the kill switch program. They want to see the full text of SOP 303; the full text of the pre-determined “series of questions” that determines if a shutdown is necessary; and any executing protocols related to the implementation of SOP 303, distributed to DHS, other federal agencies, or private companies, including protocols related to oversight of shutdown determinations.

SOP 303 is invaluable in helping the public understanding the true nature and depth of this program. Without understanding how basic procedure around the kill switch works the public is operating in the dark, never knowing when the government might decide conditions permit a shutdown of cellular networks. EPIC also argues that Freedom of Information Act requests, specifically Exemption 7(F) which allows for withholding documents if they are expected to endanger the safety of any individual, are being abused.

What will be the outcome? Will the U.S. Supreme Court take the case and finally give the American public a glimpse into yet another program operated by the State? Or will Americans continue to operate in ignorance? Leave your comments below.

California Considers Limiting Use of Stingray Surveillance

Two bills currently making their way through the California legislature would limit the use of “stingray” cell phone surveillance by law enforcement. Both bills (SB178 and SB741) were recently unanimously passed out of Assembly committees.

Senate Bill 178, introduced in February by California Senators Mark Leno (D) and Joel Anderson (R), would “prohibit a government entity from compelling the production of or access to electronic communication information or electronic device information without a search warrant, a wiretap order, or an order for electronic reader records.”  The bill would also require a warrant before using a cell site simulator, commonly known as a “Stingray”. Under the bill, information collected without consent must be destroyed within 90 days, and law enforcement cannot gather more information than is necessary to achieve the objective of the search.

According to the Electronic Frontier Foundation:

“THE STINGRAY IS A BRAND NAME OF AN IMSI (INTERNATIONAL MOBILE SUBSCRIBER IDENTITY) CATCHER TARGETED AND SOLD TO LAW ENFORCEMENT.

A STINGRAY WORKS BY MASQUERADING AS A CELL PHONE TOWER—TO WHICH YOUR MOBILE PHONE SENDS SIGNALS TO EVERY 7 TO 15 SECONDS WHETHER YOU ARE ON A CALL OR NOT— AND TRICKS YOUR PHONE INTO CONNECTING TO IT. AS A RESULT, THE GOVERNMENT CAN FIGURE OUT WHO, WHEN AND TO WHERE YOU ARE CALLING, THE PRECISE LOCATION OF EVERY DEVICE WITHIN THE RANGE, AND WITH SOME DEVICES, EVEN CAPTURE THE CONTENT OF YOUR CONVERSATIONS.”

Police officers can use the devices to track your cellphones signal.  Once the signal is located the stingray can provide a general location on the map and police officers can drive around (or in one case, walk door to door) until they get a signal from your phone. This has civil liberties advocates up in arms over the potential for misuse of the tools.

The Tenth Amendment Center reports that “representatives from a number of big tech firms including Facebook. Google, Lyft and Tech Freedom” came to support SB 178. According to the Tenth Amendment Center:

“Sen. Jerry Hill, Sen. Joel Anderson and Sen. Mark Leno introduced SB741 earlier this year. The bill would prohibit a local agency from acquiring or using a stingray device unless “approved by a resolution or ordinance adopted by its legislative body at a regularly scheduled public meeting where the public has a reasonable opportunity to comment.”

The bill also requires the resolution or ordinance to set forth policies on stingray use based on specific guidelines outlined in the legislation.

The Committee on Local Government passed SB741 9-0 on Wednesday. It now moves on to the Committee on Appropriations, where it will be considered after the summer break in mid-August.”

Both bills will be considered by the appropriate committees before facing a full vote in the California State Senate. A similar bill was passed in Washington earlier this year. A number of police departments around the country are now facing questions and criticism as the public has slowly learned about the devices.

For the last decade local police across the nation have been purchasing and training in the use of  Stingrays. TruthInMedia has written extensively on how the devices are being used to track suspected criminals while largely operating without oversight from local, state, or federal authorities. Exactly how the devices operate and what data they collect and/or save has been unknown because a vast amount of secrecy surrounding the tools.

 

Both the Harris Corporation that manufactures the StingRay and the Federal Bureau of Investigations require police to sign non-disclosure agreements related to the use of the devices. Through these NDAs local police departments have become subordinate to Harris and even in court cases in front of a judge, are not allowed to speak on the details of their arrangements. 

For more information check out this Guide to Stingray Technology.

New Documents Reveal Growing Database of License Plate Reader Cameras

The American Civil Liberties Union (ACLU) has received new documents via Freedom of Information Act requests that show the National Highway Traffic Safety Administration (NHTSA) has granted hundreds of thousands of dollars to local and state law enforcement agencies for the purchase of automatic license plate reader (ALPRs) systems.

ALPRs are used to gather license plate, time, date and location, that can be used to create a detailed map of what individuals are doing. The devices can be attached to light poles, or toll booths, as well as on top of or inside law enforcement vehicles. In 2012 the Wall Street Journal reported that the five previous years the Department of Homeland Security distributed over $50 million in grants to fund the acquisition of license plate readers.

The ACLU writes:

“The NHTSA is funding license plate readers for highway safety purposes only, but it’s far from clear how law enforcement agencies are interpreting this and whether they are using the funding to buy license plate readers for non-safety uses. The NHTSA should not be funding police technology for surveillance purposes and it should not let law enforcement apply for funding to decrease traffic fatalities and then turn around and use those funds to track people not suspected of any crime.”

The documents show that various state agencies received NHTSA funds for the purchase of ALPRs in order to document highway safety. While much of the grants are intended to be used to study highway safety, traffic congestion or similar benign activities the cameras have been shown to record other perfectly legal behavior. The ACLU has previously released documents that show the Drug Enforcement Administration (DEA) was indeed using ALPRs to photograph vehicle occupants.

[quote_box_center]”We still do not know how police departments proposed to use license plate readers to improve ‘Safety Belt Performance’; does this mean the government would use the cameras to take pictures of people inside cars to see if they’re wearing seatbelts?” – American Civil Liberties Union[/quote_box_center]

Grants for the ALPRs have gone to law enforcement agencies in Vermont, Missouri, Nebraska, New Jersey, California, Oregon, Massachusetts, and Illinois. Indiana requested funds, but it is unclear if NHTSA granted the funds. New York Division of Criminal Justice Services requested funding to purchase 70 license plate readers in 2008. It is also unclear if these funds were granted.

In May it was revealed that the FBI invested hundreds of thousands of dollars in license-plate reader technology despite conflicts regarding privacy concerns, according to newly released documents from the bureau.

The documents were also released through a Freedom of Information Act request by the ACLU. Although heavily redacted, the emails show internal discussion on surveillance concerns related to the network of cameras that are used to capture and store license plate information.

In January TruthInMedia reported that the ACLU revealed the existence of a national program operated by the DEA  that collects and analyzes license plate information.

According to heavily redacted documents obtained through Freedom of Information Act Requests, the DEA has gathered as many as 343 million records in the National License Plate Recognition program. The initiative allows the DEA to connect its ALPRs and collected data with that of law enforcement agencies around the nation.

One document shows the DEA has at least 100 license plate readers in eight states, including California, Arizona, New Mexico, Texas, Florida, Georgia, and New Jersey. Law enforcement in Southern California’s San Diego and Imperial Counties and New Jersey are among the agencies providing the DEA with data. The program opened to local and state partners in 2009.

The Customs and Border Patrol (CBP) is one of the federal agencies working with the DEA. The documents also reveal the program mining license plate reader data “to identify travel patterns.”  The DEA has established 100 license plate readers in eight states, including California, Arizona, New Mexico, Texas, Florida, Georgia, and New Jersey. A 2010 document also explains that the DEA had by then set up 41 plate reader monitoring stations throughout Texas, New Mexico, and California.

For more information check out the ACLU’s report “You Are Being Tracked: License Plate Readers Explained”