FAIR USE NOTICE

FAIR USE NOTICE

A BEAR MARKET ECONOMICS BLOG


This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. we believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates
FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates

All Blogs licensed under Creative Commons Attribution 3.0

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.

Friday, September 7, 2012

When Did Dissent Become a Crime? America's Police State on Steroids at the Conventions

ELECTION 2012  

Protests in Tampa and Charlotte have been swarmed by police and enveloped in surveillance.

 
During the Republication National Convention in Tampa, nearly 100 police in body armor and riot gear swarmed in after a large group of anarchists confronted a handful of right-wing protesters from the Westboro Baptist church.
Photo Credit: Arun Gupta
 

CHARLOTTE, N.C. -- In cities hosting large gatherings such as the national political conventions or international summits, we’ve come to expect a massive militarized police presence, even as the ranks of protesters thin. But what happens to all of the new high-tech cop toys and newly passed ordinances once conventioneers leave town? They stay.

I was at the alternative journalist flophouse in Charlotte on Sept. 4, the first day of the Democratic National Convention, when I received word of kettled protesters a few blocks away. I had just met FireDogLake reporter Kevin Gosztola, and after forming a mutual admiration society, we raced outside.
We hoofed past siren-flashing police cars blocking side streets, hiking alongside an empty roadway. Walls of blue loomed ahead. Our hands went to our sides and drew cameras. As we neared a broad intersection, protesters appeared behind a double line of police using bicycles as barricades. The entire intersection was encircled by hundreds of ground troops, motorcycle cops, commanders, surveillance units and vehicles. Media flitted along the perimeter and uncertainty coursed through observers. Why had hundreds of police barricaded the protesters, were they going to sweep them up, would violence break out?
In turned out the protesters were conducting an impromptu street blockade, preventing delegate buses from proceeding on their appointed route. The police moved to funnel the protesters into an isolated grass field lined with metal fencing, the “free-speech prison.” It was devoid of life, save for CODEPINK’s Medea Benjamin on a loudspeaker demanding: “Free Bradley Manning,” and “We don’t want a war with Iran.” A dozen anarchists approached the cage and broke into the “Hokey Pokey,” sticking their left arms in and singing, “You do the hokey-pokey and kiss your rights goodbye, that’s what it’s all about.”

It was a replay of the final night in Tampa, Fla., at the Republican National Convention. There, perhaps 150 protesters also blocked an intersection, delaying delegates exiting the convention after Mitt Romney’s acceptance speech. Nearly 400 police penned in the protest, and at every intersection visible, up to two blocks away, squads of police waited in reserve. A crew of seven Guardian Angels had deputized themselves as back-ups in case the police were overwhelmed, their tee shirts and bodies having seen better days.

Police-to-Protester Radio Incalculably Wide

Protests in Tampa and Charlotte have been surrounded by media, swarmed by police and enveloped in surveillance. Perhaps because of the military-like mobilization, arrests have been rare and police in both cities have not prevented unpermitted marches, though they have been tightly managed. There were only two reported arrests in Tampa, and activists who dropped banners and locked down at a coal-fired power plant were not arrested.

On Tuesday, Sept. 4, ten undocumented immigrants were hauled off after staging a nonviolent civil disobedience action. Police also nabbed three protesters, including one for wearing a mask and another for allegedly crossing a police line – something I did multiple times without incident. Of course, I was wearing a suit, and the protesters were a bit scruffier, lending weight to activists’ contention that police single them out based on their appearance.

I moved on to a Planned Parenthood rally taking place nearby. I talked my way through the first layer of Secret Service despite lacking credentials. The crowd was a pink haze of tee shirts bearing the slogan, “2012 Yes We Plan,” with the zero replaced by a circular package of birth-control pills. With the branded tees, pink signs declaring “Women are watching and we’re voting Obama,” and canned speeches for Obama, it had all the spontaneity of a corporate rock concert, as soothing to the Democratic Party machine as a river of pink Pepto-Bismol. Unlike the feral anarchists outside, the pro-choice troops inside the Democratic fold were free of a suffocating police presence.

Drones, “less-lethal” weapons and anti-dissent laws

The feds gave $50 million each to Tampa and Charlotte for security for the conventions, and it showed in the police mobilization and shiny new equipment ranging from bicycles and “less lethal weapons” to communications gear and medieval-style armor for cops and horses. Given the fact that protesters amounted only to a few hundred, it’s suspicious that thousands of police needed to be deployed -- more than were in evidence for massive protests in Washington, D.C. against the Iraq War a decade ago.

The biggest impact of militarized policing is not at the conventions themselves, but in the long term. The two political conventions coincide with the Summer Olympics. The international games proved to be a handy way to push out the poor from city centers by constructing stadiums and Olympic villages that are repurposed for tourism, consumption and high-end housing. Similarly, conventions and summits like NATO, G8, the RNC and DNC are part of the trend of intensifying the policing of poor and dissidents.

In some cases the convention policing leads to a more aggressive posture. In Denver, which hosted the 2008 DNC, 200 police in riot gear used their toys on Occupy Denver last October, attacking them with rubber pellets, mace, batons and pepper spray. In Chicago, new laws passed to stifle dissent at NATO protests there in May were made permanent, as were laws passed in Charlotte for the DNC. (The Tampa laws had a sunset clause.)

The covert side of policing summits and conventions is more disturbing. Tactics like infiltration, spying and provocateurs sometimes come to light when raids of activist spaces, pre-emptive arrests and contrived terrorist plots are sprung and the victims snared. Other elements remain covert.

Speculation was rife if drones would be employed during the RNC. A Tampa police spokeswoman denied that any of the “60 local, state or federal agencies involved in the security operation of the Republican National Convention will utilize air or ground drones.” But a private company, United Drones, was adamant that it would be flying drones for an unnamed private party during the convention. The morning after the RNC ended, as I drove into Tampa across the Howard Frankland Bridge with a legal observer, we spotted a low-flying aircraft. It looked like a large model aircraft with no obvious cockpit to hold a pilot, but was moving much faster than highway traffic.

Militarized and pre-emptive policing

Alex S. Vitale, associate professor in sociology at Brooklyn College and author of City of Disorder and numerous reports on protest policing, told AlterNet that he pinpoints the “intense changes” in policing to the 1999 World Trade Organization Ministerial in Seattle that was disrupted by nonviolent protests. (The much-reported window-breaking by self-described anarchists took place after and away from the much larger nonviolent actions.) But there is no across-the-board standard, he cautions. “Policing is more militarized or pre-emptive in depending on the department,” he says.

“[P]olicing in the U.S. is very decentralized,” Vitale explains, and “the handling of protests is left to the local police.” At the 2000 RNC in Philadelphia, says Vitale, there was a “heavy police response, pre-emptive arrests, mass arrests, holding people on exorbitant bail.”

In New York at the 2004 RNC, the police response was “pre-emptive,” as Vitale describes it, complete with “mass arrests, infiltration and surveillance.” In 2000 at the DNC in Los Angeles, the ACLU lambasted the LAPD for creating “an orchestrated police riot” after shooting tear gas and rubber bullets into a crowd at a rally for which organizers held a permit. Vitale says there was a “more militarized response” at the 2008 RNC in St. Paul.

Thus, the decision to give protests some breathing room in Tampa and Charlotte is notable because of past convention experiences, as well as the police attacks on Occupy camps in the last year. That may explain the absence of outright police aggression. Given the highly scripted nature of the conventions, 16,000 journalists looking for a story, and the prominence of Occupy Wall Street, chaos on the streets could have bumped the canned convention speeches from the top headline.

Vitale says: “Local officials want to minimize the level of dissent because to them, it’s all a very high-risk endeavor. They don’t want to get caught with the protests interrupting the events in any way.”

The danger of speaking out: 'Jesus, it's a war zone.'

I mention to Vitale that the Occupy Movement succeeded in part because it was theater: People acted out a new society in public. The flip side was the theater of the police response -- from the military-style assault on Occupy Oakland to the stormtrooper gear of Portland’s police to the cinematic staging of thousands of New York police sealing the financial district the night of May Day.

Vitale agrees there is an element of spectacle. He says the militarization of policing “communicates a symbolic message to participants and public that speaking out is dangerous and must be treated as a violent threat. The use of body armor and vehicles is almost never warranted. It communicates a message of fear and violence.”

That spectacle was on full display in Tampa and Charlotte. The day after Hurricane Isaac swiped Tampa, I wandered through the security zone, perhaps a quarter mile around the convention’s outer security perimeter. Stopping at a Salvation Army truck for some cold water, the only other civilian was a sun-crisped local. Appearing dazed, he gestured to the empty streets, speaking to no one in particular, “It’s a military zone. Jesus. It’s a war zone.”

Squads of camouflage-clad cops marched by; pelotons of bicycle police cruised streets; posses of horse-mounted police stood at the ready; heavy-duty golf carts crammed with law-enforcement personnel zipped by; platoons of riot police shadowed protesters; two-man teams on overpasses scanned areas below with binoculars, Secret Service in bulletproof vests secured checkpoints; assault boats plied the water; choppers circled above.

While there is federal involvement in policing conventions says Vitale, “I’ve always resisted the notion that we can explain the intensification of policing as a result of federal intervention. The military, fed law enforcement and local law enforcement have all become less tolerant of dissent. They are all experimenting with new techniques and technologies to aggressively contain the dissent. They are all learning from each other.”

Keeping away all but militants and fanatics: "making money off orange jumpsuits"

In the security state, democracy has withered. In Tampa during the Republican National Convention, what was known as the “free speech zone” was a portable stage on a crumbling road slicing through barren brownfields. The Westboro Baptist Church – the “God hates fags” gang that pickets the funerals of dead U.S. soldiers based on the logic that they were killed as divine retribution for believing “it’s OK to be gay” – entered the zone one afternoon. As a handful toted flamboyant posters of hate, more than 100 police took up position.

A minute after I chanced upon them, a hundred or so anarchists marched on the scene chanting, “We’re here, we’re queer, we’re anarchists, we’re going to fuck you up!” Dozens of reporters and cameraman stalked the edges like lions hunting antelopes. As the protesters encircled the Westboro crew, mixing insults with pleas for tolerance, 100 riot police pounded the street as they rounded the corner. More police poured in from every direction and a helicopter swooped in.

Despite the tension, no violence occurred. Vermin Supreme, the performance activist who sports an upside-down boot affixed to his head, gently dissuaded the police from breaking heads by pointing out over a bullhorn that there was no need for aggression against peaceful protests. The anarchists had made their point and went on their way. But the city of Tampa had also made its point. In the militarized convention space, the only groups exercising the right to dissent are left-wing militants and right-wing fanatics.

There is a strategy to this. Vitale says, “We are producing urban spaces in many cities that are hostile to dissent. The summits accentuate that by adding in a layer of barricades and intensive policing.” The purpose of the intensive policing, he argues, is to insulate the rich and powerful who attend the conventions “from the rabble.” He adds: “Dictators have been doing this sort of thing for generations.”

I asked Vitale if these conventions are pop-up police states. He countered, “I’ve been to police states, and you get shot if you demonstrate, not spend a night in jail.”

That’s true -- for most Americans. But at a rally against voter suppression in Tampa, Life Malcolm, a member of the Black People’s Advancement and Defense Organization, described his hometown.

“Tampa is a police state," Malcolm said. "Twenty four hours a day, seven days a week we are under constant surveillance. We see the police on every street corner, in their cars, on their bicycles, or on foot patrol in our communities. All night long their helicopters are whirling overhead when we are trying to read with our children, put them bed or be romantic with our mates. The police beat us up, scare us, lock us up, harass us. You can’t even walk down the street being black, drive down the street being black.”

As a consequence, said Malcolm, “In our neighborhoods nobody comes outside. Everybody is boarded up in the house because they are afraid to come outside the house and be caught by the police like some kind of animal. In the state of Florida, they used to make their money off oranges, now they make their money off people in orange jumpsuits.”

Long after the media and politicians are gone, dozens of local and state police agencies will be back at work, showered with new weapons, technology and laws to contain troublemakers and undesirables. No matter who wins in November, the march toward a police state will continue unabated.

Arun Gupta is a co-founder of The Indypendent and the Occupied Wall Street Journal. He is writing a book on the decline of America empire for Haymarket books.

Saturday, July 7, 2012

How America's Surveillance State Breeds Conformity and Fear

AlterNet.org

CIVIL LIBERTIES  

Once the government is able to monitor everything we do and say, we will be unable to fight back.

 
 
 
Editor's note: The following is a transcript of a speech delivered by Glenn Greenwald at this month's Socialism 2012 conference, on the massive growth of government and corporate surveillance and their chilling effects on Americans' rights. 

Last year was my maiden trip to the Socialism 2012 world. I started off by standing up and saying -- I was actually surprised by this, pleasantly surprised, because I didn’t know what to expect -- how amazingly inspirational I actually found this conference to be. The energy of activism and the sophisticated level of the conversation and the commitment that people displayed and the diversity of the attendees, really is unlike any other conference. And so when I was asked back this year, I was super excited to come back and accept. Not only because of that, but also because the conference organizers asked if I could speak about challenging the Surveillance State.

The reason that I was so eager to come and do that is because I really think that this topic is central to all of the other activism that’s being discussed here this weekend.

The Surveillance State hovers over any attacks that meaningfully challenge state-appropriated power. It doesn’t just hover over it. It impedes it, it deters it and kills it.  That’s its intent. It does that by design.

And so, understanding what the Surveillance State, how it operates -- most importantly, figuring out how to challenge it and undermine it, and subvert it -- really is, I think, an absolute prerequisite to any sort of meaningful activism, to developing strategies and tactics for how to challenge state and corporate power.

To begin this discussion, I want to begin with a little story that I think is illustrative and significant in lots of ways.

The story begins in the mid-1970s when there were scandals that were erupting, arising out of the Watergate investigation in the Nixon administration and/or scandals surrounding the fact that, as it turned out, the Nixon administration and various law enforcement officials in the federal government were misusing their eavesdropping powers. They were listening in on people who were political opponents, they were doing so purely out of political self-interest, having nothing to do with legal factors or the business of the nation, and this created a scandal, and unlike today, a scandal 40 years ago in the mid-1970s resulted in at least some relatively significant reactions.

In particular, a committee was formed in the Congress and the Senate, and it was headed by someone named Frank Church, who was a Democratic Party of the United States senator from Idaho who had been, in the Senate, at this time, for 20 years as one of the most widely regarded senators, and was chosen because of that. And he led this investigation into these eavesdropping abuses and tried to get into the scandal. One of the things that he discovered was that these eavesdropping abuses were radically more pervasive and egregious than anything that had been known at the start of the investigation.

It was by no means confined to the Nixon administration. In fact, it went all the way back to the 1920s, when the government first began developing the detective audio capability to eavesdrop on American citizens and heightened as the power heightened through the 1940s, when WWII would justify it; into the '50s when the Cold War did, and the 1960s when the social unrest justified surveillance. What Senator Church found was that literally every single administration under both Democratic and Republican presidents had seriously abused this power.

And not in isolated ways, but systematically. This committee documented all the ways in which that was true, and the realization quickly emerged that, allowing government officials to eavesdrop on other people, on citizens, without constraints or oversight, to do so in the dark, is a power that gives so much authority and leverage to those in power that it is virtually impossible for human beings to resist abusing that power.  That’s how potent of a power it is.

But the second thing that he realized beyond just the general realization that this power had been systematically abused was that, there was an agency that was at the heart of this abuse, and it was the National Security Agency. And what was really amazing about the National Security Agency was that it had been formed 20 years ago back in 1949 by President Truman, and it was formed as part of the Defense Department. It was so covert that literally, for two decades, almost nobody in the government even knew that it existed, let alone knew what it did. Including key senators like Frank Church.

And part of his investigation -- and actually, it was a fairly radical investigation, fairly aggressive even looking at it through cynical eyes and realizing that the ultimate impact wasn’t particularly grand, but the investigation itself was pretty impressive -- and he forced his way into the National Security Agency and found out as much as he possibly could about it.

And after the investigation concluded, he issued all sorts of warnings about the Surveillance State and how it was emerging, and the urgency of only allowing government officials to eavesdrop on citizens, that they have all kinds of layers of oversight in the courts and Congress, but he issued a specific warning about the National Security Agency that is really remarkable in terms of what he said. And this is what he said -- and you can find this anywhere online, in the New York Times, everywhere -- he said, as part of a written report, and in an interview:
The National Security Agency’s capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter.
He continued,
There would be no place to hide. If a dictator takes over the United States, the NSA could enable it to impose total tyranny, and there would be no way to fight back.
Now, there are several things that I find extraordinary about that statement. For one, the language that he uses. I mean, this is not somebody who is a speaker at the Socialism conference 2012. This was literally one of the people who was the most established institutional figures in American politics. I mean, he was in the liberal way of the Democratic Party but very much, he was mainstream for many years [ ... ] And here he is warning the country of the dangers, not just of the U.S. government but specifically about the National Security Agency using words like “dictator” and “total tyranny” and warning of the way in which this power can be abused such that, essentially it would be irreversible. That once the government is able to monitor everything we do and everything we say, there’s no way to fight back because fighting back requires doing it away from their prying eyes.

And if you look now, 30 years later to where we are, not only would you never, ever hear a U.S. senator stand up and insinuate that the National Security State poses this great danger or use words like “tyranny” and “dictators” to describe the United States the way that Frank Church did only 30 years ago. Now it’s virtually a religious obligation to talk about the National Security State and its close cousin, the Surveillance State, with nothing short of veneration.

Just a few weeks ago, Chris Hayes, who’s an MSNBC host on the weekends, used the opportunity of Memorial Day to express this view in this very tortured, careful and pre-apologetic way that maybe it’s the case that not every single person who has ever served as an American soldier or enlisted in the American military is a hero. Maybe we can think about them in ways short of that. And this incredible controversy erupted, condemnation poured down on him from Democrats and conservatives, liberals and the like, and he was forced in multiple venues in the course of the next week to issue one, increasingly sheepish apology after the next. That’s how radically our discourse has changed, so that you cannot talk about the National Security State or the Surveillance State in these kinds of nefarious terms, the way that Frank Church, who probably knew more about it, did just a few decades ago.

The second remarkable aspect of that story, of that quote to me, is that the outcome of that investigation was a series of laws that were grounded in the principle that, as I said earlier, that we cannot allow government officials to eavesdrop on American citizens or in any way to engage in surveillance without all kinds of oversights and checks. The most illustrative of which was the FISA law, which said that no government official can eavesdrop on the occasion without first going through a court and proving to a court that we’re actually doing something wrong and getting the court permission before they can eavesdrop.

There was a similar controversy in the mid 2000s and in 2005 when the New York Times revealed that the Bush administration had been using the NSA to do exactly what Frank Church warned against -- which is spying on the communication of American citizens. And the outcome of that was not new laws or new safeguards to constrain these sorts of abuses, it was exactly the opposite. In 2008, the Democratic-led Congress, with the support of President Obama, most of his supporters in the Democratic party and almost all Republicans basically gutted that law. Repealed it in its core and made it much, much easier for the government to eavesdrop on American citizens without constraint, and then immunized the nation’s telecoms that had participated in that illegal program.

So you see the radically different attitudes that the United States has to surveillance just some 30 years ago, when abuses resulted in a whole variety of a weak, but still meaningful legal constraint, versus what we do now when we find out that the government is lawlessly spying on us, which is act as quickly as possible to make it legal.

But the third part of why I think Church’s statements are so remarkable and important: If you look at what he said, he phrased his warning in a conditional sense. He said, If A happens, then B. A was: If the NSA starts using its eavesdropping capabilities and not directing them at foreign, nationals we suspect of spying, but instead at the American people, then B will happen. B being, we’ll essentially live under a dictatorship. There will be total tyranny where the American people will be unable to fight back because this net of surveillance will cover what we do.

And what’s really remarkable is that that conditional that he warned against -- the apparatus of the NSA being directed domestically and inwardly rather than outwardly -- has absolutely come to pass. That is the current situation, that is the current circumstance of the United States. The NSA, beginning 2001, was secretly ordered to spy domestically on the communications of American citizens. It has escalated in all sorts of lawless, and now lawful ways, such that it is now an enormous part of what that agency does. Even more significantly, the technology that it has developed is now shared by a whole variety of agencies, including the FBI, so that this surveillance net that Frank Church warned so stridently about, in a way that if we stood up now, we’d be immediately be branded a sort of shrill, submarginalized radical, has come to be, in all sorts of entrenched and legal ways.

Now there’s a few ways to think about the Surveillance State and try to understand its scope and magnitude. I think the most effective way to do that is to look at a couple of numbers. And to use the most mainstream sources to do that in terms of where we are, in terms of the American Surveillance State.
In 2010 the Washington Post published a three-part series called "Top Secret America" written by their Pulitzer Prize-winning investigative reporters Dana Priest and William Arkin. The first installment in that series looked at the National Security State and the Surveillance State, how it functions in the United States, and this was one of the sentences that appeared in this article. Listen to this, it said, “Every day -- every day, collections systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls, and other types of comunication.”

That’s every day, they intercept and store, and keep for as long as they want, 1.7 billion e-mails and other forms of telephonic communications.
William Binney is a NSA official, who is a high-ranking NSA official for decades, and he resigned in the wake of 9/11 because he was so outraged that the NSA was starting to be turned against the American people. And he resigned, and recently he has begun to speak out about the NSA’s abuses and he gave an interview on Democracy Now! three weeks ago, and this is what he said about surveillance under the Obama administration. He said,
“Surveillance has increased every year since 9/11. In fact, I would suggest that they’ve assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens: 20 trillion transactions have been assembled by the NSA and its related agencies about U.S. citizens interacting with other U.S. citizens."
He then went on to add that, that’s only e-mails and telephone calls, and not things like financial transactions or other forms of video surveillance. So that pretty much tracks with the Washington Post report as well -- if you’re storing 1.7 billion e-mails and telephone calls each and every day, it’s likely that you’ll fairly quickly reach the 20 trillion level that William Binney identified.

Now the most amazing thing about the Surveillance State given how incredibly liquidated it is and how incredibly menacing it is, is that we actually know very little about it. We’re almost back to the mid-1970s when nobody even knew what the NSA was. The big joke in Washington whenever anyone would mention the NSA is that the “NSA” stood for “No Such Agency.” It was something that you were not permitted to talk about, even in government. No one knew what it did.
We’re basically at that point. We get little snippets of information like the two statistics that I just described that give us a sense of just how sprawling and all-encompassing the surveillance state is. But we don’t know very much about who runs it, how it’s operated, at whom it’s directed and who makes those decisions. And in fact, so clear is that lack of knowledge that there is an amazing controversy right now about the Patriot Act.

You may remember, in the aftermath of 9/11, the Patriot Act was something that was really controversial. And mid-September, October of 2001, Congress enacted this law and everyone went around warning that it was this massive expansion of surveillance that was unlike anything we had ever seen before -- became the symbol of Bush-Cheney radicalism. Now, the Patriot Act is completely uncontroversial. It gets renewed without any notice every three years with zero reforms, no matter which party is in control.

There are two Democratic senators that are very, kind of, mainstream, loyal, Democratic Party supporters. They’re President Obama supporters [ ... ] One is Ron Wyden of Oregon and the other is Mark Udall of Colorado. And what these two Democratic Party senators have been doing for the last three years is running around warning that the Patriot Act is so much worse than anything that any of us thought all that time when we were objecting to it. And the reason it’s so much worse is because the U.S. government has secretly interpreted it -- what the Patriot Act admits it to do in terms of surveillance on American citizens, is completely unrelated to what the law actually says, and it’s something that almost nobody knows.

Just listen to these two quotes that they gave to the New York Times a month ago.  Senator Wyden said:
“I want to deliver a warning this afternoon. When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned, and they will be angry.”
Now he’s talking about a different American people than the one that I know, but the point is that if you were paying attention and cared about these things as you should, you will be stunned and angry to learn about what the government is doing under this already broad act.

Senator Udall said, “Americans will be alarmed if they knew how this law is being carried out.” Now they are two, as I said, established Democrats warning that the Democratic control of the Executive branch is massively abusing this already incredibly broad Patriot Act. And one of the things they are trying to do is extract some basic information from the NSA about what it is they’re doing in terms of the surveillance on the American people.  Because even though they are on the Intelligence Committee, they say they don’t even know the most basic information about what the NSA does including even how many Americans have had their e-mails read or had their telephone calls intercepted by the NSA.
So one of the things they did a couple months ago is, they wrote a demand to the NSA saying, we don’t want you to tell us anything sensitive, we just need to know the basic information about what it is that you’re doing. Such as, for example, the thing we want to know, is how many American citizens on U.S. soil have had their e-mails read by you, and their telephone calls listened to by you. That’s what we want to know, most of all.

And the NSA responded two weeks ago by saying -- I’m not exaggerating, I’m not saying this to be humorous, I’m not being ironic, I’m not snippeting a part of it to distort it -- their answer was, "We can’t tell you how many millions of Americans are having their e-mails read by us, and their telephone calls listened in by us, because for us to tell you that would violate the privacy of American citizens." (Laughter)

And just so you believe me, because if I were you I’d think, “That’s just ridiculous.” I just want to read you from the letter that the head of the NSA wrote to the Intelligence Committee as a response, “The NSA inspector general and NSA leadership both agree that a review of the sort you’re suggesting would itself violate the privacy of U.S. persons.”

So, I think the important thing to realize is how little we know about what it is that they’re doing. But the little that we do know is extraordinarily alarming in exactly the way that Frank Church  described. Now, I just want to make a couple other points about the Surveillance State, that don’t get enough attention but that really are necessary for completing the picture about what it really is and what it does.

We talk a lot about things like the NSA and federal government agencies like the FBI, but it actually stands well beyond that. We really live in a culture of surveillance. I mean, if you even go into any normal American city or even, increasingly, small or mid-sized towns, there are all kinds of instruments of surveillance everywhere that you probably don’t even notice. If you wake up in the morning and drive to your local convenience store, you’ve undoubtedly been photographed by all sorts of surveillance cameras on the street. If you go to the ATM to take out money to buy things, that will be then recorded. If you go into a convenience store to buy things you want to buy, you’ll have your photograph taken and will be reported.

An article in Popular Mechanics in 2004 reported on a study of American surveillance and this is what it said: “There are an estimated 30 million surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week. Americans are being watched. All of us, almost everywhere.” There is a study in 2006 that estimated that that number would quadruple to 100 million cameras -- surveillance cameras -- in the United States within five years largely because of the bonanza of post-9/11 surveilling.

And it’s not just the government that is engaged in surveillance, but just as menacingly, corporations, private corporations, engage in huge amounts of surveillance on us. They give us cell phones that track every moment of where we are physically, and then provide that to law enforcement agencies without so much as a search warrant.  Obviously, credit card and banking transactions are reported, and tell anyone who wants to know everything we do. We talk about the scandal of the Bush eavesdropping program that was not really a government eavesdropping program, so much as it was a private industry eavesdropping program. It was done with the direct and full cooperation of AT&T, Sprint, Verizon and the other telecom giants.

In fact, when you talk about the American Surveillance State, what you’re really talking about is no longer public government agencies. What you’re talking about is a full-scale merger between the federal government and industry. That is what the Surveillance State is. They are equally important parts of what the Surveillance State does.

I think the most interesting, and probably revealing, example that I can give you about where we are in terms of surveillance in the United States is a really ironic and unintendedly amusing series of events that took place in mid-2011. What happened in mid-2011 was that the governments of Saudi Arabia and the United Arab Emirates, which as we know are very, very oppressive and hate freedom, they said that what they were going to do was ban the use of Blackberries and similar devices on their soil.  The reason is that the corporation that produces Blackberries was either unable or unwilling to guarantee that Saudi and UAE intelligence agencies would be able to intercept all communications.

And the governments in Saudi Arabia and the United Arab Emirates were horrified by the prospect that people might be able to communicate on their soil without them being able to intercept and surveill their communication. And in response, they banned Blackberries.

This created huge amounts of condemnation in the western world. Every American newspaper editorialized about how this showed how much these governments were the enemies of freedom, the Obama administration issued a stinging denunciation of both governments, saying that they were engaged in the kinds of oppression that we couldn’t tolerate. And yet, six weeks later, the New York Times reported that, “The Obama administration was preparing legislation to mandate that all services that enable communications” -- and I’m quoting from the New York Times -- “to mandate that all services that enable communication, including in encrypted e-mail transmitters like Blackberry, social networking websites like Facebook, and software that allows direct pure messaging like Skype, be designed to ensure government surveillance,” which is exactly the same principle that everyone can damn United Arab Emirates and Saudi Arabia for.

The principle being that there can be no human interaction, especially no human communication, not just for international between foreign nations but by America citizens on American soils that is beyond the reach of the U.S. government.

This was the mindset in 2002 when the Bush administration, to dredge up John Poindexter, from wherever it was that he was -- and he was going to start the program that they call the Total Information Awareness Program. The logo which, I actually looked in the last couple of weeks, you should go look at that, you won’t believe how creepy it is, has a pyramid with this huge eye hovering over it. This eye is the “all-seeing eye” and the only problem with the Total Information Awareness Program is that, they just put a name on it that was too honest about what it was.

It freaked everybody out and they had to pretend like they weren’t going to go forward with it but what they did was incrementally, in a very clear way, recreated the Total Information Awareness Program under a whole variety of different legislative initiatives.  And this idea that every single form of technological communication, by law, must be constructed to permit government backdoor interception and surveillance is an expression of what this Surveillance State mindset is: that there can be no such thing as any form of privacy from the U.S. government. That is the mindset that has led the Surveillance State to beam the sprawling, vast, ubiquitous and always expanding instrument that state and corporate power users employ in order to safeguard their power.

One other point worth making about how this works, about how the Surveillance State works and how powers exercise through it -- and this I think is probably the most pernicious part. I refer to this as the one-way mirror. The government’s one-way mirror.

At exactly the same time (this is really, so remarkable to me), at exactly the same time that the government has been massively expanding its ability to know everything that we’re doing it has simultaneously erected a wall of secrecy around it that prevents us from knowing anything that they’re doing. There is this amazing controversy when the documents from WikiLeaks were disclosed, and the American media had to rush to assure everybody simultaneously that this was all a completely meaningless act and a completely horrible act.

So, the two claims that were made was, this horrible, traitorous organization, WikiLeaks, has severely damaged American national security, but at the same time we want you to know, there’s nothing new in anything that they disclosed. There’s nothing worth knowing. That was literally the two claims that was named and nobody ever bothered to reconcile those.

But what was true is that, of the hundreds and hundreds of thousands of pages that WikiLeaks disclosed, it’s actually an excess of a million now. The vast, vast bulk of it were very banal content. It was stuff that really wasn’t particularly interesting, that didn’t really reveal very much about anything that was worth knowing. And what was actually so scandalous about that was that very fact, because every single page that WikiLeaks disclosed was stamped “Classified” and they made it a crime to disclose any of it. Even though so much of it was banal and revealed nothing worth knowing. And what that reflected is that the U.S. government reflexively labels everything that it does of any conceivable significance as “classified” and “secret." It keeps everything that it does from us, at the very same time that it knows more and more about what we’re doing. If you think about [...] what a radical reversal [that is] of how things are supposed to work, it’s really startling.

The idea is supposed to be -- and this is just basic political science, basic design of the founding -- that there’s supposed to be transparency for government. We’re supposed to know virtually everything that they do. Individuals are supposed live in a sphere of privacy. Nobody’s supposed to know what we’re doing unless there’s a demonstrated, good reason to invade that wall of privacy.
We completely reversed that, so that the government now operates with complete secrecy, and we have none. The reason this is so disturbing is -- you can just look at the famous aphorism, typically attributed to Francis Bacon that “knowledge is power.” If I’m able to know everything about you, what you do, what you think, what you fear, where you go, what your aspirations are, the bad things that you do, the bad things you think about, and you know nothing about me? I have immense leverage over you in all kinds of ways. I can think about how to control you, I can blackmail you, I can figure out what your weaknesses are, I can manipulate you in all sorts of ways. That is the state of affairs that this Surveillance State, combined with the wall of secrecy, has brought about.

Now if you want to talk a little bit about the mechanisms by which this has been done, and the reasons why it matters so much [...] in relationship to the government and the corporate component of the Surveillance State [...]
When you look at the way in which the war on terror functioned in the first, say five to seven years after it was declared, and the civil liberties abuses that it ushered in particularly and inevitably, you’ll find that all this, without exception (there were few exceptions), they were directed toward foreign nationals -- not American citizens, but foreign nationals -- who were on foreign soil, not on U.S. soil. And the reason is that governments, when they want to give themselves abusive and radical powers, typically first target people who they think their citizens won’t care very much about, because they’ll think they’re not affected by it. And that’s pretty much what happened.

We detained, without charges and without trials, a bunch of Muslims who remain nameless, who were being picked up in places that nobody really knew about or cared much about. We sent drones to assassinate them. All of these powers were directed at foreign “others.”

But what has happened in the last three to four years is a radical change in the war on terror. The war on terror has now been imported into United States policy. It is now directed at American citizens on American soil. So rather than simply sending drones to foreign soil to assassinate foreign nationals, we are now sending drones to target and kill American citizens without charges or trial. Rather than indefinitely detaining foreign nationals like Guantanamo, Congress last year enacted, and President Obama signed, the National Defense Authorization Act that permits the detention -- without trial, indefinitely -- of American citizens on U.S. soil.

Rather than sending drones only over Yemen and Somalia and Pakistan, drones are now being approved at an alarming rate. Not just surveillance drones, but increasingly, possibly, weaponized drones that will fly over American soil, watching everything that we do in ways that say, police helicopters could never possibly accomplish.
Even when President Obama promised to close Guantanamo -- and lots of his defenders say, not accurately, that he was prevented from doing so because Congress blocked the closure -- the plan that he had was not to close Guantanamo and eliminate the system of indefinite detention that made it so controversial. The plan was to take that system of indefinite detention, close Guantanamo because it had become an upsetting symbol, and import it, move it, onto American soil  (video cuts out) ...

So what you see is the gradual importation of all the abuses of the war on terror. Now they are entrenched and not just into foreign nationals but to U.S. citizens and on U.S. soil as well. That’s the mechanism by which this is being done.
If you listen to US officials -- intelligence and defense officials -- talk about terrorism, what they emphasize now is not Al-Qaeda in Pakistan, which they largely acknowledge has been eliminated. Or even Al-Qaeda in Yemen which isn’t really much of a threat to anybody. What they talk about is the threat of a home-grown terrorism.

This is now the grave menace that American terrorism officials will warn, needs to be restrained, and the solution to that has been the gradual transference of all these abuses that we let take root because they weren’t happening to us but were happening to us but were happening to people "over there," and are now being imported into domestic powers.

And the reason that’s being done isn't difficult to see. American policymakers know that the financial unraveling that took place in 2008 that’s even more visible in European states like Spain and Portugal and Greece, has never really been rectified, and it can’t be rectified because there are structural problems. The way in which oligarchs in  the United States monopolize wealth and then use that wealth to control our political processes, ensure that this is not going to change, it’s only going to worsen. Mass unemployment, mass foreclosure, all these income inequality pathologies are here to stay, and the future that America policymakers see is visible if you look at what happened in London for a weak period of time and what happens all the time in Athens, what is happening with increasing frequency in Spain: huge amounts of social unrest. And you see lots of that happening. I think that’s what the Occupy movement, in many ways, is.
And the elites in the United States, both corporate and government, are petrified about that type of unrest, and what people in power always do when they fear unrest, is they start consolidating power in order to constrain it, in order to suppress it.

And this is what the Surveillance State is designed to do.  It’s justified, in the name of terrorism, of course that’s the packaging in which it’s wrapped, that’s been used extremely, and in all sorts of ways, since 9/11 for domestic application. And that’s being, that’s happening even more. It’s happening in terms of the Occupy movement and the infiltration that federal officials were able to accomplish using Patriot Act authorities. It’s happened with pro-Palestinian activists in the United States and all other dissident groups that have themselves [dealt with] with surveillance and law enforcement used by what was originally the war on terror powers.

I just want to close by talking about why I think this matters. The attitude that you typically encounter, and it’s not a very easy mindset to address or to refute, is that, and one that the government has sold continuously and peddled...is that privacy in the aspect I can understand as something to value, but ultimately, if I’m not really doing anything wrong, if I’m not one of the terrorists, if I’m not plotting to bomb a bridge, I don’t really have much reason to care, and people are invading my sphere of privacy and watching and learning what it is that I’m doing.

So I think it’s worth talking about the reasons why that is such an ill-advised way to think. Why it absolutely matters that privacy is being invaded in these systematic ways.  I mean, one obvious answer is that any kind of social movement needs to be able to organize in private, away from the targets of the organization. (applause)

If you look at the revolutionary movements in the Arab world, one of the greatest challenges that they had was that the government sought all sorts of ways to prevent them from communicating with one another, either at all, or in privacy. The fact that the Internet was not nearly as pervasive in those countries actually turned out to be a blessing because it enabled them to organize in more organic ways. But if the government is able to know what we speak about and know who we’re talking to, know what it is that we’re planning, it makes any kind of activism extremely difficult. Because secrecy and privacy are prerequisites to effective actions.

But I think that the more difficult value of privacy, the one that’s harder to think about, the one that’s more important than the one I just described. And that is that, it is in the private realm exclusively, where things like dissent and creativity, and challenges to orthodoxy, reside.

It’s only when you know that you can explore without external judgment, or when you can experiment without eyes being cast upon you, that the opportunity for creating new paths comes and there are all kinds of fascinating studies that  prove this to be the case. There are psychological studies where people have sat down at their dinner tables with their family members and friends talking for a long time in a very informal way. Then suddenly one of them pulls out a tape recorder and puts it on the table and says, “I’m going to tape-record this conversation just for my own interest. I promise I’m not going to tell anybody, I’m not going to show it to anybody, no one’s going to hear it, I’m just going to tape-record it because I like to go over all of the wisdom that you give me.”
And it’s an experiment to psychologically assess what the impact of that is. And invariably, what happens is, people who are now being recorded radically change their behavior. They speak in much more stilted sentences, they try and talk about much more high-minded topics, they are much stiffer in their expression of things because they now feel that they are being monitored. There was a pilot program in Los Angeles six or seven years ago that was in response to a couple of exaggerated news stories about rambunctious school children, elementary school children, on buses that were apparently being bullying and abusing other students.

The solution that they came up with was, they were going to install surveillance cameras in every single public school bus in Los Angeles county, which is the second or third largest county in the United States. The response, when it was ultimately disclosed, was well, this is going to be extraordinarily expensive! How can you have tens of thousands of working surveillance cameras with people monitoring them, recording them, every single day for every school bus in LA county? The answer that they gave was, Oh no, we’re not going to have working cameras in these buses, there may be a few buses that have working cameras, just so nobody knows which buses have those. We’re going to have faux cameras, because we know that if we put cameras up, even though they're not working, that will radically change the behavior of students.

In other words, we are training our young citizens to live in a culture where the expect they are always being watched. And we want them to be chilled, we want them to be deterred, we want them not to ever challenge orthodoxy or to explore limits where engaging creativity in any kind. This type of surveillance, by design, breeds conformism.  That’s its purpose. that’s what makes surveillance so pernicious.

The last point I want to make is this. One of the points about the Surveillance State, one of the things that happens is that, the way in which it affects how people think and behave is typically insidious. It’s something that is very potent and yet it’s very easy to avoid understanding or realizing. Now sometimes people do know about the effects of the Surveillance State and the climate of fear it creates.

I went on a book tour last October and early November and I went to 15 different cities and in each of the cities, I honestly didn’t really care about the book events, I was much more interested in going to the Occupy camps in each city. It was much more enlightening.

One of the things that would happen is -- literally almost the entirety of my book tour was taken up by taking about the Occupy movement.  It’s what everybody was thinking about, they had written many times that it was by far the most significant political development in many years, and I still think that.

Everywhere I’d go to talk about the Occupy movement, literally all the time I would get people who would say things like (and I would be on radio shows, and I’d get calls that say this), like, "look, I’m really supportive of the Occupy movements. I want to go down there and be a participant in it, but I’m a woman who has a small baby. Or, I’m a man who has a bad leg, and given all the police abuse that’s taking place there and all the infiltration, I’m just afraid of going and participating in these movements."

That was definitely part of the effect of this infiltration and police abuse had, it created this kind of fear in the way that people knew.

I spend a lot of time with American Muslims and American Muslim communities doing the work that I do and where I go and speak, and one of the things that emboldens me and keeps me very energized and engaged about these issues is if you go and speak to communities of American Muslims is you find an incredibly pervasive climate of fear.

And the reason is that they know that they are always being watched. They know that they have FBI informants who are attempting to infiltrate their communities, they know that there are people next to them, their neighbors, fellow mosque-goers, who have been manipulated by the FBI to be informants. They know that they are being eavesdropped on when they speak on the telephone, they know that they are having their e-mails read when they speak or communicate to anybody. What they will say all the time is that it’s created this extreme suspicion within their own communities, within their own mosques to a point where they’re even afraid to talk to any new people about anything significant because they fear, quite rightly, that this is all being done as part of  a government effort to watch them.

It doesn’t really matter whether it’s true in a particular case or it isn’t true. This climate of fear creates limits around the behavior in which they’re willing to engage in very damaging ways.

But I think what this Surveillance State really does more than making people consciously aware of the limits in those two examples I just described: people not wanting to go to Occupy movements and people in Muslim communities being very guarded is, it makes people believe that they’re free even though they’ve been subtly convinced that there are things that they shouldn’t do that they might want to do.

I always use dog examples. I have 11 dogs. It’s one of the thing, examples that I use. I know you probably think I’m crazy, it’s all rescue dogs, it’s one of the things we do, so I draw a lot of lessons from dogs. One of the most amazing things about dog behavior is, if you don’t want dogs to go into a certain place because it’s dangerous for them, one of the things you can do is put a fence around the area that you want to confine them.

But eventually, you can remove the fence and you don’t need the fence anymore because they will have been trained that the entirety of the world is within the boundaries that you first set for them. So even once you remove the fence, they won’t venture beyond it. They’ve been trained that that’s the only world that they want or are interested in, or known.

There are studies in what was formerly East Germany, which was probably one of the most notorious surveillance states in the last 50 years, where even once their boundaries were removed, once the Stazi no longer existed, once the wall fell... the psychological effects on East German people endure until today. The way in which they have been trained for decades to understand that there are limits to their life, even once you remove the limits, they’ve been trained that those are not things they need to transgress.

And that’s one of the things that constantly surveilling people and constantly communicating to them that they’re powerless against this omnipotent government corporate institution does to people, it convinces people that the tiny little box in which they live is really the only box in which they want to live so they don’t even realize being in prison.

Rosa Luxembourg said, “He who does not move does not notice his chains.”
You can acculturate people to believing that tyranny is freedom, that their limits are actually emancipations and freedom, that is what this Surveillance State does, by training people  to accept their own conformity that they are actually free, that they no longer even realize the ways in which they’re being limited.
So the last point I just want to mention, and we can talk about this in the discussion that follows and it probably will, it’s usually what discussions afterwards entail, is what can be done about all this?

There are just a few quick points I want to make about that.

One is that you can do things that remove yourself from the surveillance matrix. Not completely, but to the best extent that it can. There are people who only engage in transactions using cash, as inconvenient as that is, it at least removes that level of surveillance. There are ways of communicating on the internet using very effective forms of anonymity, which I will talk about in a minute. There are ways of educating yourself about how to engage in interaction and activism beyond the prying eye of the U.S. government.

There are important ways to educate yourself about the rights that you have when interacting with government agents. So much of what the government learns about people is that they let them learn that without having any legal obligation to do so. So much of government searches or government questioning is done under the manipulative pretext of consent, where people thought they had to consent or they don’t have the right to, and give up information about information they didn’t need to give up. And educating yourself about what your rights are by going to the Center for Constitutional Rights Web site or the National Coalition to Protect Civil Freedoms or the ACLU. Lots of places online will tell you how to do that.

Very important means of subverting this one-way mirror that I’ve described is forcible, radical transparency. It’s one of the reasons I support, so enthusiastically and unqualafiably, groups like Anonymous and WikiLeaks. I want holes to be blown in the wall of secrecy.

The way that this ends up operating effectively is only because they’re able to conceal what they do, and that’s why they consider these unauthorized means of transparency so threatening.

The last point I want to make about things that can be done is that there are groups that are pursuing very interesting and effective forms of anonymity on the internet.

There are things like the Tor project and other groups that enable people to use the internet without any detection from government authorities. That has the effect of preventing regimes that actually bar their citizens from using the Internet from doing so since you can no longer trace the origins of the Internet user. But it also protects people who live in countries like ours where the government is trying to constantly monitor what we do by sending our communications through multiple proxies around the world that can’t be invaded. There’s really a war taking place: an arms race where the government and these groups are attempting to stay one tactical step ahead of the other. In terms of ability to shield internet communications from the government and the government’s ability to invade them and participating in this war in ways that are supportive of the “good side” are really critical as is veiling yourself from the technology that exists, to make what you do as tight as possible.

I really don’t think there’s one any more important front, or battle, if there are any, than combating the Surveillance State. So that’s why I’m so interested in the topic, and I’m so happy to be able to speak with you.

Glenn Greenwald is a constitutional law attorney and chief blogger at Unclaimed Territory. His forthcoming book, How Would a Patriot Act: Defending American Values from a President Run Amok will be released by Working Assets Publishing next month.

Thursday, July 5, 2012

Courts Should Stop Jailing People for Being Poor



CommonDreams.org


Across the country, cash-strapped cities and counties are throwing poor defendants in jail for failing to pay legal debts that they can never hope to manage. On Monday, the New York Times told the story of Gina Ray, whose $179 speeding ticket mushroomed into $3,170 in fines and fees and 40 days in jail when she couldn’t afford to pay it. Gina is one of many swept up in America’s new debtors’ prisons, a growing problem nationwide.

 
(Image: ACLU)


Also this week, the ABA Journal  told the story of the Philadelphia courts’ aggressive efforts to collect unpaid fines and fees, many of which are decades old. Ameen Muqtadir was billed nearly $41,000 for two failures to appear in court dating back to 1991 and 1997—even though he’d been incarcerated at the time of each hearing. Meanwhile, Hakim Waliyyudin spent 12 days in jail while he raised the money to post a $1,000 bond with the court; after the criminal charges against him were dismissed, the court clerk told him that he owed another $9,000 plus $1,500 in collection fees because of a missed court date.   Although a free attorney from Community Legal Services ultimately convinced the court to waive the judgment and collection charges against Hakim, many other indigent defendants around the country face further jail time when they cannot pay court-ordered fines and fees.

As the ACLU emphasized in its October 2010 report, In for a Penny: The Rise of America’s New Debtors’ Prisons, jailing people for unpaid court debts imposes devastating human costs on men and women whose only remaining crime is that they are poor. Upon release, they face the daunting prospect of having to rebuild their lives yet again, while their substantial legal debts pose a significant, and at times insurmountable, barrier as they attempt to re-enter society. They see their incomes fall, their credit ratings worsen, their prospects for housing and employment dim, and their chances of ending up back in jail or prison increase. Many must make hard choices each month as they attempt to balance their needs and those of their families with their legal financial obligations. They also remain tethered to the criminal justice system—sometimes decades after they complete their sentences—and live under constant threat of being sent back to jail or prison, solely because they cannot pay what has become an unmanageable legal debt.

Aggressive collection of legal financial obligations creates a two-tiered system of justice in which the poorest defendants are punished more harshly than those with means. Although courts attempt to collect legal financial obligations from indigent and affluent defendants alike, those who can afford to pay their legal debts avoid jail, complete their sentences, and move on with their lives. Those unable to pay end up incarcerated or under continued court supervision.

Perversely, they also often end up paying much more in fines and fees than defendants who can pay their legal financi'al obligations. Additionally, the imposition of legal financial obligations disproportionately affects racial and ethnic minorities, who are disproportionately represented among the prisoner population Courts have found that incarcerating people for debts they couldn’t afford to pay violates the 14th Amendment. Further, it creates hardships for men and women who already struggle with re-entering society after being released from prison or jail, and wastes resources in an often fruitless effort to extract payments. In an age when more Americans are deprived of their liberty than ever before, unnecessarily and unfairly, we should be shutting down debtors’ prisons, not creating more of them.

Carl Takei is a Staff Attorney at the National Prison Project of the American Civil Liberties Union. He litigates prison conditions class action suits in federal court and performs state-based advocacy against overincarceration, including fighting unnecessary jail expansion projects and working to stop modern-day debtors’ prison practices in local courts and jails.

Saturday, June 16, 2012

Pentagon Lists 110 Potential Drone Bases in U.S.




Pentagon Lists 110 Potential Drone Bases in U.S.

June 14th, 2012 by Steven Aftergood 

 
The Department of Defense has identified 110 sites in the United States that could serve as bases for military unmanned aerial systems (UAS), or drones.  A new report to Congress lists each of the 110 sites “and the UAS likely to fly at that location.”  See “Report to Congress on Future Unmanned Aircraft Systems Training, Operations, and Sustainability,” Department of Defense, April 2012 (pp. 9-12).

The newly disclosed DoD report was first reported by InsideDefense.com.
The actual or potential drone bases are located in 39 of the 50 states, from Fort McClellan in Alabama to Camp Guernsey in Wyoming, as well as Guam and Puerto Rico.

Currently, the DoD and the military have “88 active certificates of authorization (COAs) at various locations around the country” that permit them to fly UASs outside of restricted military zones, the report to Congress said.  COAs are issued by the Federal Aviation Administration.

But “The rapid increase in fielded UAS has created a strong demand for access within the NAS [National Airspace System] and international airspace. The demand for airspace to test new systems and train UAS operators has quickly exceeded the current airspace available for these activities,” the report said.
The Senate Armed Services Committee, evidently receptive to this demand, said in its report on the FY2013 defense authorization act that integration of drones into domestic airspace should be accelerated.  See “Senate: Drones Need to Operate ‘Freely and Routinely’ in U.S.,” Secrecy News, June 8, 2012.

The website Public Intelligence previously identified 64 U.S. drone site locations.  See also “Revealed: 64 Drone Bases on American Soil” by Lorenzo Franceschi-Bicchierai, Wired Danger Room, June 13:

“UAS will not achieve their full potential military utility unless they can go where manned aircraft go with the same freedom of navigation, responsiveness, and flexibility,” the new DoD report to Congress said.

A bill “to protect individual privacy against unwarranted governmental intrusion through the use of the unmanned aerial vehicles” (HR 5925) was introduced in the House of Representatives on June 7 by Rep. Austin Scott.  A companion bill (S.3287) has been introduced in the Senate by Sen. Rand Paul.

Monday, April 30, 2012

Why 'Stand Your Ground' Does not Apply to Women

AlterNet.org


CIVIL LIBERTIES  

There are major inconsistencies in applications of "Stand Your Ground" laws.

April 26, 2012  |  
 
 
Nowadays the words "Stand Your Ground" have almost become synonymous with "no fair" and "unjust," due mostly to the non-arrest of George Zimmerman the night he shot Trayvon Martin and that law that protected him up until just last week.

But the cases of John McNeil and now Marissa Alexander have highlighted the inconsistencies in the law's application.

According to a blogsite pleading her case, in 2010, Alexander found herself in a violent confrontation with her husband. Her husband already had a history of abuse towards her and other women in the past, causing Alexander to place an injunction for protection against violence on him.

On this day in particular Alexander says that her husband, unprovoked, assaulted her in the bathroom of her home. She managed to get out of his grasp and ran to her car in the garage to leave, but realized that she didn't have her keys. She was also unable to open the garage door to get out because of a mechanical malfunction.

At this point, she was very fearful for her life, but knew that she had to at least get her cell phone to call for help. That's when she grabbed a gun, for which she had a concealed weapon permit. When she walked back into the kitchen area, she saw her husband again, who was supposed to be leaving through another door with his two sons (her stepsons). When he saw her, she says he screamed "bitch, I'll kill you" and charged at her. She then pointed her weapon at the ceiling, turned her head and shot in the air. That scared her husband off.

But, he promptly called the police and told them that she shot the gun at him and his sons. She was taken to jail where she has been sitting ever since.
Alexander has been trying to use Florida's Stand Your Ground laws to defend her actions, but to no avail. A judge ruled that Alexander was actually in the wrong, saying that she could have exited to safety through one of the other doors or windows in the house instead of crossing paths with her husband in the kitchen.

"I am a law abiding citizen and I take great pride in my liberty, rights, and privileges as one," pleads Alexander on the blogsite telling her story. " I have vehemently proclaimed my innocence and my actions that day.  The enigma I face since that fateful day I was charged through trial, does the law cover and apply to me too?"

Thursday, April 26, 2012

Facebook and Google Turned Into Government Spies? The Dangerous New Law Before Congress (CISPA)

AlterNet.org


CIVIL LIBERTIES  

A private company doing the government’s work does not face the same privacy restrictions. 

 
 
 
The U.S. House of Representatives is expected to pass a reprehensible cyber-security bill this week that seeks to protect online companies—giant social media firms to data-sharing networks controlling utilities—from cyber attack. It is reprehensible because, as Democratic San Jose Rep. Zoe Lofgren said this week, it gives the federal government too much access to the private lives of every Internet user. Or as Libertarian Rep. Ron Paul also bluntly put it, it turns Facebook and Google into “government spies.”

But that’s not the biggest problem with the Congress’s urge to address a real problem—protecting the Internet from cyber attacks. While House passage launches a process that continues in the Senate, the bigger problem with the best known of the cyber bills before the House, CISPA, the Cyber Intelligence Sharing and Protection Act, is not what is in it -- which is troubling enough -- but what is not on Congress’s desk: a comprehensive approach to stop basic constitutional rights from eroding in the Internet Age.

“I don’t think the current cyber-security debate is adequately protecting civil liberties,” said Anjali Dalal, a resident fellow with the Information Society Project at Yale Law School (and a blogger). “CISPA seems to place constitutionally suspect behavior outside of judicial review. The bill immunizes all participating entities ‘acting in good faith.’ So what happens when an ISP hands over mountains of data under the encouragement and appreciation of the federal government? We can’t sue the government, because they didn’t do anything. And we can’t sue the ISP because the bill forbids it.”

What happens is anybody’s guess. But what does not happen is clear. The government, as with the recently adopted National Defense Authorization Act of 2012, does not have to go through the courts when fighting state "enemies" on U.S. soil. Instead, CISPA, like NDAA, expands extra-judicial procedures as if America’s biggest threats must always be addressed on a kind of wartime footing. Constitutional protections, starting with privacy rights, are mostly an afterthought.

The CISPA bill takes an information-sharing approach to fight cyber attacks. Nobody has said there’s a problem with the government giving classified information to private firms to stop attacks. It is the opposite of that—Internet companies sharing information about users and their online activities—that raises civil liberties red flags. In general, the courts distinguish between public and private aspects of online activity, holding, for example, that e-mail addresses, subject lines and traffic patterns are like snail-mail addresses on the outside of a paper envelope—they are public. But just as a letter’s contents are private, courts have said that is true with online activity—although in a recent Supreme Court case involving wireless surveillance, Justice Sonia Sotomayor raised the question of how much privacy people should expect in their online activities.

For now, however, the government generally needs a search warrant to look at the details of people’s online activities. That is because the Constitution protects civil liberties by restricting government intrusion into citizens' lives. However, a private company doing the government’s work for it does not face the same restrictions.

CISPA’s fine print does an end run around the judicial hurdles. It essentially fights cyber threats by deputizing the tech sector to police the net and share everything— online activities, history, searches, transactions, mail—with various federal agencies, including possibly national security agencies. Internet firms would not be required to tell clients when their information was given to the government.

The latest Intelligence Committee amendments—which were submitted to the House Rules Committee on Wednesday morning (it decides what will be debated on the House floor on Thursday) -- said the information given to the government would be used for “cybersecurity purposes,” or degrading, disrupting or destroying a network or system, as well as unauthorized taking of information. Cyber security purposes also is defined as protecting people from “danger of death or serious bodily harm,” which presumably means terrorism, and protecting minors from “child pornography,” “sexual exploitation” and “kidnapping.” This specificity was missing in earlier versions of the bill.

Critics in the civil liberties community have said CISPA’s wording is too vague, deputizes private actors, leaves no legal recourse, is open to mission creep and offers inadequate public protections, such as requiring ISPs to anonymize personal identifying information, or limiting the government’s use and retention of the data. Private firms cannot be expected to safeguard privacy, they said, especially after Congress has freed them from liability.

House Democrats have tried to amend the Intelligence Committee bill to clarify what is a cyber security threat, impose limits on the government's use and retention of shared data, and to protect privacy by urging the encryption of records, and also saying that what is gathered cannot be used for other regulatory purposes. CISPA’s authors said they have addressed critics’ concerns, but late on Wednesday the White House, in its first comments on the bill, said it would veto it in its current form. Previously, the executive branch signalled that it preferred the approach in a Senate bill co-sponsored by Sen. Joe Lieberman, I-Connecticut, and Sen. Susan Collins, R-Maine, saying it offers more privacy assurances while protecting critical infrastructure and online platforms.
One of the biggest unknowns with government data mining—whether by federal agencies or contractors—is what will be done with all the information that is gathered. People may assume that more data means more confusion by analysts, but the opposite actually is true, according to experts such as Jeff Jonas, a senior scientist at IBM and a blogger. He says the public has little idea “what is computationally possible with Big Data,” which can predict—drawing on what is online—what someone is likely be doing at a certain time of day.

“Big Data is making it harder to have secrets,” Jonas wrote on his blog. He explains:
Unlike two decades ago, humans are now creating huge volumes of extraordinarily useful data as they self-annotate their relationships and yours, their photographs and yours, their thoughts and their thoughts about you… and more. With more data, come better understanding and prediction. The convergence of data might reveal your "discreet" rendezvous or the fact you are no longer on speaking terms with your best friend. No longer secret is your visit to the porn store and the subsequent change in your home’s late-night energy profile, another telling story about who you are… again out of the bag, and little you can do about it. Pity… you thought that all of this information was secret.
In the commercial world, consultants like Jonas tell clients that the best business practice is for companies to alert clients when third parties look at their data. But that courtesy, or legal requirement, is not part of the House’s CISPA bill. Indeed, as the San Jose Mercury News, the daily newspaper of Silicon Valley, noted in a Wednesday editorial urging the House to kill the bill, “personal privacy protection is all but nonexistent.” 

But the biggest concern is not being touched at all: how to shore up constitutional rights, not chip away at them, when the Internet makes it harder for everyone to have secrets and the government deputizes the private sector to snoop for it without any judicial review.

“I think our First and Fourth Amendment rights aren’t being adequately considered,” said Yale Law School’s Dalal. “We have a right to be free from government intrusion into our private thoughts, actions and effects without a warrant. We also have a right to speak freely without government interference. Authorizing private surveillance of everything we do on the Internet with the understanding that government can be a recipient of that surveillance information threatens our right to speak freely, and to be free from unlawful search and seizure.” 

It is almost certain that the GOP-controlled House will pass a version of CISPA on Friday. As was the case when the House passed legislation granting immunity to the telecom industry three years ago—for warrantless wiretapping of every American’s phone records to detect terrorist communications—the proponents will likely make many declarations about the price of freedom being vigilance. And its defenders will also declare that compromises were made to protect privacy rights.

However, every successive legislative "achievement" that gives government a deeper reach into people’s lives doesn’t just undermine specific civil liberties, it shrinks the Constitution. Indeed, it would be a rare day in Washington if Congress looked at constitutional protections first, not at the tail end, of every phase of the legislative process.

Steven Rosenfeld covers democracy issues for AlterNet and is the author of "Count My Vote: A Citizen's Guide to Voting" (AlterNet Books, 2008).