Ars Technica reports: The Dread Pirate Roberts, head of the most brazen drug trafficking site in the world, was a walking contradiction. Though the government says he raked in $80 million in commissions from running Silk Road, he allegedly lived under a false name in one bedroom of a San Francisco home that he shared with two other guys and for which he paid $1,000 a month in cash. Though his alleged alter ego penned manifestos about ending “violence, coercion, and all forms of force,” the FBI claims that he tried to arrange a hit on someone who had blackmailed him. And though he ran a site widely assumed to be under investigation by some of the most powerful agencies in the US government, the Dread Pirate Robert appears to have been remarkably sloppy — so sloppy that the government finally put a name to the peg leg: Ross William Ulbricht.
Yesterday, Ulbricht left his apartment to visit the Glen Park branch of the San Francisco Public Library in the southern part of the city. Library staff did not recognize him as a regular library patron, but they thought nothing of his visit as he set up his laptop in the science fiction section of the stacks. Then, at 3:15pm, staffers heard a “crashing sound” from the sci-fi collection and went to investigate, worried that a patron had fallen. Instead, library Communications Director Michelle Jeffers tells us that the staff came upon “six to eight” FBI agents arresting Ulbricht and seizing his laptop. The agents had tailed him, waiting for the 29-year-old to open his computer and enter his passwords before swooping in. They marched him out of the library without incident.
For a promising young physics student from Austin, Texas, this wasn’t how things were supposed to turn out.
Sure, you could buy meth, LSD, cannabis, heroin, and MDMA on the Silk Road, but the hidden website wasn’t (just) about drugs. Silk Road was, said its owner, about freedom. In January 2012, as part of a “State of the Road Address” posted in the site’s discussion forum, the Dread Pirate Roberts explained the site’s goal: “To grow into a force to be reckoned with that can challenge the powers that be and at last give people the option to choose freedom over tyranny.”
To that end, the Dread Pirate Roberts built the Silk Road marketplace in 2011 as a “hidden” service accessible only over the encrypted Tor network. To connect, users first had to install a Tor client and then visit a series of arcane site names (the most recent was silkroadfb5piz3r.onion), but the reward was a simple, effective marketplace to buy drugs from sellers all over the world using such Internet commerce staples as escrow accounts and buyer feedback. [Continue reading…]
Category Archives: Department of Justice
Edward Snowden’s e-mail provider defied FBI demands to turn over crypto keys, documents show
Wired reports: The U.S. government in July obtained a search warrant demanding that Edward Snowden’s e-mail provider, Lavabit, turn over the private SSL keys that protected all web traffic to the site, according to to newly unsealed documents.
The July 16 order came after Texas-based Lavabit refused to circumvent its own security systems to comply with earlier orders intended to monitor a particular Lavabit user’s metadata, defined as “information about each communication sent or received by the account, including the date and time of the communication, the method of communication, and the source and destination of the communication.”
The name of the target is redacted from the unsealed records, but the offenses under investigation are listed as violations of the Espionage Act and theft of government property — the exact charges that have been filed against NSA whistleblower Snowden in the same Virginia court.
The records in the case, which is now being argued at the 4th U.S. Circuit Court of Appeals, were unsealed today by a federal judge in Alexandria, Virginia. They confirm much of what had been suspected about the conflict between the pro-privacy e-mail company and the federal government, which led to Lavabit voluntarily closing in August rather than compromise the security it promised users. [Continue reading…]
The DEA thinks you have ‘no constitutionally protected privacy interest’ in your confidential prescription records
ACLU Speech, Privacy & Technology Project: The Drug Enforcement Administration thinks people have “no constitutionally protected privacy interest” in their confidential prescription records, according to a brief filed last month in federal court. That disconcerting statement comes in response to an ACLU lawsuit challenging the DEA’s practice of obtaining private medical information without a warrant. The ACLU has just filed its response brief, explaining to the court why the DEA’s position is both startling and wrong.
We represent four patients and a physician in Oregon whose confidential prescription records are contained in a state database that tracks prescriptions for certain drugs. The database, called the Oregon Prescription Drug Monitoring Program (PDMP), was intended to be a public health tool to help physicians avoid drug overdoses and abuse in their patients. Despite a state law requiring law enforcement to obtain a probable cause warrant from a judge before requesting records from the PDMP, the DEA has been requesting records using administrative subpoenas, which do not involve judicial authorization or probable cause. Our clients object to the DEA’s warrantless access to the PDMP because their prescription records reveal deeply private information about their health and medical history, including their gender identity (two of our clients are transgender men taking testosterone as part of their transition from female to male sex) and mental illness (one client takes medication to treat anxiety and post-traumatic stress disorders).
In July, we explained to the court why people have a “reasonable expectation of privacy” in their confidential prescription records and the medical information those records reveal. (Under the Fourth Amendment, if there is a reasonable expectation of privacy in an item or location, law enforcement can generally conduct a search only if it first obtains a warrant). In support of our arguments, we submitted sworn declarations from medical privacy experts, including a scholar of medical ethics and a physician who explained that maintaining the confidentiality of doctor-patient communications is vital to the successful practice of medicine, and an authority on the history of medical ethics who explained that principles of medical confidentiality were well established at the time of the writing of the Fourth Amendment and would have been relied on by the Amendment’s framers.
In its latest brief, the DEA ignores these points and instead argues that the mere fact that our clients’ prescription records are held in a database maintained by a third party—the State of Oregon—means that they have somehow given up their privacy interest in the records. [Continue reading…]
The No-Fly List: Where the FBI goes fishing for informants
ACLU National Security Project: Over the last three years, the FBI has dramatically expanded its No-Fly List of suspected terrorists, including blacklisting innocent Americans who present no threat to security.
The Americans we represent in Latif v. Holder, the ACLU’s challenge to the government’s No-Fly List procedures, provide a prime example. They were each denied boarding on planes, deprived of their right to travel, and smeared as suspected terrorists. Yet the government continues to deny them any after-the-fact explanation for their blacklisting or any meaningful chance to clear their names.
The FBI’s violation of these Americans’ due process rights is, in and of itself, abusive and unlawful. After all, preventing people from correcting the errors that led to their inclusion on a blacklist does not make our skies any safer, but it does harm constitutionally protected rights to travel and reputation — as a federal court recently recognized. And a closer look into the experiences of several ACLU clients shows another, even darker side to the No-Fly List.
FBI agents have tried to use the No-Fly List as a draconian tool to coerce Americans into spying on their communities.
FBI agents put this pressure on ACLU clients Abe Mashal, a Marine veteran; Amir Meshal; and Nagib Ali Ghaleb. Each of these Americans spoke to FBI agents to learn why they were suddenly banned from flying and to clear up the errors that led to that decision. Instead of providing that explanation or opportunity, FBI agents offered to help them get off the No-Fly List — but only in exchange for serving as informants in their communities.Our clients refused.
The ACLU’s report, Unleashed and Unaccountable: The FBI’s Unchecked Abuse of Authority, explains what happened to Nagib Ali Ghaleb. [Continue reading…]
FBI uses hacking tools to spy on suspects
The Wall Street Journal reports: Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal wiretap into the cyber age.
Federal agencies have largely kept quiet about these capabilities, but court documents and interviews with people involved in the programs provide new details about the hacking tools, including spyware delivered to computers and phones through email or Web links—techniques more commonly associated with attacks by criminals.
People familiar with the Federal Bureau of Investigation’s programs say that the use of hacking tools under court orders has grown as agents seek to keep up with suspects who use new communications technology, including some types of online chat and encryption tools. The use of such communications, which can’t be wiretapped like a phone, is called “going dark” among law enforcement.
A spokeswoman for the FBI declined to comment.
The FBI develops some hacking tools internally and purchases others from the private sector. With such technology, the bureau can remotely activate the microphones in phones running Google Inc.’s Android software to record conversations, one former U.S. official said. It can do the same to microphones in laptops without the user knowing, the person said. Google declined to comment. [Continue reading…]
Police state: U.S. Postal Service logging all mail for law enforcement
The New York Times reports: Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home.
“Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green.
“It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. Postal officials subsequently confirmed they were indeed tracking Mr. Pickering’s mail but told him nothing else.
As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service.
Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images.
Together, the two programs show that postal mail is subject to the same kind of scrutiny that the National Security Agency has given to telephone calls and e-mail. [Continue reading…]
Justice Dept’s seizure of journalist records has had chilling effect on U.S. press
AFP reports: The US government’s secret seizure of Associated Press phone records had a “chilling effect” on newsgathering by the agency and other news organizations, AP’s top executive said Wednesday.
“Some longtime trusted sources have become nervous and anxious about talking with us,” AP president and chief executive Gary Pruitt said in a speech to the National Press Club.
“In some cases, government employees we once checked in with regularly will no longer speak to us by phone. Others are reluctant to meet in person … This chilling effect on newsgathering is not just limited to AP.
“Journalists from other news organizations have personally told me that it has intimidated both official and nonofficial sources from speaking to them as well.”
Pruitt spoke one month after the US news agency revealed that it had been notified after the fact that the US Justice Department had secret subpoenas of two months of phone records from its news operations.
FBI admits to using drones over U.S. soil
Salon: FBI Director Robert Mueller admitted to Congress Wednesday that drones are already being used over U.S. soil. While the use of surveillance drones domestically — both by local and federal law enforcement agencies — has been long anticipated and ushered in by a lobby with a powerful congressional caucus of supporters, Mueller’s admissions highlighted the lack of legislation currently in place to govern the use drone technology at home.
Mueller told a hearing that the FBI had used drones to aid its investigations in a “very, very minimal way, very seldom… Our footprint is very small, and we have very few and of limited use, and we’re exploring not only the use but also the necessary guidelines for that use,” he said.
Mueller’s acknowledgment is only the latest in a series of disclosures about the domestic use of drones. In 2010, it was revealed — and has since become common knowledge — that Border Patrol surveils both Canadian and Mexican borders with unmanned aircraft.
Every time the FBI investigates itself, it discovers it’s innocent
The New York Times reports: After contradictory stories emerged about an F.B.I. agent’s killing last month of a Chechen man in Orlando, Fla., who was being questioned over ties to the Boston Marathon bombing suspects, the bureau reassured the public that it would clear up the murky episode.
“The F.B.I. takes very seriously any shooting incidents involving our agents, and as such we have an effective, time-tested process for addressing them internally,” a bureau spokesman said.
But if such internal investigations are time-tested, their outcomes are also predictable: from 1993 to early 2011, F.B.I. agents fatally shot about 70 “subjects” and wounded about 80 others — and every one of those episodes was deemed justified, according to interviews and internal F.B.I. records obtained by The New York Times through a Freedom of Information Act lawsuit.
The last two years have followed the same pattern: an F.B.I. spokesman said that since 2011, there had been no findings of improper intentional shootings.
In most of the shootings, the F.B.I.’s internal investigation was the only official inquiry. In the Orlando case, for example, there have been conflicting accounts about basic facts like whether the Chechen man, Ibragim Todashev, attacked an agent with a knife, was unarmed or was brandishing a metal pole. But Orlando homicide detectives are not independently investigating what happened. [Continue reading…]
Daniel Klaidman’s loyal service to the Obama administration
Alex Pareene writes: Eric Holder feels bad. The attorney general of the United States has been criticized quite a bit since basically the day he was announced as Obama’s pick for the job, but lately that criticism has come from liberals, who are upset with the Justice Department for excessive snooping on journalists. Holder, according to Daniel Klaidman in the Daily Beast, now feels really personally sorry about the whole treating reporters like criminals thing, because he still thinks of himself as a good liberal.
Holder signed off on the search warrant issued for Fox News reporter James Rosen. The warrant justified seizing Rosen’s records by claiming that his handling of his source, a State Department contractor, may have constituted a violation of the Espionage Act. The AG apparently did not feel bad about this until he read in a newspaper that he had done so:
But for Attorney General Eric Holder, the gravity of the situation didn’t fully sink in until Monday morning when he read the Post’s front-page story, sitting at his kitchen table. Quoting from the affidavit, the story detailed how agents had tracked Rosen’s movements in and out of the State Department, perused his private emails, and traced the timing of his calls to the State Department security adviser suspected of leaking to him. Then the story, quoting the stark, clinical language of the affidavit, described Rosen as “at the very least … an aider, abettor and/or co-conspirator” in the crime. Holder knew that Justice would be besieged by the twin leak probes; but, according to aides, he was also beginning to feel a creeping sense of personal remorse.
Holder’s supposed “remorse” is risible. He didn’t realize how far he’d gone until he read about what he’d done in the Washington Post? Whoops! I accidentally criminalized news-gathering. (At least someone still reads the paper in print.) It is a bad sign of bubble-inhabiting when an administration doesn’t understand the ramifications of its actions until it reads about itself in the press.
I once compared Daniel Klaidman to a crow feeding off a rotting carcase but suggested that that might be unfair to crows. Even so, sycophantic behavior, as much as it expresses itself through an apparent desire to please others (Klaidman’s description of Holder’s angst must surely have pleased the attorney general), tends to be driven by the shameless pursuit of self interest.
At a time when plenty of journalists in Washington must be feeling like betrayed lovers, there are others whose desire to stay in bed with their sources is so strong they are apparently willing to forgive anything.
However contrite officials like Holder might act, and however outraged the press might present itself, each side can be in little doubt that their incestuous relations will continue.
How to stop the FBI from reading your email
MarketWatch: Emails are not private. A message may have one sender and one recipient but it can, with little effort, be read by a third party. In fact, despite the Fourth Amendment’s protections against unlawful searches, federal agencies do not necessarily need a warrant to read emails older than six months.
Concerns over such government snooping were raised by the American Civil Liberties Union, which last week noted a “troubling picture” of email surveillance practices by the Federal Bureau of Investigation and the Department of Justice. The agencies may be taking advantage of a component of the Electronic Communications Privacy Act, which requires warrants only for emails that have been stored on a third-party server for less than 180 days.
Documents reviewed by the ACLU showed that the FBI may be reading emails and other electronic messages without a warrant, and that different U.S. attorney’s offices may be applying “conflicting standards,” the group says. “It is time for Congress to step in and standardize the requirements and require warrants across the board,” says Nathan Wessler, a staff attorney with the ACLU. The report follows a similar review of IRS documents. [Continue reading…]
ACLU lawsuit takes on FBI surveillance of news organizations including Antiwar.com
PR Newswire: Today the ACLU sued the FBI in a freedom of the press lawsuit on behalf of two editors at a libertarian online magazine. After learning that their Bay Area-based site, Antiwar.com, was the subject of FBI surveillance, Eric Garris and Justin Raimondo sought the documents the government had compiled on both them and the site. After a year, the FBI has failed to produce any documents, so Garris and Raimondo do not know the full extent of the surveillance and whether it is ongoing. The editors are asking the FBI to turn over relevant documents, and to stop collecting records of their constitutionally protected speech.
“Freedom of the press is a cornerstone of our democracy, whether it’s the Associated Press or Antiwar.com,” said Julia Mass, staff attorney at the ACLU of Northern California. “Government surveillance of news organizations interferes with journalists’ ability to do their jobs.”
Garris and Raimondo discovered FBI documents [details in question begin at page 62] that showed a record of surveillance of the online magazine. In these documents an FBI analyst recognized that Antiwar.com’s content is constitutionally protected speech, but still recommended opening an investigation and continued FBI monitoring of the site. [Continue reading…]
Antiwar.com says this is one more example of post-9/11 government overreach, and a stark reminder that the First Amendment has been treated as little more than a speed bump on the road to a government surveillance state. The lawsuit is particularly timely, considering recent scandals in which the Department of Justice secretly seized months of journalists’ phone records at the Associated Press, and did the same and more to a FOX News reporter, while the IRS is acknowledging it singled out conservative groups that criticize the government for extra scrutiny.
Suddenly, the press is more aware than ever that the state has the ability to secretly monitor its activities, heretofore thought of as constitutionally protected from government interference and intimidation.
“Freedom of the press is a cornerstone of our democracy, whether it’s AP or Antiwar.com,” said Julia Harumi Mass, staff attorney for the American Civil Liberties Union of Northern California, which is representing Antiwar.com in the case. “FBI surveillance of news organizations interferes with journalists’ ability to do their jobs as watchdogs that hold the government accountable.”
How the Obama administration is trying to criminalize investigative journalism
The Los Angeles Times reports: The FBI obtained a sealed search warrant to read a Fox News reporter’s personal emails from two days in 2010 after arguing there was probable cause he had violated espionage laws by soliciting classified information from a government official, court papers show.
In an affidavit, an FBI agent told a federal magistrate that the reporter had committed a crime when he asked a State Department security contractor, Stephen Jin-Woo Kim, to share secret material about North Korea in June 2009.
The affidavit did not name the reporter, but Fox News identified him as its chief Washington correspondent, James Rosen. He was not charged, but Kim was indicted on espionage charges in August 2010 and is awaiting trial. He has denied leaking classified information.
The case marks the first time the government has gone to court to portray news gathering as espionage, and Fox News officials and 1st Amendment advocates reacted angrily Monday after the secret warrant was reported by the Washington Post.
“We are outraged to learn today that James Rosen was named a criminal co-conspirator for simply doing his job as a reporter,” said Michael Clemente, Fox News executive vice president of news. “In fact, it is downright chilling. We will unequivocally defend his right to operate as a member of what up until now has always been a free press.” [Continue reading…]
Eugene Robinson writes: In both instances [with the AP and Fox News], prosecutors were trying to build criminal cases under the 1917 Espionage Act against federal employees suspected of leaking classified information. Before President Obama took office, the Espionage Act had been used to prosecute leakers a grand total of three times, including the 1971 case of Daniel Ellsberg and the Pentagon Papers. Obama’s Justice Department has used the act six times. And counting.
Obviously, the government has a duty to protect genuine secrets. But the problem is that every administration, without exception, tends to misuse the “top secret” stamp — sometimes from an overabundance of caution, sometimes to keep inconvenient or embarrassing information from coming to light.
That’s where journalists come in. Our job, simply, is to find out what the government doesn’t want you to know. [Continue reading…]
Glenn Greenwald writes: Under US law, it is not illegal to publish classified information. That fact, along with the First Amendment’s guarantee of press freedoms, is what has prevented the US government from ever prosecuting journalists for reporting on what the US government does in secret. This newfound theory of the Obama DOJ — that a journalist can be guilty of crimes for “soliciting” the disclosure of classified information — is a means for circumventing those safeguards and criminalizing the act of investigative journalism itself. These latest revelations show that this is not just a theory but one put into practice, as the Obama DOJ submitted court documents accusing a journalist of committing crimes by doing this.
That same “solicitation” theory, as the New York Times reported back in 2011, is the one the Obama DOJ has been using to justify its ongoing criminal investigation of WikiLeaks and Julian Assange: that because Assange solicited or encouraged Manning to leak classified information, the US government can “charge [Assange] as a conspirator in the leak, not just as a passive recipient of the documents who then published them.” When that theory was first disclosed, I wrote that it would enable the criminalization of investigative journalism generally:
“Very rarely do investigative journalists merely act as passive recipients of classified information; secret government programs aren’t typically reported because leaks just suddenly show up one day in the email box of a passive reporter. Journalists virtually always take affirmative steps to encourage its dissemination. They try to cajole leakers to turn over documents to verify their claims and consent to their publication. They call other sources to obtain confirmation and elaboration in the form of further leaks and documents. Jim Risen and Eric Lichtblau described how they granted anonymity to ‘nearly a dozen current and former officials’ to induce them to reveal information about Bush’s NSA eavesdropping program. Dana Priest contacted numerous ‘U.S. and foreign officials’ to reveal the details of the CIA’s ‘black site’ program. Both stories won Pulitzer Prizes and entailed numerous, active steps to cajole sources to reveal classified information for publication.
“In sum, investigative journalists routinely — really, by definition — do exactly that which the DOJ’s new theory would seek to prove WikiLeaks did. To indict someone as a criminal ‘conspirator’ in a leak on the ground that they took steps to encourage the disclosures would be to criminalize investigative journalism every bit as much as charging Assange with ‘espionage’ for publishing classified information.”
That’s what always made the establishment media’s silence (or even support) in the face of the criminal investigation of WikiLeaks so remarkable: it was so obvious from the start that the theories used there could easily be exploited to criminalize the acts of mainstream journalists. [Continue reading…]
Leading security experts say FBI wiretapping proposal would undermine cybersecurity
The New York Times reports: Surveillance can be a tricky affair in the Internet age.
A federal law called the Communications Assistance for Law Enforcement Act allows law enforcement officials to tap a traditional phone, as long as they get approval from a judge. But if communication is through voice over Internet Protocol technology — Skype, for instance — it’s not as simple.
That conversation doesn’t pass through a central hub controlled by the service provider. It is encrypted — to varying degrees of protection — as it travels through the Internet, from the caller’s end to the recipient’s.
The Federal Bureau of Investigation has made it clear it wants to intercept Internet audio and video chats. And that, according to a new report being released Friday by a group of technologists, could pose “serious security risks” to ordinary Internet users, giving thieves and even foreign agents a way to listen in on Americans’ conversations, undetected.
The 20 computer experts and cryptographers who drafted the report say the only way that companies can meet wiretap orders is to re-engineer the way their systems are built at the endpoints, either in the software or in users’ devices, in effect creating a valuable listening station for repressive governments as well as for ordinary thieves and blackmailers.
“It’s a single point in the system through which all of the content can be collected if they can manage to activate it,” said Edward W. Felten, a computer science professor at Princeton and one of the authors of the report, released by the Center for Democracy and Technology, an advocacy group in Washington.
“That’s a security vulnerability waiting to happen, as if we needed more,” he said. [Continue reading…]
How the Obama administration is strangling press freedom
Whether or not this has been formulated in written policy, it seems clear that the way the Obama administration attempts to control the release of classified information is by trying to exert as much control over those who receive such information as those who disseminate it. The leaker and the recipient are treated as sharing equal responsibility — even though in reality both the power and the responsibility lies in the hands of those government officials who possess security clearances.
The administration draws no distinction between the publication of leaked information and the leak itself — as though classified information is being leaked by the press, when in fact it is being leaked to the press.
The New York Times reports: Attorney General Eric H. Holder Jr. on Tuesday defended the Justice Department’s sweeping seizure of telephone records of Associated Press journalists, describing the article by The A.P. that prompted a criminal investigation as among “the top two or three most serious leaks that I’ve ever seen” in a 35-year career.
“It put the American people at risk, and that is not hyperbole,” he said in an apparent reference to an article on May 7, 2012, that disclosed the foiling of a terrorist plot by Al Qaeda’s branch in Yemen to bomb an airliner. “And trying to determine who was responsible for that, I think, required very aggressive action.”
In a statement in response, The A.P.’s president and chief executive, Gary Pruitt, disputed that the publication of the article endangered security.
“We held that story until the government assured us that the national security concerns had passed,” he said. “Indeed, the White House was preparing to publicly announce that the bomb plot had been foiled.” Mr. Pruitt said the article was important in part because it refuted White House claims that there had been no Qaeda plots around the first anniversary of the killing of Osama bin Laden. [Continue reading…]
The law behind the A.P. phone-record scandal
Lynn Oberlander writes: The cowardly move by the Justice Department to subpoena two months of the A.P.’s phone records, both of its office lines and of the home phones of individual reporters, is potentially a breach of the Justice Department’s own guidelines. Even more important, it prevented the A.P. from seeking a judicial review of the action. Some months ago, apparently, the government sent a subpoena (or subpoenas) for the records to the phone companies that serve those offices and individuals, and the companies provided the records without any notice to the A.P. If subpoenas had been served directly on the A.P. or its individual reporters, they would have had an opportunity to go to court to file a motion to quash the subpoenas. What would have happened in court is anybody’s guess — there is no federal shield law that would protect reporters from having to testify before a criminal grand jury — but the Justice Department avoided the issue altogether by not notifying the A.P. that it even wanted this information. Even beyond the outrageous and overreaching action against the journalists, this is a blatant attempt to avoid the oversight function of the courts.
It is not, again, as if the government didn’t have options. The D.C. Circuit (in a 2005 opinion upholding a finding of contempt against the Times’s Judith Miller and Time’s Matt Cooper for refusing to testify about who had disclosed Valerie Plame’s identity as a C.I.A. operative) has held that there isn’t a First Amendment privilege for journalists to refuse to testify before a criminal grand jury, as has the Second Circuit (in a 2006 case in which the government was trying to find out who told the Times about a planned raid on two foundations suspected of providing aid to terrorists). In the wake of the decisions, there was a renewed effort to pass a federal shield law—though the proposed law would not have provided absolute protection in cases of national security — but, with the rise of WikiLeaks, that discussion died.
The Times’s case provides the facts most similar to the A.P.’s. The prosecutor had asked the Times to provide phone records; when the Times refused, he threatened to get the records directly from the phone companies. The Times then went to court and sought a declaratory judgment that its records were protected by reporter’s privilege. The Second Circuit ruled that phone records — even those held by a third party, such as a phone company—were subject to the same common-law privilege that would apply to the journalists’ own records. However, the court noted that there wasn’t a constitutional privilege to refuse to disclose such records to a criminal grand jury, and that any common-law privilege would be not absolute but “qualified” — meaning that it could be overcome by a compelling government interest. The Circuit, however, declined to define the privilege, other than to say that it wouldn’t stand up in the case before it.
Crucially, though the Times lost that case, 2–1, all of the judges agreed that government could not act unilaterally, without judicial review. [Continue reading…]
In AP surveillance case, the real scandal is what’s legal
Timothy Lee writes: On Monday the Associated Press reported that the Justice Department “secretly obtained two months of telephone records of reporters and editors for The Associated Press.” But here’s what’s really scary: The Justice Department’s actions are likely perfectly legal.
U.S. law allows the government to engage in this type of surveillance—on media organizations or anyone else — without meaningful judicial oversight.
The key here is a legal principle known as the “third party doctrine,” which says that users don’t have Fourth Amendment rights protecting information they voluntarily turn over to someone else. Courts have said that when you dial a phone number, you are voluntarily providing information to your phone company, which is then free to share it with the government.
This all dates back to a 1979 Supreme Court decision. Police had asked the phone company for information about the numbers dialed from a robbery suspect’s phone. The suspect objected, pointing to a famous 1967 ruling holding that the Fourth Amendment requires a warrant to record the audio of a phone call. He argued that the same principle ought to apply when the government records information about the numbers a suspect dials.
The Supreme Court rejected this argument. “We doubt that people in general entertain any actual expectation of privacy in the numbers they dial,” Justice Harry Blackmun wrote for the court. He pointed out that telephone customers are used to seeing numbers they’ve dialed on their monthly telephone bill.
Blackmun’s reasoning may have turned on the fact that automatic dialing was a relatively new development in 1979. Previously, telephone users had to tell a human operator which number they wished to reach, making it plausible to regard the phone company as an active participant in the phone-dialing process, but a mere passive conduit in transmitting the phone call itself.
Technological progress has rendered this distinction increasingly dubious. For example, cell phone companies now keep records about the locations of their customers’ phones. The government has argued that this “non-content” information should be available without a warrant. Yet such records amount to a detailed record of everywhere the phone’s owner has been in the past month; a much more intrusive form of surveillance than a list of the phone numbers a customer has dialed. [Continue reading…]
Obama is worse than Nixon, says Pentagon Papers lawyer
New York Observer: James C. Goodale, the so-called “father of reporters’ privilege” and the author of a new book called Fighting for the Press (CUNY Journalism Press, 255 pp., $20), was in his office at the Debevoise & Plimpton law firm, where he’s a partner, comparing Barack Obama to Richard M. Nixon.
“Nixon and Agnew were like listening to a Fox News program all day long, every day,” he said. “In their eyes, the Eastern establishment press were against them and they were against it and they were going to destroy it as best they can.” But, he said, “Obama has all these things that he’s done to the press on national security matters that Nixon never did.”
Mr. Goodale, 79, was the general counsel of The New York Times during the 1971 Pentagon Papers case, when President Nixon ordered the old grey lady to cease publication of excerpts from a 7,000-page document, which detailed America’s involvement in Vietnam over the course of three decades. The Times published the first excerpt on June 13, 1971. By June 26, the case had reached the Supreme Court. Over the course of a few days, the justices ruled in a 6-3 decision that the U.S. government could not censor the Times. Nixon then convened a grand jury to indict the Times for conspiracy to violate the Espionage Act – “which really doesn’t mean anything,” Mr. Goodale said, rubbing his forehead in distress — but the case quickly fell apart. Fighting for the Press reads like a political thriller, with Nixon providing some dark comic relief. The guy was not exactly subtle: “As far as the Times is concerned,” he said to John Mitchell, the U.S. Attorney General, “hell they’re our enemies.”
Now, the man who successfully fought Nixon says President Obama has an even more troubling record. [Continue reading…]