Reason.com: Man Who Could’ve Been Facing Third Strike After Being Caught Sleeping in His Car Alleges Police Brutality in Lawsuit

Like mandatory minimums, three strike laws were passed in an effort by politicians to appear “tough on crime” by limiting the ability of judges perceived as being too lenient from determining appropriate sentencing. Combined with anti-drug laws, such sentencing laws help keep US prisons overcrowded.

Today’s example of the intersection of drug laws, tough sentencing, and police encounters via the Houston Chronicle:

Police Chief Henry Porretto said [Reginald] Davis had been convicted on two previous drug charges and was facing a possible third strike. He said Davis grabbed something from the seat of the car and put it in his pocket before fleeing. An internal police investigation completed before Davis filed a complaint determined that officers used necessary force, Poretto said.
The lawsuit [filed by Davis] alleges that on March 19 Davis was asleep in his car on the seawall, illegal in Galveston without a camping permit. Santos allegedly awakened Davis at 1:45 a.m. and asked him to place his hands on the hood of the police car. Davis ran onto the beach, was tased and tackled as he staggered to his feet, according to the lawsuit. Davis alleges that Santos, Chapman and three other officers beat him as he lay in the surf and forced his head under water.

In the lawsuit, Davis says he was unaware of the city ordinance when he parked at the seawall to sleep after realizing he was a lot more tired than he thought.

Click below for the full article.

http://reason.com/blog/2013/08/14/galveston-man-who-couldve-been-facing-th

Reason.com: TSA: Bringing Its Watchful, Officious and Useless, Eyes Everywhere in America

Amarand Agasi / Foter / CC BY-NC-SA

The New York Times notes an annoying trendtoward total police state in America, with “the Transportation Security Administration’s Visible Intermodal Prevention and Response squads — VIPR teams for short — assigned to perform random security sweeps.”

Yes, what sounds like a second-rate terror-crime cartel that a minor Marvel superhero might be punching out is roaming the land:

With little fanfare, the agency best known for airport screenings has vastly expanded its reach to sporting events, music festivals, rodeos, highway weigh stations and train terminals. Not everyone is happy.

T.S.A. and local law enforcement officials say the teams are a critical component of the nation’s counterterrorism efforts, but some members of Congress, auditors at the Department of Homeland Security and civil liberties groups are sounding alarms. The teams are also raising hackles among passengers who call them unnecessary and intrusive….

Civil liberties groups say that the VIPR teams have little to do with the agency’s original mission to provide security screenings at airports and that in some cases their actions amount to warrantless searches in violation of constitutional protections.

Ha, how naive, says TSA—what constitutional protections? Was that a common phrase back in a bygone century? We are living POST 9/11 now, suckers!

T.S.A. officials respond that the random searches are “special needs” or “administrative searches” that are exempt from probable cause because they further the government’s need to prevent terrorist attacks.

Created in the aftermath of the Sept. 11, 2001, attacks, the T.S.A. has grown to an agency of 56,000 people at 450 American airports. The VIPR teams were started in 2005, in part as a reaction to the Madrid train bombing in 2004 that killed 191 people.

The program now has a $100 million annual budget and is growing rapidly, increasing to several hundred people and 37 teams last year, up from 10 teams in 2008. T.S.A. records show that the teams ran more than 8,800 unannounced checkpoints and search operations with local law enforcement outside of airports last year, including those at the Indianapolis 500 and the Democratic and Republican national political conventions.

The teams, which are typically composed of federal air marshals, explosives experts and baggage inspectors, move through crowds with bomb-sniffing dogs, randomly stop passengers and ask security questions. There is usually a specially trained undercover plainclothes member who monitors crowds for suspicious behavior, said Kimberly F. Thompson, a T.S.A. spokeswoman. Some team members are former members of the military and police forces.

God knows what level of totally normal appalled alarm at these gestapo tactics would seem “suspicious.” But don’t worry. The magic rock is working–no bears!

 

NY Times: N.S.A. Said to Search Content of Messages to and From U.S.

The National Security Agency is searching the contents of vast amounts of Americans’ e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance, according to intelligence officials.

The N.S.A. is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, a practice that government officials have openly acknowledged. It is also casting a far wider net for people who cite information linked to those foreigners, like a little used e-mail address, according to a senior intelligence official.

While it has long been known that the agency conducts extensive computer searches of data it vacuums up overseas, that it is systematically searching — without warrants — through the contents of Americans’ communications that cross the border reveals more about the scale of its secret operations.

It also adds another element to the unfolding debate, provoked by the disclosures of Edward J. Snowden, the former N.S.A. contractor, about whether the agency has infringed on Americans’ privacy as it scoops up e-mails and phone data in its quest to ferret out foreign intelligence.

Government officials say the cross-border surveillance was authorized by a 2008 law, the FISA Amendments Act, in which Congress approved eavesdropping on domestic soil without warrants as long as the “target” was a noncitizen abroad. Voice communications are not included in that surveillance, the senior official said.

Asked to comment, Judith A. Emmel, an N.S.A. spokeswoman, did not directly address surveillance of cross-border communications. But she said the agency’s activities were lawful and intended to gather intelligence not about Americans but about “foreign powers and their agents, foreign organizations, foreign persons or international terrorists.”

“In carrying out its signals intelligence mission, N.S.A. collects only what it is explicitly authorized to collect,” she said. “Moreover, the agency’s activities are deployed only in response to requirements for information to protect the country and its interests.”

Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency “seeks to acquire communications about the target that are not to or from the target.” The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked “Top Secret” amid 18 pages of restrictions, went largely overlooked amid other disclosures.

To conduct the surveillance, the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border. The senior intelligence official, who, like other former and current government officials, spoke on condition of anonymity because of the sensitivity of the topic, said the N.S.A. makes a “clone of selected communication links” to gather the communications, but declined to specify details, like the volume of the data that passes through them.

Computer scientists said that it would be difficult to systematically search the contents of the communications without first gathering nearly all cross-border text-based data; fiber-optic networks work by breaking messages into tiny packets that flow at the speed of light over different pathways to their shared destination, so they would need to be captured and reassembled.

The official said that a computer searches the data for the identifying keywords or other “selectors” and stores those that match so that human analysts could later examine them. The remaining communications, the official said, are deleted; the entire process takes “a small number of seconds,” and the system has no ability to perform “retrospective searching.”

The official said the keyword and other terms were “very precise” to minimize the number of innocent American communications that were flagged by the program. At the same time, the official acknowledged that there had been times when changes by telecommunications providers or in the technology had led to inadvertent overcollection. The N.S.A. monitors for these problems, fixes them and reports such incidents to its overseers in the government, the official said.

The disclosure sheds additional light on statements intelligence officials have made recently, reassuring the public that they do not “target” Americans for surveillance without warrants.

At a House Intelligence Committee oversight hearing in June, for example, a lawmaker pressed the deputy director of the N.S.A., John Inglis, to say whether the agency listened to the phone calls or read the e-mails and text messages of American citizens. Mr. Inglis replied, “We do not target the content of U.S. person communications without a specific warrant anywhere on the earth.”

Timothy Edgar, a former intelligence official in the Bush and Obama administrations, said that the rule concerning collection “about” a person targeted for surveillance rather than directed at that person had provoked significant internal discussion.

“There is an ambiguity in the law about what it means to ‘target’ someone,” Mr. Edgar, now a visiting professor at Brown, said. “You can never intentionally target someone inside the United States. Those are the words we were looking at. We were most concerned about making sure the procedures only target communications that have one party outside the United States.”

The rule they ended up writing, which was secretly approved by the Foreign Intelligence Surveillance Court, says that the N.S.A. must ensure that one of the participants in any conversation that is acquired when it is searching for conversations about a targeted foreigner must be outside the United States, so that the surveillance is technically directed at the foreign end.

Americans’ communications singled out for further analysis are handled in accordance with “minimization” rules to protect privacy approved by the surveillance court. If private information is not relevant to understanding foreign intelligence, it is deleted; if it is relevant, the agency can retain it and disseminate it to other agencies, the rules show.

While the paragraph hinting at the surveillance has attracted little attention, the American Civil Liberties Union did take note of the “about the target” language in a June 21 post analyzing the larger set of rules, arguing that the language could be interpreted as allowing “bulk” collection of international communications, including of those of Americans.

Jameel Jaffer, a senior lawyer at the A.C.L.U., said Wednesday that such “dragnet surveillance will be poisonous to the freedoms of inquiry and association” because people who know that their communications will be searched will change their behavior.

“They’ll hesitate before visiting controversial Web sites, discussing controversial topics or investigating politically sensitive questions,” Mr. Jaffer said. “Individually, these hesitations might appear to be inconsequential, but the accumulation of them over time will change citizens’ relationship to one another and to the government.”

The senior intelligence official argued, however, that it would be inaccurate to portray the N.S.A. as engaging in “bulk collection” of the contents of communications. “ ‘Bulk collection’ is when we collect and retain for some period of time that lets us do retrospective analysis,” the official said. “In this case, we do not do that, so we do not consider this ‘bulk collection.’ ”

Stewart Baker, a former general counsel for the N.S.A., said that such surveillance could be valuable in identifying previously unknown terrorists or spies inside the United States who unwittingly reveal themselves to the agency by discussing a foreign-intelligence “indicator.” He cited a situation in which officials learn that Al Qaeda was planning to use a particular phone number on the day of an attack.

“If someone is sending that number out, chances are they are on the inside of the plot, and I want to find the people who are on the inside of the plot,” he said.

The senior intelligence official said that the “about the target” surveillance had been valuable, but said it was difficult to point to any particular terrorist plot that would have been carried out if the surveillance had not taken place. He said it was one tool among many used to assemble a “mosaic” of information in such investigations. The surveillance was used for other types of foreign-intelligence collection, not just terrorism investigations, the official said.

There has been no public disclosure of any ruling by the Foreign Intelligence Surveillance Court explaining its legal analysis of the 2008 FISA law and the Fourth Amendment as allowing “about the target” searches of Americans’ cross-border communications. But in 2009, the Justice Department’s Office of Legal Counsel signed off on a similar process for searching federal employees’ communications without a warrant to make sure none contain malicious computer code.

——

Click below for the full article.

http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?pagewanted=all&_r=0

Schneier on Security: Restoring Trust in Government and the Internet

In July 2012, responding to allegations that the video-chat service Skype — owned by Microsoft — was changing its protocols to make it possible for the government to eavesdrop on users, Corporate Vice President Mark Gillett took to the company’s blog to deny it.

Turns out that wasn’t quite true.

Or at least he — or the company’s lawyers — carefully crafted a statement that could be defended as true while completely deceiving the reader. You see, Skype wasn’t changing its protocols to make it possible for the government to eavesdrop on users, because the government was already able to eavesdrop on users.

At a Senate hearing in March, Director of National Intelligence James Clapper assured the committee that his agency didn’t collect data on hundreds of millions of Americans. He was lying, too. He later defended his lie by inventing a new definition of the word “collect,” an excuse that didn’t even pass the laugh test.

As Edward Snowden’s documents reveal more about the NSA’s activities, it’s becoming clear that we can’t trust anything anyone official says about these programs.

Google and Facebook insist that the NSA has no “direct access” to their servers. Of course not; the smart way for the NSA to get all the data is through sniffers.

Apple says it’s never heard of PRISM. Of course not; that’s the internal name of the NSA database. Companies are publishing reports purporting to show how few requests for customer-data access they’ve received, a meaningless number when a single Verizon request can cover all of their customers. The Guardian reported that Microsoft secretly worked with the NSA to subvert the security of Outlook, something it carefully denies. Even President Obama’s justifications and denials are phrased with the intent that the listener will take his words very literally and not wonder what they really mean.

NSA Director Gen. Keith Alexander has claimed that the NSA’s massive surveillance and data mining programs have helped stop more than 50 terrorist plots, 10 inside the U.S. Do you believe him? I think it depends on your definition of “helped.” We’re not told whether these programs were instrumental in foiling the plots or whether they just happened to be of minor help because the data was there. It also depends on your definition of “terrorist plots.” An examination of plots that that FBI claims to have foiled since 9/11 reveals that would-be terrorists have commonly been delusional, and most have been egged on by FBI undercover agents or informants.

Left alone, few were likely to have accomplished much of anything.

Both government agencies and corporations have cloaked themselves in so much secrecy that it’s impossible to verify anything they say; revelation after revelation demonstrates that they’ve been lying to us regularly and tell the truth only when there’s no alternative.

There’s much more to come. Right now, the press has published only a tiny percentage of the documents Snowden took with him. And Snowden’s files are only a tiny percentage of the number of secrets our government is keeping, awaiting the next whistle-blower.

Ronald Reagan once said “trust but verify.” That works only if we can verify. In a world where everyone lies to us all the time, we have no choice but to trust blindly, and we have no reason to believe that anyone is worthy of blind trust. It’s no wonder that most people are ignoring the story; it’s just too much cognitive dissonance to try to cope with it.

This sort of thing can destroy our country. Trust is essential in our society. And if we can’t trust either our government or the corporations that have intimate access into so much of our lives, society suffers. Study after study demonstrates the value of living in a high-trust society and the costs of living in a low-trust one.

Rebuilding trust is not easy, as anyone who has betrayed or been betrayed by a friend or lover knows, but the path involves transparency, oversight and accountability. Transparency first involves coming clean. Not a little bit at a time, not only when you have to, but complete disclosure about everything. Then it involves continuing disclosure. No more secret rulings by secret courts about secret laws. No more secret programs whose costs and benefits remain hidden.

———

Click below for the full article.

http://www.schneier.com/blog/archives/2013/08/restoring_trust.html

Reason.com: States Push for Domestic Drone Regulation

At least 40 states are pushing for regulations that would enact stricter requirements for law enforcement to use drones inside the United States. One example is in Ohio, where Ohio Rep. Rex Damschroder (R-District 88) has proposed legislation that would require law enforcement agencies to obtain search warrants before using drones to surveil on citizens.

From the Associated Press:

“Right now police can’t come into your house without a search warrant,” said Ohio Rep. Rex Damschroder, who has proposed drone regulations. “But with drones, they can come right over your backyard and take pictures.”

Damschroder’s proposed bill would prohibit law enforcement agencies from using drones to get evidence or other information without a search warrant. Exceptions would include credible risks of terrorist attacks or the need for swift action to prevent imminent harm to life or property or to prevent suspects from escaping or destroying evidence.

The Republican said he isn’t against drones but worries they could threaten constitutional protections against unreasonable searches and seizures.

“I don’t want the government just going up and down every street snooping,” Damschroder said.

Rep. Damschroder’s bill would restrict law enforcement’s ability to use drones with a few exceptions:

  • The U.S. Secretary of Homeland Security has determined it could prevent a terrorist attack;
  • The police agency has gotten a search warrant from a judge;
  • If there’s a “reasonable suspicion” the drone’s use will prevent “imminent harm.”

The bill’s fate is still uncertain–the Ohio House Speaker declined comment on whether it might pass. But drone limits are not unique to Ohio. The AP notes that Florida, Idaho, Montana, Tennessee, Texas, and Virginia have all enacted drone legislation. (The ACLU has a comprehensive breakdown of domestic drone policy details here.)

Several other states are considering similar legislation as the drone technology becomes more populized among law enforcement agencies. This February, the Federal Aviation Administration reported that it had approved more than 1,400 requests for drone use since 2006 to over 80 law enforcement agencies.

The efforts to limit drone use have opposition from law enforcement hardliners and–the people who make the drones.

[The Association for Unmanned Vehicle Systems International] wants guidelines covering manned aircraft applied to unmanned aircraft.

“We don’t support rewriting existing search warrant requirements under the guise of privacy,” said Mario Mairena, government relations manager for the Arlington, Va.-based Association for Unmanned Vehicle Systems International.

The association predicts unmanned aircraft systems will generate billions of dollars in economic impact in the next few years and says privacy concerns are unwarranted.

But the movement against drones won’t go down without a fight. The town of Deer Trail, Colorado plans to vote on an ordinance that would issue “drone hunting licenses” at $25 a pop, according to CBS News. Phillip Steel, a Deer Trail resident who proposed the ordinance, says, “if you don’t want your drone to go down, don’t fly in town. That’s our motto.”

—–

Click below for the full article.

http://reason.com/blog/2013/08/06/states-begin-push-for-drone-regulation