Showing posts with label Surveillance. Show all posts
Showing posts with label Surveillance. Show all posts

18 July 2013

Tom Hayden : Is Obama Really in Control?

This plane carrying Bolivian President Evo Morales was forced to land in Vienna despite Obama's earlier comment that he "wouldn't scramble jets against a 29 year old hacker." Photo by Andres Gutierrez / AP.
Refs being 'worked'?
Does Obama control the State?
The executive branch has aided in the unaccountable growth of a Frankenstein-like Leviathan which now is beyond the control of its own makers, operating outside the levers of democratic oversight and control
By Tom Hayden / The Rag Blog / July 18, 2013

It seemed weird, off-handed, President Obama's comment that he "wouldn't scramble jets against a 29 year old hacker," just two days before the U.S. forced down a Bolivian plane carrying Evo Morales on the suspicion that Edward Snowden was smuggled aboard. Diplomatic hell broke loose, with Brazil, Venezuela, Nicaragua, Ecuador, and others all accusing the U.S. of violating their sovereignty.

With all the talk of Big Data, it's hard to believe that Snowden couldn't be detected enroute from the Moscow transit lounge to the departure gate for a Bolivian airliner. That aside, one wonders what if any was the connection between Obama's remark and the forcedown which subsequently happened.

Obama presumably was trying to squelch rumblings coming from within the national security state. After all, if some of the U.S. hardliners want Julian Assange, Snowden, and their ilk executed, or tried for treason before being executed, the same types might contemplate a Special Operation to render Snowden off a foreign airliner.

As for Evo Morales, I was told by a U.S. ambassador during the Clinton administration that he was a "very bad guy" who had tried to kill American diplomats, a good example of our intelligence demented..

The problem revealed by the incident is not a new one, and not for this president alone. Can we be confident that the president controls the permanent executive branch, especially the "intelligence" apparatus? Or is it not possible that key elements of the apparatus have been fabricating intelligence, pulling strings, "working the refs," boxing in the White House, asking forgiveness rather than permission, whatever one calls it, and running a foreign policy of their own?

If anyone is shocked by this, it's all happened before. Several presidents were threatened with blackmail by FBI director J. Edgar Hoover who ran what one U.S. senator called a "Gestapo-operation." John and Robert Kennedy had to go around their own generals and conspire with the Soviets to cool down the Cuban missile crisis when it was at the brink.

JFK circumvented the generals and CIA by fudging an agreement in Laos. Richard Nixon and the China Lobby foiled Lyndon Johnson's election-year plan for peace talks by getting the Saigon generals to hold out until after the election. Jimmy Carter was forced to keep diplomacy with Cuba secret from his own State Department negotiators in the late Seventies. Bob Woodward's Obama's Wars documents how generals Petraeus and McChrystal tried to trap the president into a "forever war."

And before all of them, President Eisenhower warned that, "In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist." [1961]

And now this: starting with the Bush era, the top-secret Foreign Intelligence Surveillance Court [FISA] has morphed into a de facto parallel Supreme Court writing and implementing a virtual constitution for the War on Terrorism era. This secret court, appointed in its entirety by the right-wing Supreme Court Justice John Roberts, has approved 1,800 surveillance orders during the past year alone, while rejecting none.

There is no adversary proceeding in this new equivalent of a Star Chamber. There are virtually no public findings. The FISA court has ruled, in secret proceedings, that the vacuuming up of "meta data" on many millions of citizens is a "special needs" exception to the Fourth Amendment ban on state searches and seizures without a warrant.

Some of the secret court's opinions are said to be nearly 100 pages in length, issued without adversarial proceedings and virtually beyond appeal. Just because Obama is a constitutional lawyer doesn't mean that he's devoted detailed attention to this runaway construction of a new constitution -- until something like the Snowden revelations force his attention.

"It has quietly become almost a parallel Supreme Court," according to Eric Lichtblau in The New York Times [July 7], providing a veritable new constitutional framework for every agency engaged in activities under the umbrella of "national security." A similar extra-constitutional project has been underway for decades to rewrite the rules of private marketplace governance in the era of corporate globalization.

Both thrusts, toward privatization and intelligence wars, represent a gradual movement towards a new legal framework for Empire which minimizes or circumvents democratic processes. The NSA plus the WTO are the "new world order" that George Bush I mused about.

Obama, who is responsible for this mushroom cloud of secrecy, seems occasionally to cry for help at his recognition that it's spiralling out of control. Since 2012, Obama has officially "welcomed" public conversation, debate, and Congressional drafting of a "new legal architecture" in order to "rein in" his growing imperial presidency and those which are likely to follow.

His inability to implement meaningful change, however, is a remarkable illustration of the limits of the presidency. There is no sign either of Congressional willingness to re-draft the 1973 War Powers Act to cover drones, secret wars like Libya, or the growth of executive-branch cyberwar. The federal courts are complicit in the private rewriting of the Fourth Amendment and the democratic guarantees of the Constitution.

It is not only the shadow of secrecy over democracy, but the apparent grip of secret forces in the executive branch over public policy. Last week the U.S. supported a military coup in Egypt in express violation of Congressional funding restrictions, and without public hearings. Last month, the President reiterated his five-year old pledge to close Guantanamo, get detainees off life-threatening hunger strikes, and repatriate many who already are cleared for release.

As of now, those straightforward orders have not been carried out. Someone is blocking them.

A secret coup hasn't fully happened yet, and may not, given the nature of American pluralism. But the executive branch has aided in the unaccountable growth of a Frankenstein-like Leviathan which now is beyond the control of its own makers, operating outside the levers of democratic oversight and control.

Obama's occasional comments welcoming a "conversation" may be seen as muted alarms. If he cannot "rein in" the new Imperial Presidency, a populist protest could be slowly building toward either an insurgency presidential campaign, an uprising, or both.

[Tom Hayden is a former California state senator and leader of Sixties peace, justice, and environmental movements. He currently teaches at Pitzer College in Los Angeles. His latest book is The Long Sixties. Hayden is director of the Peace and Justice Resource center and editor of The Peace Exchange Bulletin. Read more of Tom Hayden's writing on The Rag Blog.]

The Rag Blog

[+/-] Read More...

04 July 2013

Todd Gitlin : The Wonderful World of Informers and 'Agents Provocateurs'


Old school spying. Image from Outside the Beltway.
Close encounters of the lower-tech kind:
The wonderful American world of
informers and agents provocateurs
Here is a preliminary attempt to sort out some patterns behind what could be the next big story about government surveillance and provocation in America.
By Todd Gitlin / The Rag Blog / July 4, 2013
Sociologist, mass media critic, and political writer Todd Gitlin will discuss issues raised in this article and more with Rag Blog editor Thorne Dreyer on Rag Radio, Friday, July 19, 2013, from 2-3 p.m. (CDT) on KOOP 91.7-FM in Austin, and streamed live to the world. The show is rebroadcast by WFTE-FM in Mt. Cobb and Scranton, PA, Sunday mornings at 10 a.m. (EDT), and all podcasts are posted at the Internet Archive.
Only Martians, by now, are unaware of the phone and online data scooped up by the National Security Agency (though if it turns out that they are aware, the NSA has surely picked up their signals and crunched their metadata). American high-tech surveillance is not, however, the only kind around. There’s also the lower tech, up-close-and-personal kind that involves informers and sometimes government-instigated violence.

Just how much of this is going on and in how coordinated a way no one out here in the spied-upon world knows. The lower-tech stuff gets reported, if at all, only one singular, isolated event at a time -- look over here, look over there, now you see it, now you don’t.

What is known about such surveillance as well as the suborning of illegal acts by government agencies, including the FBI, in the name of counterterrorism has not been put together by major news organizations in a way that would give us an overview of the phenomenon. (The ACLU has done by far the best job of compiling reports on spying on Americans of this sort.)

Some intriguing bits about informers and agents provocateurs briefly made it into the public spotlight when Occupy Wall Street was riding high. But as always, dots need connecting. Here is a preliminary attempt to sort out some patterns behind what could be the next big story about government surveillance and provocation in America.


Two stories from Occupy Wall Street

The first is about surveillance. The second is about provocation.

On September 17, 2011, Plan A for the New York activists who came to be known as Occupy Wall Street was to march to the territory outside the bank headquarters of JPMorgan Chase. Once there, they discovered that the block was entirely fenced in. Many activists came to believe that the police had learned their initial destination from e-mails circulating beforehand. Whereupon they headed for nearby Zuccotti Park and a movement was born.

The evening before May Day 2012, a rump Occupy group marched out of San Francisco’s Dolores Park and into the Mission District, a neighborhood where not so many 1-percenters live, work, or shop. There, they proceeded to trash “mom and pop shops, local boutiques and businesses, and cars,” according to Scott Rossi, a medic and eyewitness, who summed his feelings up this way afterward: “We were hijacked.” The people “leading the march tonight,” he added, were
clean cut, athletic, commanding, gravitas not borne of charisma but of testosterone and intimidation. They were decked out in outfits typically attributed to those in the "black bloc" spectrum of tactics, yet their clothes were too new, and something was just off about them. They were very combative and nearly physically violent with the livestreamers on site, and got ignorant with me, a medic, when I intervened... I didn’t recognize any of these people. Their eyes were too angry, their mouths were too severe. They felt "military" if that makes sense. Something just wasn’t right about them on too many levels.
He was quick to add,
I’m not one of those tin foil hat conspiracy theorists. I don’t subscribe to those theories that Queen Elizabeth’s Reptilian slave driver masters run the Fed. I’ve read up on agents provocateurs and plants and that sort of thing and I have to say that, without a doubt, I believe 100% that the people that started tonight’s events in the Mission were exactly that.
Taken aback, Occupy San Francisco condemned the sideshow: “We consider these acts of vandalism and violence a brutal assault on our community and the 99%.”

Where does such vandalism and violence come from? We don’t know. There are actual activists who believe that they are doing good this way; and there are government infiltrators; and then there are double agents who don’t know who they work for, ultimately, but like smashing things or blowing them up.

By definition, masked trashers of windows in Oakland or elsewhere are anonymous. In anonymity, they -- and the burners of flags and setters of bombs -- magnify their power. They hijack the media spotlight. In this way, tiny groups -- incendiary, sincere, fraudulent, whoever they are -- seize levers that can move the entire world.

On May Day 2012, an Occupy rump group trashed San Francisco's Mission District, instigated and led, many were convinced, by agents provocateurs. Image from The Wren Project

The sting of the clueless bee

Who casts the first stone? Who smashes the first window? Who teaches bombers to build and plant actual or spurious bombs? The history of the secret police planting agents provocateurs in popular movements goes back at least to nineteenth century France and twentieth century Russia. In 1905, for example, the priest who led St. Petersburg’s revolution was some sort of double agent, as was the man who organized the assassination of the Czar’s uncle, the Grand Duke.

As it happens, the United States has its own surprisingly full history of such planted agents at work turning small groups or movements in directions that, for better or far more often worse, they weren’t planning on going. One well-documented case is that of "Tommy the Traveler,” a Students for a Democratic Society (SDS) organizer who after years of trying to arouse violent action convinced two 19-year-old students to firebomb an ROTC headquarters at Hobart College in upstate New York. The writer John Schultz reported on likely provocateurs in Chicago during the Democratic National Convention of 1968.

How much of this sort of thing went on? Who knows? Many relevant documents molder in unopened archives, or have been heavily redacted or destroyed.

As the Boston marathon bombing illustrates, there are homegrown terrorists capable of producing the weapons they need and killing Americans without the slightest help from the U.S. government. But historically, it’s surprising how relatively often the gendarme is also a ringleader. Just how often is hard to know, since information on the subject is fiendishly hard to pry loose from the secret world.

Through 2011, 508 defendants in the U.S. were prosecuted in what the Department of Justice calls “terrorism-related cases.” According to Mother Jones's Trevor Aaronson, the FBI ran sting operations that “resulted in prosecutions against 158 defendants” -- about one-third of the total. “Of that total, 49 defendants participated in plots led by an agent provocateur -- an FBI operative instigating terrorist action. With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings.”

In Cleveland, on May Day of 2012, in the words of a Rolling Stone exposé, the FBI “turned five stoner misfits into the world's most hapless terrorist cell.” To do this, the FBI put a deeply indebted, convicted bank robber and bad-check passer on their payroll, and hooked him up with an arms dealer, also paid by the Bureau. The FBI undercover man then hustled five wacked-out wannabe anarchists into procuring what they thought was enough C4 plastic explosive to build bombs they thought would blow up a bridge. The bombs were, of course, dummies. The five were arrested and await trial.

What do such cases mean? What is the FBI up to? Trevor Aaronson offers this appraisal:
The FBI's goal is to create a hostile environment for terrorist recruiters and operators -- by raising the risk of even the smallest step toward violent action. It's a form of deterrence… Advocates insist it has been effective, noting that there hasn't been a successful large-scale attack against the United States since 9/11. But what can't be answered -- as many former and current FBI agents acknowledge -- is how many of the bureau's targets would have taken the step over the line at all, were it not for an informant.
Perhaps Aaronson is a bit too generous. The FBI may, at times, be anything but thoughtful in its provocations. It may, in fact, be flatly dopey. COINTELPRO records released since the 1960s under the Freedom of Information Act (FOIA) show that it took FBI Director J. Edgar Hoover until 1968 to discover that there was such a thing as a New Left that might be of interest.

Between 1960 and 1968, as the New Left was becoming a formidable force in its own right, the Bureau’s top officials seem to have thought that groups like Students for a Democratic Society were simply covers for the Communist Party, which was like mistaking the fleas for the dog. We have been assured that the FBI of today has learned something since the days of J. Edgar Hoover. But of ignorance and stupidity there is no end.


Trivial and nontrivial pursuits

Entrapment and instigation to commit crimes are in themselves genuine dangers to American liberties, even when the liberties are those of the reckless and wild. But there is another danger to such pursuits: the attention the authorities pay to nonexistent threats (or the creation of such threats) is attention not paid to actual threats.

Anyone concerned about the security of Americans should cast a suspicious eye on the allocation or simply squandering of resources on wild goose chases. Consider some particulars which have recently come to light. Under the Freedom of Information Act, the Partnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups -- during the very time that they were missing actual warnings about actual terrorist actions.

From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI, and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places. In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’”

Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center (BRIC), one of 77 coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily. As the investigative journalist Michael Isikoff recently reported, they were not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’”

It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber. That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either. The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of… Code Pink and Veterans for Peace.


Public agencies and the 'private sector'

So we know that Boston’s master coordinators -- its Committee on Public Safety, you might say -- were worried about constitutionally protected activity, including its consequences for “commercial and financial sector assets.” Unsurprisingly, the feds worked closely with Wall Street even before the settling of Zuccotti Park. More surprisingly, in Alaska, Alabama, Florida, Mississippi, Tennessee, and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations -- and vice versa.

FBI gave 'heads up' on OWS.
Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.” Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.”

Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:
  • “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”
  • “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to... [22] campus police officials... A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”
  • An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on November 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services (NCIS) reported to DSAC on the relationship between OWS and organized labor.”
  • DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” It advised corporate employees to dress conservatively, avoid political discussions and “avoid all large gatherings related to civil issues. Even seemingly peaceful rallies can spur violent activity or be met with resistance by security forces.”
  • The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee, and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.
  • In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.” Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’”
Sometimes, “intelligence” moves in the opposite direction -- from private corporations to public agencies. Among the collectors of such “intelligence” are entities that, like the various intelligence and law enforcement outfits, do not make distinctions between terrorists and nonviolent protesters.

Consider TransCanada, the corporation that plans to build the 1,179 mile Keystone-XL tar sands pipeline across the U. S. and in the process realize its “vision to become the leading energy infrastructure company in North America.“ The anti-pipeline group Bold Nebraska filed a successful Freedom of Information Act request with the Nebraska State Patrol and so was able to put TransCanada’s briefing slideshow up online.

So it can be documented in living color that the company lectured federal agents and local police to look into the use of “anti-terrorism statutes” against peaceful anti-Keystone activists. TransCanada showed slides that cited as sinister the “attendance” of Bold Nebraska members at public events, noting “Suspicious Vehicles/Photography.”

TransCanada alerted the authorities that Nebraska protesters were guilty of “aggressive/abusive behavior,” citing a local anti-pipeline group that, they said, committed a “slap on the shoulder” at the Merrick County Board Meeting (possessor of said shoulder unspecified). They fingered nonviolent activists by name and photo, paying them the tribute of calling them “'Professionals' & Organized.”

Native News Network pointed out that “although TransCanada's presentation to authorities contains information about property destruction, sabotage, and booby traps, police in Texas and Oklahoma have never alleged, accused, or charged Tar Sands Blockade activists of any such behaviors.”


Centers for fusion, diffusion, and confusion

After September 11, 2001, government agencies at all levels, suddenly eager to break down information barriers and connect the sort of dots that had gone massively unconnected before the al-Qaida attacks, used Department of Homeland Security funds to start “fusion centers.” These are supposed to coordinate anti-terrorist intelligence gathering and analysis. They are also supposed to “fuse” intelligence reports from federal, state, and local authorities, as well as private companies that conduct intelligence operations. According to the ACLU, at least 77 fusion centers currently receive federal funds.

Much is not known about these centers, including just who runs them, by what rules, and which public and private entities are among the fused. There is nothing public about most of them. However, some things are known about a few. Several fusion center reports that have gone public illustrate a remarkably slapdash approach to what constitutes “terrorist danger” and just what kinds of data are considered relevant for law enforcement.

In 2010, the American Civil Liberties Union of Tennessee learned, for instance, that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents. The letter encourages schools to be supportive of all religious beliefs during the holiday season.” (The map is no longer online.)

Fusion command center.
So far, the prize for pure fused wordiness goes to a 215-page manual issued in 2009 by the Virginia Fusion Center (VFC), filled with Keystone Kop-style passages among pages that in their intrusive sweep are anything but funny. The VFC warned, for instance, that “the Garbage Liberation Front (GLF) is an ecological direct action group that demonstrates the joining of anarchism and environmental movements.” Among GLF’s dangerous activities well worth the watching, the VFC included “dumpster diving, squatting, and train hopping.”

In a similarly jaw-dropping manner, the manual claimed -- the italics are mine -- that “Katuah Earth First (KEF), based in Asheville, North Carolina, sends activists throughout the region to train and engage in criminal activity. KEF has trained local environmentalists in non-violent tactics, including blocking roads and leading demonstrations, at action camps in Virginia. While KEF has been primarily involved in protests and university outreach, members have also engaged in vandalism.” Vandalism! Send out an APB!

The VFC also warned that, “[a]lthough the anarchist threat to Virginia is assessed as low, these individuals view the government as unnecessary, which could lead to threats or attacks against government figures or establishments.” It singled out the following 2008 incidents as worth notice:
  • At the Martinsville Speedway, “A temporary employee called in a bomb threat during a Sprint Cup race... because he was tired of picking up trash and wanted to go home.”
  • In Missouri, “a mobile security team observed an individual photographing an unspecified oil refinery... The person abruptly left the scene before he could be questioned."
  • Somewhere in Virginia, “seven passengers aboard a white pontoon boat dressed in traditional Middle Eastern garments immediately sped away after being sighted in the recreational area, which is in close proximity to” a power plant.
What idiot or idiots wrote this script?

Given a disturbing lack of evidence of terrorist actions undertaken or in prospect, the authors even warned:
It is likely that potential incidents of interest are occurring, but that such incidents are either not recognized by initial responders or simply not reported. The lack of detailed information for Virginia instances of monitored trends should not be construed to represent a lack of occurrence.
Lest it be thought that Virginia stands alone and shivering on the summit of bureaucratic stupidity, consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the anti-war movement, a former U.S. Congresswoman, the U.S. Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’”

And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies. According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’”

The Inspector General called "troubling" what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’”

Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its 'acts of terrorism' classification."

One of these investigations concerned Greenpeace protests planned for ExxonMobil shareholder meetings. (Note: I was on Greenpeace’s board of directors during three of those years.) The inquiry was kept open "for over three years, long past the shareholder meetings that the subjects were supposedly planning to disrupt." The FBI put the names of Greenpeace members on its federal watch list. Around the same time, an ExxonMobil-funded lobby got the IRS to audit Greenpeace.

This counterintelligence archipelago of malfeasance and stupidity is sometimes fused with ass-covering fabrication. In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department Inspector General’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects. The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.
The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor. He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.
The sequel was not quite so droll. The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.

Moreover, at least one fusion center has involved military intelligence in civilian law enforcement. In 2009, a military operative from Fort Lewis, Washington, worked undercover collecting information on peace groups in the Northwest. In fact, he helped run the Port Militarization Resistance group’s Listserv. Once uncovered, he told activists there were others doing similar work in the Army. How much the military spies on American citizens is unknown and, at the moment at least, unknowable.

Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos -- I have some in my own heavily redacted files obtained through an FOIA request -- were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case.

During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to Military Surveillance of Civilian Politics, 1967-70, an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews. They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”

Years later, I met one of these agents, now retired, in San Francisco. He knew more about what I was doing in the late 1960s than my mother did.


Squaring circles

In 2009, President Obama told the graduating class at the Naval Academy that, “as Americans, we reject the false choice between our security and our ideals.” Security and ideals: officially we want both. But how do you square circles, especially in a world in which “security” has often enough become a stand-in for whatever intelligence operatives decide to do?

Obama at Naval Academy.
The ACLU’s Tennessee office sums the situation up nicely: “While the ostensible purpose of fusion centers, to improve sharing of anti-terrorism intelligence among different levels and arms of government, is legitimate and important, using the centers to monitor protected First Amendment activity clearly crosses the line.”

Nationally, the ACLU rightly worries about who is in charge of fusion centers and by what rules they operate, about what becomes of privacy when private corporations are inserted into the intelligence process, about what the military is doing meddling in civilian law enforcement, about data-mining operations that Federal guidelines encourage, and about the secrecy walls behind which the fusion centers operate.

Even when fusion centers do their best to square that circle in their own guidelines, like the ones obtained by the ACLU from Massachusetts’s Commonwealth Fusion Center (CFC), the knots in which they tie themselves are all over the page. Imagine, then, what happens when you let informers or agents provocateurs loose in actual undercover situations.

“Undercovers,” writes the Massachusetts CFC, “may not seek to gain access to private meetings and should not actively participate in meetings… At the preliminary inquiry stage, sources and informants should not be used to cultivate relationships with persons and groups that are the subject of the preliminary inquiry.” So far so good. Then, it adds, “Investigators may, however, interview, obtain, and accept information known to sources and informants.” By eavesdropping, say? Collecting trash? Hacking? All without warrants? Without probable cause?

“Undercovers and informants,” the guidelines continue, “are strictly prohibited from engaging in any conduct the sole purpose of which is to disrupt the lawful exercise of political activity, from disrupting the lawful operations of an organization, from sowing seeds of distrust between members of an organization involved in lawful activity, or from instigating unlawful acts or engaging in unlawful or unauthorized investigative activities.” Now, go back and note that little, easy-to-miss word “sole.” Who knows just what grim circles that tiny word squares?

The Massachusetts CFC at least addresses the issue of entrapment: “Undercovers should not become so involved in a group that they are participating in directing the operations of a group, either by accepting a formal position in the hierarchy or by informally establishing the group's policy and priorities. This does not mean an undercover cannot support a group's policies and priorities; rather an undercover should not become a driving force behind a group's unlawful activities.”

Did Cleveland’s fusion center have such guidelines? Did they follow them? Do other state fusion centers? We don’t know.

Whatever the fog of surveillance, when it comes to informers, agents provocateurs, and similar matters, four things are clear enough:
  • Terrorist plots arise, in the United States as elsewhere, with the intent of committing murder and mayhem. Since 2001, in the U.S., these have been almost exclusively the work of freelance Islamist ideologues like the Tsarnaev brothers of Boston. None have been connected in any meaningful way with any legitimate organization or movement.
  • Government surveillance may in some cases have been helpful in scotching such plots, but there is no evidence that it has been essential.
  • Even based on the limited information available to us, since September 11, 2001, the net of surveillance has been thrown wide indeed. Tabs have been kept on members of quite a range of suspect populations, including American Muslims, anarchists, and environmentalists, among others -- in situation after situation where there was no probable cause to suspect preparations for a crime.
  • At least on occasion -- we have no way of knowing how often -- agents provocateurs on government payrolls have spurred violence.
How much official unintelligence is at work? How many demonstrations are being poked and prodded by undercover agents? How many acts of violence are being suborned? It would be foolish to say we know. At least equally foolish would be to trust the authorities to keep to honest-to-goodness police work when they are so mightily tempted to take the low road into straight-out, unwarranted espionage and instigation.

[Note: Thanks to the ACLU’s Michael German and Matt Harwood and TomDispatch’s Nick Turse, for research help on this piece.] 

This article was cross-posted to and originally published at TomDispatch. Copyright 2013 Todd Gitlin.

[Todd Gitlin is a professor of journalism and sociology at Columbia University, the chair of the PhD program in communications, and the author of The Whole World Is Watching: Mass Media in the Making and Unmaking of the New Left; The Sixties: Years of Hope, Days of Rage; and Occupy Nation: The Roots, the Spirit, and the Promise of Occupy Wall Street.]

The Rag Blog

[+/-] Read More...

27 June 2013

Steve Russell : Big Brother in the Data Mines

Cover of the first Signet Classics edition of George Orwell's 1984. Image from Vintage Paperback Archive.
We're talking yottabytes here:  
Big Brother in the data mines
We’ve been living for some time in the world set out in Moore’s Law, which predicts that computing power will double every two years, a proposition that obviously has mathematical limits we have yet to reach.
By Steve Russell / The Rag Blog / June 27, 2013

One of the television talking heads really hurt my feelings in a report the other night on Edward Snowden, the traitorous hero or heroic traitor who leaked the existence of PRISM, wholesale collection of data from the servers of various major players on the Internet. Not once but twice, he demanded to know how a 29-year-old high school dropout could become a computer jock for the National Security Agency with a top-secret clearance?

I was once an 18-year-old high school dropout who was a computer jock for the NSA (USAF branch) with a top-secret clearance. In the three years I worked up to my elbows in top secret intelligence, I can remember two items the leaking of which would have landed the news on the front pages along with the leaker in the pokey.

We were all told regularly and often what the consequences of revealing classified information would be. Would I have done that? I like to think I would if the public interest in the information clearly outweighed my own safety, but that circumstance never came up, so I can’t know. Before you spit your coffee on the keyboard, remember that the very oath every military person takes involves putting the interests of the country above your own.

Spying on the retail level has been part of war on this continent at least since the pueblos pulled off a sneak attack that sent the Spanish colonists all the way back to El Paso del Norte, licking their wounds.

Spying on the wholesale level awaited technology, not intent. Governments had always tried to gin up networks of informers, some of which became famous in history and did the job for a period of time. Scholars estimate that one in seven East Germans informed for the Stasi on some level. People, over time, seem to revert to their own values over those imposed by government, and so become less reliable as informers. People lack the discipline of computers.

During WWII, Bletchley Park began to move warfare into the digital age. Communication had for some time been by wire and by broadcast, and so intelligence became a contest between code makers and code breakers in, as the computer geeks say, real time.

One obvious method of code breaking is to archive and collate vast numbers of messages and look for patterns. This became possible by entrusting analysis to Alan Turing’s mathematics, which became the Allies’ ACE (“Automatic Computing Engine") in the hole.

Once the algorithms were written, the issue became how to capture and store mountains of communication data. We’ve been living for some time in the world set out in Moore’s Law, which predicts that computing power will double every two years, a proposition that obviously has mathematical limits we have yet to reach.

By the time the calendar turned over the date that gives the title to George Orwell’s dystopian novel, 1984, the technology was possible for Big Brother to be watching us. When the date whizzed by with no more notice than Y2K, some of us wondered whether the American people, like Winston Smith, had learned to love Big Brother?

Image from The Matrix.
Apparently, not all people share amorous attachment to the government, since the sales of Orwell’s novel have spiked with the revelations about PRISM.

Back to the Okie teenager who got his top-secret clearance in 1965. We learned our trade on computers that stored data in kilobytes. When we moved to intelligence, we were dealing with megabytes. There were rumors about gigabytes, like the computer in my home on which I compose this column. Today’s NSA is storing data in yottabytes. That is, a septillion bytes.

We are told PRISM collects “metadata,” not identifiable to individuals or even organizations. Numbers called to and from, length of call. Not content. Not even who made the call.

Excuse me, but how would it help catch terrorists if it could not be focused on individuals or organizations? Back when I did this, just about everything we had in the computer was from communications intercepts and aircraft sorties. Collating that told us all kinds of useful things about our adversaries.

The question how many data points it takes to focus on an individual is not one of opinion but one of mathematics, and the number of data points is directly related to the level of certainty we demand. In the case of cell phone metadata, there’s some evidence that a mere four hits on the same number can identify 95% of individuals.

Because published studies in scientific journals are limited, that could be wrong, but the fact remains that the question is not one of opinion, but of mathematics.

By cross-referencing telephone and Internet metadata with bank records, which are already in electronic form and do not require a search warrant to access, the NSA can discover things about you that your parents may not know.

We are told that the metadata can be accessed from the desktop computer of any analyst who has the proper clearance. You know, like the one I had at age 18? Let’s not give Big Brother too much credit for having his attention focused on us, but let’s not pretend that it’s impossible or that the right hand always knows what the left hand is doing when thousands of people have access to yottabytes of data.

Big Brother does not care about you, but he cared enough about Martin Luther King, Jr., to bug his motel room, a laughably primitive method. He cared enough about the Black Panther Party and the American Indian Movement to insert double agents, which is also kind of labor intensive and old fashioned.

If the United States is data mining on this level, what do you think China and Russia are doing? China in particular has pulled off some hacks into corporate databases that left me scratching my head.

This is not an argument to shut down PRISM, assuming that would be possible given the resources already invested in storage. Consider these words like a weather report, since, after all, the databases being mined were already in corporate hands before the government touched them. I’m unclear that maximizing shareholder value is a less dangerous imperative than maintaining a government in power.

“You don’t need a weatherman to know which way the wind blows.”

[Steve Russell lives in Sun City, Texas, near Austin. He is a Texas trial court judge by assignment and associate professor emeritus of criminal justice at Indiana University-Bloomington. Steve was an activist in Austin in the sixties and seventies, and wrote for Austin’s underground paper, The Rag. Steve, who belongs to the Cherokee Nation of Oklahoma, is also a columnist for Indian Country Today. He can be reached at swrussel@indiana.edu. Read more articles by Steve Russell on The Rag Blog.]

The Rag Blog

[+/-] Read More...

25 June 2013

James McEnteer : Escape to Ecuador

Edward Snowden and the flag of Ecuador. Image from Salon.com.
Rehanging the crepe paper:
Escape to Ecuador
Edward Snowden is the latest insider who pulled back the curtain to reveal the wizardry of American Freedom as the diabolical machinations of a surveillance state.
By James McEnteer / The Rag Blog / June 25, 2013

QUITO, Ecuador -- The colored crepe paper we hung up has tattered and fallen. The balloons we tied to the walls and ceiling have deflated or popped. Confetti remains in bags, unthrown. The welcome party we planned for the arrival of Julian Assange has had to be postponed indefinitely. Graffiti on the city walls prophesying his advent have begun to chip and fade away.

We know Assange is safe and still active in his Ecuadorian Embassy sanctuary in London. But we can’t help feeling disappointed that he never actually landed here among us. It’s not simply that we wanted the spotlight of his celebrity to shine a bit on the rest of us. There is so much here that we wanted to show him.

The bracing air of the Andes would revive his spirits. The sight of snow-covered volcanic peaks bespeaks a primordial reality which dwarfs the foolish vanity and paranoia of the people and the governments who want him silenced and punished. Julian Assange and Wikileaks have spotlighted the new political reality.

Our primary struggle now is not a conflict of countries or religions or ideologies against one another, but the wars of governments against their own peoples. The governments of China, Russia, and the United States have more in common with one another than they do with their own populations. Ours is a battle between state control and personal freedom.

The Turkish people know this. So do the Syrians and the Brazilians and the Egyptians. They have fewer illusions than Americans do because they can’t afford them. They have learned to trust their own eyes and ears rather than rely on the televised, predigested propaganda churned out by corporate U.S. media in service to the state.

Julian Assange and Ecuador's Foreign
Affairs Minister Ricardo Patiño Aroca
at Embassy in London.
Americans cling to their comforting delusions, that we are the greatest, freest country on earth, that the political landscape is painted blue and red, that liberals and conservatives are battling for dominance, and the extremes of tea-party libertarianism and radical leftist socialism should be reviled and feared.

All this is irrelevant and distracting, like the clash of Christianity versus Islam. Or the flood of professional sporting events and pornography that drowns our awareness with vivid images. Americans are bad at organizing, still suffering from the cult of rugged individualism. But when we do form trade unions or progressive political groups or student protests against wars or the depredations of Wall Street, the tentacles of government are quick to infiltrate, defame, and destroy.

Edward Snowden is the latest insider who pulled back the curtain to reveal the wizardry of American Freedom as the diabolical machinations of a surveillance state. Is he a hero or a traitor? Where you stand depends on where you sit. For all those growing fat off the surveillance state, the toady media, the corporate Congress, the social networks and other minions of the ruling oligarchy, Snowden is a trouble-maker, messing with the dominance of their masters.

For the rest of us, trying to survive and live our lives as well as we can, Snowden is a freedom fighter, exposing the intrusion of the state apparatus into our private affairs. That is why we have begun to rehang the crepe paper here, inflate new balloons and prepare once again for a welcome party fit for a man of principle and courage.

Snowden would add luster and gravitas to our community. We can only hope he really comes. Then we have to find a way to spring Bradley Manning. Manning’s only crime was believing he could appeal to the conscience of the American people over and above the violent authoritarian regime masquerading as a democracy.

It would be great to have Assange, Manning, and Snowden all here in Ecuador. They could all have faculty positions at the IIF (International Institute of Freedom). I think they’d have a lot of valuable lessons to teach. You know we’ll have a good time then.

[James McEnteer is the author of Shooting the Truth: the Rise of American Political Documentaries (Praeger). He lives in Quito, Ecuador. Read more of James McEnteer's articles on The Rag Blog.]

The Rag Blog

[+/-] Read More...

19 June 2013

Lamar W. Hankins : Government Lies and Secrecy Destroy Credibility

Whistleblower Edward Snowden. Image from MGN Online.
Government lies and
secrecy destroy credibility
"Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety." -- Benjamin Franklin.
By Lamar W. Hankins / The Rag Blog / June 20, 2013

When a high government official blatantly lies in testimony before Congress, it is rare that we learn of the lie as quickly as we did this past week. Sometimes, such misconduct takes decades to be revealed.

But thanks to whistleblower Edward Snowden, who once worked for the CIA and was, until recently, a civilian employee of Booz Allen Hamilton, a National Security Agency (NSA) private contractor, we now know of the lie.

In March, James Clapper, Director of National Intelligence, boldly and knowingly lied in response to Sen. Ron Wyden’s question, “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” Clapper replied “No.”

When Snowden released proof of vast electronic spying on all Americans who use telephones and the internet, Clapper’s lie became obvious. However, President Obama has made no move to oust Clapper for his lie or take other corrective action.

Actually, Clapper’s demeanor during and immediately after the lie made me suspicious from the beginning -- his rapid eye-blinking and nervous extended spot-rubbing of a spot on his bald head are behaviors that have been identified by some psychological research as indications of lying.

But I did not know until the Guardian published Glenn Greenwald’s essay on his interview with Snowden that my suspicions were confirmed. Even more remarkable to me is that Clapper knew he would be asked Wyden’s question the day before he testified, and still he lied.

Now, Greenwald and Rep. Loretta Sanchez, who has been briefed in a classified meeting about the extent of the National Security Agency’s electronic spying on Americans, have both confirmed that what has been revealed so far by Snowden is just the “tip of the iceberg” regarding NSA’s domestic electronic spying.

The Washington Post has now reported that actual phone conversations have been listened to, and emails have been read, all without specific judicial approval. Sen. John Tester, a member of the Homeland Security Committee, has said that he was not aware of the electronic spying that Snowden revealed.

Ever since this story broke, we have been bombarded by columns and essays from various pundits and arguments by electronic spying supporters that the real problem is the character, personality, and motivation of Edward Snowden. Thanks to political columnist Juan Cole, we have a list of ways Snowden will be smeared in order to discredit him with the public.

Snowden will be labeled a traitor and a defector (for going to Hong Kong); his mental health will be questioned; it will be claimed that he didn’t understand the spying program he revealed; his accusations will be called untrue; charges Snowden did not make will be labeled incorrect (attack by misdirection or a “red herring”); claims will be made that the spying is legal (which can’t be confirmed because the courts will not allow anyone standing to sue); minor parts of the allegations may be acknowledged to divert attention from the major intrusion on Americans’ lives; it will be claimed that Snowden has given aid and comfort to terrorists; and since this is a democracy we can always have a debate about the spying (although meaningful debate is impossible with regard to a secret program).

Already, every one of Cole’s points have been used by some writer or politician to attack Snowden.

Similar propaganda was directed at Bradley Manning, Julian Assange (a conduit of whistleblowing information through Wikileaks), and most other whistleblowers and reporters who have revealed unsavory, if not illegal, secret government actions.

Perhaps the most thorough personal attack on Snowden, bearing out Cole’s prognostications, was by New York Times columnist and PBS NewsHour commentator David Brooks. What seems to bother Brooks more than the real or imagined events of Snowden’s life, is that Snowden has no respect for authority or loyalty to authority.

Brooks seems to believe that such respect and loyalty are bestowed on government like a divine right of kings, mainly because respect and loyalty are essential for a democratic society to function properly. Brooks doesn’t believe that respect and loyalty must be earned by the government, just as it must be by individuals.

When members of Congress don’t know the extent of our government’s activities, especially those activities that appear to violate our constitutional rights, the system of checks and balances has failed, and trust in our government is nearly impossible for many Americans. But when the source of our distrust comes by way of whistleblowers, the American public seems confused. Even so, a Reuter’s poll shows that more Americans approve of Snowden’s actions than disapprove.

From my limited personal experience with whistleblowing, I have concluded that the institutional culture of large organizations in both the private and public spheres is not to make waves and to protect colleagues, as well as higher-ups. This trait is so ingrained that there is often little chance that anything will be done about wrong-doing that is reported within an organization. Worse, the wrong-doing will not become known by the public.

Bradley Manning seemed to know what I have figured out from my limited experience with corrupt authority -- the only way to get the information about U.S. atrocities to the people of the U.S. is to bypass the military and the politicians entirely.

Without Manning’s actions, we would not know how eager those with their fingers on the triggers were to kill innocent Iraqi civilians and members of the news media. We would not know how we were conducting the Middle East wars. We would not know our government’s policies and practices nearly as well as we know them now.

Manning has admitted to what he did, but the government wants to convict him of aiding the enemy -- treason. The charge would be true if the American public were the enemy. Article Three, Section Three, of the U.S. Constitution, appears to require collaboration with an actual wartime enemy of the United States (though the Supreme Court has yet to clarify this matter).

Manning released his information to the media, and it was published by such notable news purveyors as The New York Times and The Washington Post. In truth, the government was embarrassed by Manning’s disclosures and had to explain itself, which it has not been able to do successfully.

Manning’s disclosures could be termed "treason-by-embarrassment." No enemy received a tactical or strategic advantage by seeing video of the intentional murder of innocents by Americans. If al-Qaeda got some propaganda value from the release, it is of little more value than the entire immoral Afghanistan-Iraq-Pakistan-Yemen-Somalia debacle we call our War on Terror.

During Clapper’s hearing, Sen. Diane Feinstein sat silent as Clapper lied, and she has defended him since by attacking Snowden, as have many other members of Congress and the administration. Even serial liar Dick Cheney has weighed in on the electronic spying. Cheney’s position is that if elected officials in Congress and the administration approved the actions, we should trust that they are appropriate and legal. No surprise there.

But Clapper’s perjury, the propaganda attack on Snowden and the other whistleblowers, and the continuing cover-up by the administration and the Congress make it difficult to trust the government. It has little credibility, which is unfortunately true of most governments that prefer keeping the people in the dark about what the government is really doing.

Congress has oversight responsibilities, but its members would rather look into made-up scandals to hurt political opponents than keep tabs on policies that can harm the country and its people, and violate the Constitution. Most Americans have good reason to believe that the Fourth Amendment protects us from governments that engage in secret, unaccountable searches and seizures:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
And the American people assume that they are protected further by the Fifth Amendment, which provides in pertinent part: “No person shall be... deprived of life, liberty, or property, without due process of law.”

When the government engages in massive electronic spying on its citizens on a scale that rivals or exceeds the abandoned Total Information Awareness program adopted after 9/11, the liberty we have accepted as our birthright has been taken from us without due process. All three branches of government -- legislative, administrative, and judicial -- have worked together to keep us from finding out how much our rights have been abused by keeping the information secret.

As Glenn Greenwald has written,
...the Obama DOJ has repeatedly thwarted efforts by the ACLU, EFF [Electronic Frontier Foundation] and others to obtain judicial rulings on their legality and constitutionality by invoking procedural claims of secrecy, immunity and standing. If Democrats are so sure these spying programs are legal, why has the Obama DOJ been so eager to block courts from adjudicating that question?
One of the most troubling aspects of what has happened to us over the last nearly twelve years, is that we have acquiesced to this violation of basic rights, largely out of fear of another terrorist attack under the mistaken belief that only by diminishing our rights can we be safe.

Benjamin Franklin’s statement made in the Revolutionary period seems apt for this situation: "Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety."

But when none of the three branches of our government will allow us even to seek a remedy for apparent rights violations, perhaps it is unfair to use Franklin’s words to suggest that “we the people” have acquiesced to our loss of liberty.

Once again, the ACLU is attempting to obtain a court ruling on the constitutionality of NSA’s electronic spying. Jameel Jaffer, the ACLU deputy legal director, had this to say about the lawsuit the ACLU filed last week:
This dragnet program is surely one of the largest surveillance efforts ever launched by a democratic government against its own citizens. It is the equivalent of requiring every American to file a daily report with the government of every location they visited, every person they talked to on the phone, the time of each call, and the length of every conversation. The program goes far beyond even the permissive limits set by the Patriot Act and represents a gross infringement of the freedom of association and the right to privacy.
Along with many Americans, I am worried about another terrorist attack in the U.S. But unlike New York Times columnists Tom Friedman and Bill Keller, I don’t find the NSA’s activities “well-regulated” when data mining has allowed the government to access anyone’s phone conversations or email communication without obtaining a warrant from an appropriate court -- even the almost-always-obliging FISA court.

And I suggest that the government’s electronic spying is different from commercial data-gathering: there is a difference between having a corporation’s computer, using an algorithm, determine our buying interests and showing us an advertisement for a product we may be interested in buying, and allowing the NSA to read our emails and listen to our phone conversations based on its access to data it acquires directly from the servers of Yahoo, Google, and other internet sources without participation by those companies.

This activity is an unprecedented breach of our constitutional rights to privacy and freedom of speech.

It is time we elected people to office who will put a stop to such activity, or our government will never again be trusted, or be worthy of our trust. A government that fights accountability at every turn cannot be trusted.

[Lamar W. Hankins, a former San Marcos, Texas, city attorney, is also a columnist for the San Marcos Mercury. This article © Freethought San Marcos, Lamar W. Hankins. Read more articles by Lamar W. Hankins on The Rag Blog.]

The Rag Blog

[+/-] Read More...

18 April 2012

Jack A. Smith : Big Brother's Getting Bigger

Another sign of the times. Image from City Limits.

Our civil liberties under attack:
Big Brother's getting even bigger
Abuses of civil liberties are taking place with increasing frequency, but the public outcry has mainly been muted, an enticement for the authorities to go even further.
By Jack A. Smith / The Rag Blog / April 18, 2012

Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years.

In addition to his retaining President George W. Bush's many excesses, such as the Patriot Act, new information about the erosion of civil liberties emerges repeatedly during the era of President Barack Obama from the federal government, the courts, and various police forces.

The Supreme Court added judicial insult to personal injury April 2 when it ruled 5-4 that jail officials may strip-search anyone arrested for any offense, even a trifle, as they are being incarcerated, even if they are awaiting a hearing or trial. The four ultraconservative judges were joined by Justice Anthony M. Kennedy.

According to the ACLU's Steven R. Shapiro, the "decision jeopardizes the privacy rights of millions of people who are arrested each year and brought to jail, often for minor offenses. Being forced to strip naked is a humiliating experience that no one should have to endure absent reasonable suspicion."

A day before the strip-search outrage, the New York Times reported that
law enforcement tracking of cellphones... has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show... One police training manual describes cellphones as "the virtual biographer of our daily activities," providing a hunting ground for learning contacts and travels.
Other abuses of civil liberties are taking place with increasing frequency, but the public outcry has mainly been muted, an enticement for the authorities to go even further. On March 23, the American Civil Liberties Union reported:
The Obama administration has extended the time the National Counterterrorism Center (NCTC) can collect and hold on to records on U.S. citizens and residents from 180 days to five years, even where those people have no suspected ties to terrorism. The new NCTC guidelines, which were approved by Attorney General Eric Holder, will give the intelligence community much broader access to information about Americans retained in various government databases...

Authorizing the "temporary" retention of non-terrorism-related citizens and resident information for five years essentially removes the restraint against wholesale collection of our personal information by the government, and puts all Americans at risk of unjustified scrutiny. Such unfettered collection risks reviving the Bush administration's Total Information Awareness program, which Congress killed in 2003.
The news, evidently, was underwhelming. Tom Engelhardt wrote April 4:
For most Americans, it was just life as we've known it since September 11, 2001, since we scared ourselves to death and accepted that just about anything goes, as long as it supposedly involves protecting us from terrorists. Basic information or misinformation, possibly about you, is to be stored away for five years -- or until some other attorney general and director of national intelligence thinks it's even more practical and effective to keep you on file for 10 years, 20 years, or until death do us part -- and it hardly made a ripple.
A week earlier, new information was uncovered about Washington's clandestine interpretation of the Patriot Act. Most Americans are only aware of the public version of the Bush Administration's perfidious law passed by Congress in a virtual panic soon after 9/11. But the White House and leaders of Congress and the Justice department have a secret understanding of the Patriot Act's wider purposes and uses.

Alex Abdo of the ACLU's National Security Project revealed March 16:
The government has just officially confirmed what we've long suspected: there are secret Justice Department opinions about the Patriot Act's Section 215, which allows the government to get secret orders from a special surveillance court (the FISA Court) requiring Internet service providers and other companies to turn over "any tangible things." Just exactly what the government thinks that phrase means remains to be seen, but there are indications that their take on it is very broad.

Late last night we received the first batch of documents from the government in response to our Freedom of Information Act request for any files on its legal interpretation of Section 215. The release coincided with the latest in a string of strong warnings from two senators about how the government has secretly interpreted the law. According to them both, the interpretation would shock not just ordinary Americans, but even their fellow lawmakers not on the intelligence committees.

Although we're still reviewing the documents, we're not holding our breath for any meaningful explanation from the government about its secret take on the Patriot Act.
The Senators involved were not identified, but they were Ron Wyden (D-Ore.) and Mark Udall (D-Colo.), both of whom went public about the secret Patriot Act last May. Wyden declared at the time: “When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry.” Udall echoed, “Americans would be alarmed if they knew how this law is being carried out.”

The Obama Administration has not sought to mitigate much less abandon the Patriot Act. Indeed, in the 10 ½ years since the act was passed the law has only become stronger, paving the way for other laws assaulting civil liberties and increasing government surveillance.

Three months ago, for example, Obama signed the National Defense Authorization Act (NDAA) containing a sweeping worldwide indefinite detention law allowing the U.S. military to jail foreigners and U.S. citizens without charge or trial.

Just last month, Wired magazine revealed details about how the National Security Agency "is quietly building the largest spy center in the country in Bluffdale, Utah."

Investigative reporter James Bamford wrote that the NSA established listening posts throughout the U.S. to collect and sift through billions of email messages and phone calls, whether they originate within America or overseas. The Utah surveillance center will contain enormous databases to store all forms of communication collected by the agency. The NSA previously denied domestic spying was taking place.

In his article Bamford quoted a former NSA official who "held his thumb and forefinger close together" and said: “We are that far from a turnkey totalitarian state.”

The Associated Press has been dogging the New York City police department for several months to uncover its domestic spying activities. On March 23 it reported that "Undercover NYPD officers attended meetings of liberal political organizations [for years] and kept intelligence files on activists who planned protests around the country, according to interviews and documents that show how police have used counterterrorism tactics to monitor even lawful activities." Some of these snooping activities took place far from New York -- in New Orleans in one case.

Commenting on the new guidelines allowing Washington "to retain your private information for five years," the satirical Ironic Times commented March 26: "If you're guilty of no crimes, never owed money, don't have a name similar to that of someone who has been in trouble or owed money and there are absolutely no computer glitches in the government's ancient computer system during the next five years, then you have nothing to worry about."

The American people, of course, have a lot to worry about since both ruling political parties are united in favor of deeper penetration into the private lives and political interests of U.S. citizens. The only recourse for the people is much intensified activism on behalf of civil liberties.

[Jack A. Smith was editor of the Guardian -- for decades the nation's preeminent leftist newsweekly -- that closed shop in 1992. Smith now edits the Hudson Valley Activist Newsletter, where this article was also posted. Read more articles by Jack A. Smith on The Rag Blog.]

The Rag Blog

[+/-] Read More...

22 February 2012

Ron Jacobs : Creeping Fascism? Ask the Cop on the Corner

Police state shown busily creeping. Image from The End of the World.

Ask the cop on the corner:
Creeping fascism
The infant U.S. police state is no longer learning to crawl; it has learned to walk and will soon be stomping its boots in a neighborhood near you.
By Ron Jacobs / The Rag Blog / February 22, 2012

The list contines to grow. The National Defense Authorization Act (NDAA). The essentially unprovoked police attacks on protesters, bystanders, and journalists at Occupy protests around the nation. The continuing murder of (mostly young and black) men by police departments around the nation with few or no legal repercussions to the murderers.

The growing surveillance state and the denial of basic freedoms via emergency legislation in cities facing political protest usually from the left. The permanence of that legislation even after the protests have ended. The continuing pursuit of “material support” charges against antiwar and solidarity activists involved in work against U.S. and Israeli policies.

The infant U.S. police state is no longer learning to crawl; it has learned to walk and will soon be stomping its boots in a neighborhood near you.


Anyone following the Occupy protests since last fall is well aware of the response of the authorities. It can best be characterized as brutal and with little regard for civil liberties. This is the case even though many of the protesters were/are white-skinned and from middle class backgrounds.

It is fair to say that this demographic fact gave the protesters more press coverage while it also prevented the police from carrying out even more brutal attacks. Young black and Latino men going about their daily lives generally have more to fear from the police than the Occupy protesters. That being said, it is useful to take a look at some recent comments regarding Occupy Oakland, the police attacks on the group, and the response of officials and others.

In short, the response to the Oakland protesters' commitment to defend themselves against police attacks has caused some potential rifts in the Occupy movement. Those rifts have been covered well across the media universe. It is not my intent to continue those discussions here.

Instead, I would like to paste a quote from a professor at John Jay College of Criminal Justice that goes a long way towards explaining law enforcement’s perception of the Occupy movements tactics. This quote first appeared in a San Francisco Chronicle article on February 11, 2012, discussing the police tactic of kettling.

For those unfamiliar with the tactic, it essentially involves surrounding a group of protesters in an area where they have no escape, then arresting them all. Sometimes the arrests are preceded by a series of gas attacks and various physical attacks by the police.

The professor quoted is named Maria Haberfeld. Ms. Haberfeld’s career path is not one that suggests a strong belief that police should protect protesters’ civil rights and liberties. She was born in Poland and immigrated to Israel as a teenager.

According to her profile on the John Jay website, Haberfeld served in a special counter-terrorist unit of the IDF that was created to prevent terrorist attacks in Israel. After that, she served in the Israel National Police and then the U.S. Drug Enforcement Administration. None of these agencies are known for their commitment to civil liberties. Indeed, most of their work is undertaken in what can be best termed as a murky legal and moral environment.

When asked to comment on the recent police tactics against Occupy protesters intent on squatting an abandoned building in Oakland -- tactics that provoked a melee between well-armed police and unarmed protesters -- Haberfeld was quoted when describing the protesters’ intent: “It almost falls into the description of a terrorist threat.”

Suffice it to say that, with a perception of protesters as terrorists, the police would certainly feel free to prevent such a protest from succeeding. In fact, there are probably some in law enforcement that feel they should be able to use live ammunition in such cases.

Funeral of Ramarley Graham at Crawford Memorial United Methodist Church in the Bronx, Saturday, Feb. 18, 2012. Photo by Anthony DelMundo / New York Daily News.


Recently, a young African-American man was shot and killed by the police in the bathroom of his apartment in the Bronx. The young man, Ramarley Graham, was 18 years old. The police involved in the incident explained their actions by claiming Graham had a gun and that he ran from the police because he was selling marijuana.

The NYPD’s own investigators did not find a gun and video footage of Graham walking into his apartment building show an 18-year-old kid walking calmly up the sidewalk and to the building’s entrance. Then, a group of police with guns drawn are shown kicking down the door and entering the building. Within minutes, Graham was killed while his grandmother was in another room in the same apartment.

Graham’s murder was the third fatal shooting of a black man in New York City in a week. A week!

New York is not alone in this epidemic of murder. Police shot over 40 people in Chicago in 2011, with at least 16 fatalities among the shooting victims. This evidence, while anecdotal, is representative of the role police play in the police state. The fact that most of the killings are considered justifiable lends further evidence to the argument that the police state is growing.

If there were not a campaign directed from the highest political offices in Manhattan against marijuana smokers and providers in New York City, the likelihood of Graham’s death diminishes greatly. As it has for decades, the “war on drugs” continues to provide authorities with an excuse to surveil, arrest, imprison, and sometimes kill poor and working-class residents of the United States.

Chicago is also the site of a number of police state exercises. Foremost among them is the continuing investigation of antiwar and solidarity activists by the U.S. Department of Justice. For those who might not remember, on September 24, 2010, the FBI raided several houses and a couple offices in Minneapolis/St. Paul, Chicago, and North Carolina under the guise of looking for proof that the people living in those houses were involved with organizations that “lent material support to terrorists.”

On February 1, 2012, Northern Illinois Assistant U.S. Attorney Barry Jonas told the press that the “investigation is continuing” into the case. The assignment of Jonas to the case is telling, primarily because of his earlier role in the prosecution of the Holy Land Foundation defendants.

This prosecution focused on five officials of what was once the largest Muslim charity in the U.S. The foundation’s mission was to provide humanitarian aid to the people of Palestine and other countries. In 2001 its offices were raided and five people associated with the charity were indicted in 2004.

The first trial ended with a hung jury. The second trial ended with convictions and the defendants were sentenced up to 65 years in prison. One of the individuals who is being investigated, Jess Sundin, told the press: “That Barry Jonas is now involved in our case is an ominous development. He is famous for one of the most appalling attacks on civil and democratic rights in the past decade -- the prosecution of the Holy Land Five.”

According to Mick Kelly of FightBack News, the Holy Land Five prosecution “included secret witnesses -- the defense never got to find out who the witnesses were -- the use of hearsay evidence, and the introduction of evidence that had nothing to do with the defendants in the case, such as showing a video from Palestine of protesters burning an American flag, as a means to prejudice the jury.”

One assumes that this is permissible in the post-911 Patriot Act world we now live in. The fear of terrorism trumps all and the State is not afraid to stoke that fear in order to maintain its power.

Cops at Chicago Occupy protest, Nov. 17, 2011. Photo by misterbuckwheattree / Flickr / Chicagoist.


The other instance of the police state assault on civil rights and liberties can also be found in Chicago. This May, the city is hosting the NATO/G8 summit meetings. This meeting of the capitalist rulers of the world and their biggest armed force will make Chicago the site of what will hopefully be some of the largest protests against the imperial intentions of Washington since earlier in this century.

The stated intention of organizers to protest is being met with a concerted attack on the protesters and their motives from the establishment media and politicians, while the city of Chicago is changing its laws to prevent the protests from attracting the thousands they can potentially draw. Like Charlotte, N.C., and Tampa, FL -- the sites of the 2012 major U.S. party political conventions -- the city of Chicago has put a series of ordinances into place that will make it easier for the police and other law enforcement agencies to attack the protests and limit their effectiveness.

Furthermore, these ordinances will not disappear after the so-called “state of emergency” brought on by the events in these cities is over. Instead, they will become permanent, essentially restricting the right to protest forever.

Having politically come of age in the Nixon era, I naturally compare the current situation with the assault on civil rights and liberties in the United States that occurred then.

An incomplete list from that time includes the indictment of dozens of organizers on conspiracy (most notably the Chicago 8, Panther 21, and Harrisburg 7) and other charges; the brutal attacks on protesters in demonstrations large and small; the assassinations of Black Panthers, Latinos, and American Indian Movement members; the murders by law enforcement at People’s Park, Kent and Jackson State, Attica, and in African-American and Latino urban areas across the nation; the prosecution of Angela Davis, Bobby Seale, and Ericka Huggins; etc.

You get the point. The repression was clear and it was everywhere. Yet, it was not always successful. Why? Primarily because there was a mass movement that fought it. The highlights of this movement were its successes: the acquittals of Angela Davis, Bobby and Ericka, and the Panther 21, and the failure of the prosecution in the case of the Harrisburg 7.

The failures of the moment against repression were unfortunately too frequent, but those successes remain important, both for the very fact of their success and as examples of the potential of a mass movement against repression.

Repression can be fought and defeated. The place to begin lies in front of us.

[Ron Jacobs is the author of The Way The Wind Blew: A History of the Weather Underground. He recently released a collection of essays and musings titled Tripping Through the American Night. His latest novel, The Co-Conspirator's Tale, is published by Fomite. His first novel, Short Order Frame Up, is published by Mainstay Press. This article was also published at CounterPunch. Ron Jacobs can be reached at ronj1955@gmail.com. Find more articles by Ron Jacobs on The Rag Blog. ]

The Rag Blog

[+/-] Read More...

Only a few posts now show on a page, due to Blogger pagination changes beyond our control.

Please click on 'Older Posts' to continue reading The Rag Blog.